Fig. 14From: Blockchain-oriented approach for detecting cyber-attack transactionsAn illustration of the re-entrancy attackBack to article page