Fig. 17From: Blockchain-oriented approach for detecting cyber-attack transactionsFeature importance of Flash loan attack based on LGBMBack to article page