Fig. 5From: Detection of illicit cryptomining using network metadataStatistical distribution of F1.1, F1.2, and F1.3Back to article page