Fig. 1From: Detection of illicit cryptomining using network metadataTypical stratum mining workflowBack to article page