{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:56:26Z","timestamp":1730238986058,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/icdmw.2018.00043","type":"proceedings-article","created":{"date-parts":[[2019,2,12]],"date-time":"2019-02-12T01:55:06Z","timestamp":1549936506000},"page":"244-251","source":"Crossref","is-referenced-by-count":24,"title":["EGRET: Extortion Graph Exploration Techniques in the Bitcoin Network"],"prefix":"10.1109","author":[{"given":"Silivanxay","family":"Phetsouvanh","sequence":"first","affiliation":[]},{"given":"Frederique","family":"Oggier","sequence":"additional","affiliation":[]},{"given":"Anwitaman","family":"Datta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.48"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-118"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"key":"ref14","article-title":"Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering","author":"zheng","year":"2017","journal-title":"Mobile Networks and Management” (MON-AMI)"},{"key":"ref15","article-title":"Average Path Length in Random Works","volume":"70 5","author":"fronczak","year":"2004","journal-title":"Physical Review E"},{"journal-title":"Bitcoin and Cryptocurrency Technologies","year":"2016","author":"narayanan","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0086197"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0085777"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/1969248"},{"journal-title":"The Unreasonable Effectiveness of Address Clustering","year":"2016","author":"harrigan","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.3390\/fi8010007","article-title":"Analyzing the Bitcoin Network: The First Four Years","volume":"8","author":"lischke","year":"2016","journal-title":"Future Internet"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945049"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2016.7487938"},{"journal-title":"Data-Driven De-Anonymization in Bitcoin","year":"2015","author":"nick","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-39884-1_4","article-title":"Evaluating user privacy in bitcoin","author":"androulaki","year":"2013","journal-title":"Financial Cryptography and Data Security"},{"key":"ref2","article-title":"Bitiodine: Extracting intelligence from the bitcoin network","author":"spagnuolo","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2008","author":"nakamoto","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4139-7_10"},{"journal-title":"Table of Integrals Series and Products","year":"0","author":"gradshteyn","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00210"}],"event":{"name":"2018 IEEE International Conference on Data Mining Workshops (ICDMW)","start":{"date-parts":[[2018,11,17]]},"location":"Singapore, Singapore","end":{"date-parts":[[2018,11,20]]}},"container-title":["2018 IEEE International Conference on Data Mining Workshops (ICDMW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8626049\/8637356\/08637544.pdf?arnumber=8637544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T05:52:57Z","timestamp":1643262777000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8637544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icdmw.2018.00043","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}