Fig. 6From: Evicting and filling attack for linking multiple network addresses of Bitcoin nodesDistribution of attack time required for the first attacking phase (The dashed line is the median line)Back to article page