Fig. 16From: Blockchain-oriented approach for detecting cyber-attack transactionsFeature importance of Smart contract exploit based on LGBMBack to article page