Fig. 4From: Detection of illicit cryptomining using network metadataSystem architectureBack to article page