Fig. 4From: Evicting and filling attack for linking multiple network addresses of Bitcoin nodesIllustrative diagram of two behavioral characteristics. The two behavioral characteristics: \(AF_{1} = AF_{2} + BF\); \(AF_{1} = BS\)Back to article page