Fig. 3From: Evicting and filling attack for linking multiple network addresses of Bitcoin nodesAttacking procedure of the linking attackBack to article page