Fig. 8From: Detection of illicit cryptomining using network metadataComparison on detecting novel mining poolsBack to article page