Fig. 7From: Detection of illicit cryptomining using network metadataDetection performance on novel mining poolsBack to article page