Fig. 3From: Detecting malicious accounts in permissionless blockchains using temporal graph propertiesSample graph depicting the most attractive and least attractive accountsBack to article page