Fig. 2From: Evicting and filling attack for linking multiple network addresses of Bitcoin nodesVictim model for the linking attackBack to article page