Part 1- Understanding Research Goals

Part 2- Identify Potential Governance Attacks

Part 3- On-Chain Data Analysis

Part 4- Modelling