Fig. 5From: Detecting malicious accounts in permissionless blockchains using temporal graph propertiesDegree distribution of accountsBack to article page