Fig. 2From: Blockchain-oriented approach for detecting cyber-attack transactionsThe transaction details of account-based blockchains as an exampleBack to article page