Fig. 8From: Detecting malicious accounts in permissionless blockchains using temporal graph propertiesAttractivenessBack to article page