Fig. 6From: Detection of illicit cryptomining using network metadataDetection performance as a function of window size lWBack to article page