{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:55:39Z","timestamp":1726037739444},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242671"},{"type":"electronic","value":"9783030242688"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24268-8_36","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:03:34Z","timestamp":1563404614000},"page":"385-395","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Bitcoin Node Discovery: Large-Scale Empirical Evaluation of Network Churn"],"prefix":"10.1007","author":[{"given":"Yu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Runan","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Xiangyi","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Qingfeng","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Xiangtao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. In: Proceedings of the Conference on Social Computing (SocialCom) (2011). (Reid, F., Harrigan, M., Donet, J.A.D.)","key":"36_CR1"},{"unstructured":"https:\/\/coinmarketcap.com\/zh\/currencies\/bitcoin\/ . Accessed 9 Nov 2018","key":"36_CR2"},{"key":"36_CR3","first-page":"002","volume":"12","author":"J Liping","year":"2013","unstructured":"Liping, J.: Bitcoin: theory, practice and effect. Stud. Int. Finance 12, 002 (2013)","journal-title":"Stud. Int. Finance"},{"key":"36_CR4","first-page":"152","volume-title":"Blueprint for a New Economy","author":"M Swan","year":"2015","unstructured":"Swan, M.: Blueprint for a New Economy, p. 152. O\u2019Reilly Media, Inc., Sebastopol (2015)"},{"key":"36_CR5","volume-title":"Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World","author":"D Tapscott","year":"2016","unstructured":"Tapscott, D., Tapscott, A.: Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World. Penguin, City of Westminster (2016)"},{"issue":"2","key":"36_CR6","first-page":"17","volume":"3","author":"JE Pazmi\u00f1o","year":"2015","unstructured":"Pazmi\u00f1o, J.E., da Silva Rodrigues, C.K.: Simply dividing a bitcoin network node may reduce transaction verification time. SIJ Trans. Comput. Netw. Commun. Eng. (CNCE) 3(2), 17\u201321 (2015)","journal-title":"SIJ Trans. Comput. Netw. Commun. Eng. (CNCE)"},{"unstructured":"Antonopoulos, A.M.: Mastering Bitcoin (2014)","key":"36_CR7"},{"doi-asserted-by":"crossref","unstructured":"Brighten Godfrey, P., Shenker, S., Stoica, I.: Minimizing churn in distributed systems. In: SIGCOMM. ACM (2006)","key":"36_CR8","DOI":"10.1145\/1159913.1159931"},{"unstructured":"Winter, P., Ensafi, R.: Identifying and characterizing Sybils in the Tor network. In: USENIX Security Symposium, 12 August (2016)","key":"36_CR9"},{"unstructured":"Li, P., Lei, Y.: Identification method for critical nodes in dynamic Ad hoc network. Appl. Res. Comput. 34(5) (2017)","key":"36_CR10"},{"unstructured":"Chen, L., Liu, P.: Analysis on dynamic evolution of nodes of AS-level topology. J. Beijing Univ. Technol. 44(4) (2018)","key":"36_CR11"},{"unstructured":"https:\/\/en.bitcoin.it\/wiki\/Satoshi_Client_Node_Discovery . Accessed 9 Nov 2018","key":"36_CR12"},{"key":"36_CR13","volume-title":"Wireshark & Ethereal Network Protocol Analyzer Toolkit","author":"A Orebaugh","year":"2006","unstructured":"Orebaugh, A., Ramirez, G., Beale, J.: Wireshark & Ethereal Network Protocol Analyzer Toolkit. Elsevier, Amsterdam (2006)"},{"unstructured":"https:\/\/github.com\/sipa\/bitcoin-seeder . Accessed 9 Nov 2018","key":"36_CR14"},{"unstructured":"https:\/\/bitnodes.earn.com\/ . Accessed 9 Nov 2018","key":"36_CR15"},{"unstructured":"https:\/\/en.wikipedia.org\/wiki\/Bitcoin . Accessed 9 Nov 2018","key":"36_CR16"},{"key":"36_CR17","doi-asserted-by":"publisher","first-page":"4486","DOI":"10.3390\/s18124486","volume":"18","author":"M Li","year":"2018","unstructured":"Li, M., Sun, Y., Jiang, Y., Tian, Z.: Answering the min-cost quality-aware query on multi-sources in sensor-cloud systems. Sensors 18, 4486 (2018)","journal-title":"Sensors"},{"doi-asserted-by":"publisher","unstructured":"Han, W., Tian, Z., Huang, Z., Li, S., Jia, Y.: Bidirectional self-adaptive resampling in imbalanced big data learning. Multimedia Tools Appl. (2018). https:\/\/doi.org\/10.1007\/s11042-018-6938-9","key":"36_CR18","DOI":"10.1007\/s11042-018-6938-9"},{"key":"36_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/7943586","volume":"2018","author":"ZiHan Wang","year":"2018","unstructured":"Wang, Z., et al.: Automatically traceback RDP-based targeted ransomware attacks. Wirel. Commun. Mobile Comput. (2018). https:\/\/doi.org\/10.1155\/2018\/7943586","journal-title":"Wireless Communications and Mobile Computing"},{"key":"36_CR20","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.future.2018.12.054","volume":"95","author":"Zhihong Tian","year":"2019","unstructured":"Tian, Z., Su, S., Shi, W., Yu, X., Du, X., Guizani, M.: A data-driven model for future internet route decision modeling. Future Gener. Comput. Syst. (2018). https:\/\/doi.org\/10.1016\/j.future.2018.12.054","journal-title":"Future Generation Computer Systems"},{"key":"36_CR21","doi-asserted-by":"publisher","first-page":"74854","DOI":"10.1109\/access.2018.2881422","volume":"6","author":"J Qiu","year":"2018","unstructured":"Qiu, J., Chai, Y., Liu, Y., Gu, Z., Li, S., Tian, Z.: Automatic non-taxonomic relation extraction from big data in smart city. IEEE Access 6, 74854\u201374864 (2018). https:\/\/doi.org\/10.1109\/access.2018.2881422","journal-title":"IEEE Access"},{"unstructured":"Sun, Y., Li, M., Su, S., Tian, Z., Shi, W., Han, M.: Secure data sharing framework via hierarchical greedy embedding in darknets. ACM\/Springer Mobile Networks and Applications","key":"36_CR22"},{"key":"36_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/5823439","volume":"2018","author":"Xiang Yu","year":"2018","unstructured":"Yu, X., Tian, Z., Qiu, J., Jiang, F.: A data leakage prevention method based on the reduction of confidential and context terms for smart mobile devices. Wirel. Commun. Mobile Comput. https:\/\/doi.org\/10.1155\/2018\/5823439","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"8","key":"36_CR24","doi-asserted-by":"publisher","first-page":"2440","DOI":"10.3390\/s18082440","volume":"18","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Tian, Z., Zhang, H., Su, S., Shi, W.: A privacy preserving scheme for nearest neighbor query. Sensors 18(8), 2440 (2018). https:\/\/doi.org\/10.3390\/s18082440","journal-title":"Sensors"},{"key":"36_CR25","doi-asserted-by":"publisher","first-page":"35355","DOI":"10.1109\/access.2018.2846590","volume":"6","author":"Z Tian","year":"2018","unstructured":"Tian, Z., et al.: A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access 6, 35355\u201335364 (2018). https:\/\/doi.org\/10.1109\/access.2018.2846590","journal-title":"IEEE Access"},{"issue":"2","key":"36_CR26","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1109\/JIOT.2018.2846624","volume":"6","author":"Qingfeng Tan","year":"2019","unstructured":"Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Towards a comprehensive insight into the eclipse attacks of tor hidden services. IEEE IoT J. (2018). https:\/\/doi.org\/10.1109\/jiot.2018.2846624","journal-title":"IEEE Internet of Things Journal"},{"key":"36_CR27","first-page":"1","volume":"2","author":"J Chen","year":"2018","unstructured":"Chen, J., Tian, Z., Cui, X., Yin, L., Wang, X.: Trust architecture and reputation evaluation for internet of things. J. Ambient Intell. Humaniz. Comput. 2, 1\u20139 (2018)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"1","key":"36_CR28","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1504\/ijsnet.2018.10015978","volume":"28","author":"B Wang","year":"2018","unstructured":"Wang, B., Gu, X., Yan, S.: STCS: a practical solar radiation based temperature correlation scheme in meteorological WSN. Int. J. Sens. Netw. 28(1), 22 (2018). https:\/\/doi.org\/10.1504\/ijsnet.2018.10015978","journal-title":"Int. J. Sens. Netw."},{"issue":"4","key":"36_CR29","doi-asserted-by":"publisher","first-page":"877","DOI":"10.6138\/jit.2017.18.4.20160815","volume":"8","author":"B Wang","year":"2017","unstructured":"Wang, B., Gu, X., Zhou, A.: E2S2: a code dissemination approach to energy efficiency and status surveillance for wireless sensor networks. J. Internet Technol. 8(4), 877\u2013885 (2017). https:\/\/doi.org\/10.6138\/jit.2017.18.4.20160815","journal-title":"J. Internet Technol."},{"issue":"4","key":"36_CR30","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1504\/ijsnet.2017.083532","volume":"23","author":"B Wang","year":"2017","unstructured":"Wang, B., Gu, X., Ma, L., Yan, S.: Temperature error correction based on BP neural network in meteorological WSN. Int. J. Sens. Netw. 23(4), 265\u2013278 (2017). https:\/\/doi.org\/10.1504\/ijsnet.2017.083532","journal-title":"Int. J. Sens. Netw."},{"doi-asserted-by":"crossref","unstructured":"Tan, Q., et al.: Towards a comprehensive insight into the eclipse attacks of Tor hidden services. IEEE IoT J., 1 (2018)","key":"36_CR31","DOI":"10.1109\/ICC.2017.7996832"},{"unstructured":"Zhang, H., Yi, Y., Wang, J., Cao, N., Duan, Q.: Network security situation awareness framework based on threat intelligence. In: CMC, vol. 56, no. 3, pp. 381\u2013399 (2018)","key":"36_CR32"},{"unstructured":"Hou, M., Wei, R., Wang, T., Cheng, Y., Qian, B.: Reliable medical recommendation based on privacy-preserving collaborative filtering. In: CMC, vol. 56, no. 1, pp. 137\u2013149 (2018)","key":"36_CR33"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24268-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T03:28:26Z","timestamp":1663990106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24268-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242671","9783030242688"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24268-8_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}