Fig. 7From: Evicting and filling attack for linking multiple network addresses of Bitcoin nodesDistribution of attack time required for the whole attack (The dashed line is the median line)Back to article page