Fig. 9From: Detecting malicious accounts in permissionless blockchains using temporal graph propertiesCosine similarity between malicious accounts identified on different datesBack to article page