{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T00:17:09Z","timestamp":1769300229295,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030347055","type":"print"},{"value":"9783030347062","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,12,15]],"date-time":"2019-12-15T00:00:00Z","timestamp":1576368000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-34706-2_10","type":"book-chapter","created":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T12:05:52Z","timestamp":1576325152000},"page":"191-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain"],"prefix":"10.1007","author":[{"given":"Michal","family":"Kedziora","sequence":"first","affiliation":[]},{"given":"Aleksander","family":"Gorka","sequence":"additional","affiliation":[]},{"given":"Aleksander","family":"Marianski","sequence":"additional","affiliation":[]},{"given":"Ireneusz","family":"Jozwiak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,15]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Feng WC, Kaiser E, Schluessler T (2008). Stealth measurements for cheat detection in on-line games. In: Proceedings of the 7th ACM SIGCOMM workshop on network and system support for games. ACM, pp 15\u201320","DOI":"10.1145\/1517494.1517497"},{"issue":"6","key":"10_CR2","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.13089\/JKIISC.2015.25.6.1361","volume":"25","author":"GI Heo","year":"2015","unstructured":"Heo GI, Heo CI, Kim HK (2015) A study on mobile game security threats by analyzing malicious behavior of auto program of clash of clans. J Korea Inst Inf Secur Cryptol 25(6):1361\u20131376","journal-title":"J Korea Inst Inf Secur Cryptol"},{"key":"10_CR3","unstructured":"Bremer J (2013) Automated analysis and deobfuscation of android apps & malware. Freelance Security Researcher"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Consalvo M (2007) Cheating: gaining advantage in videogames. Massachusetts Institute of Technology, pp 5\u20138","DOI":"10.7551\/mitpress\/1802.001.0001"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"McGraw G, Hoglund G (2007) Online games and security. In: IEEE Security & Privacy, vol 5, no 5, pp 76\u201379","DOI":"10.1109\/MSP.2007.116"},{"key":"10_CR6","unstructured":"Joshi R Cheating and virtual crimes in massively multiplayer online games. Royal University of London"},{"key":"10_CR7","unstructured":"Tolbaru SA (2011) Cheating in online video games, University of Copenhagen, Datalogisk Institut, 15 Aug 2011"},{"key":"10_CR8","unstructured":"Yeung SF, Lui JCS, Liu J, Yan J (2006) Detecting cheaters for multiplayer games: theory, design and implementation 1178\u20131182"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Yan J, Randell B (2005) A systematic classification of cheating in online games. In: Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games. ACM","DOI":"10.1145\/1103599.1103606"},{"issue":"3","key":"10_CR10","doi-asserted-by":"publisher","first-page":"177","DOI":"10.7583\/JKGS.2015.15.3.177","volume":"15","author":"JK Park","year":"2015","unstructured":"Park JK, Han ML, Kim HK (2015) A study of cheater detection in FPS game by using user log analysis. J Korea Game Soc 15(3):177\u2013188","journal-title":"J Korea Game Soc"},{"key":"10_CR11","unstructured":"Ahn D, Yoo B (2017). A study of cheating identification and measurement of the effect in online game"},{"key":"10_CR12","unstructured":"Raymond E (1999) The case of the quake cheats, Unpublished manuscript"},{"key":"10_CR13","unstructured":"Baughman N, Levine B (2001) Cheat-proof playout for centralized and distributed online games. In: Proceedings of the twentieth IEEE INFOCOM conference"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Li K, Ding S, McCreary D (2004) Analysis of state exposure control to prevent cheating in online games. In: The 14th ACM international workshop on network and operating systems support for digital audio and video (NOSSDAV)","DOI":"10.1145\/1005847.1005878"},{"key":"10_CR15","unstructured":"Cano N (2016) Game hacking: developing autonomous bots for online games. No Starch Press"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Olleros FX, Zhegu M (2016) Research handbook on digital transformations, Edward Elgar Publishing","DOI":"10.4337\/9781784717766"},{"key":"10_CR17","unstructured":"Swan M (2015) Blockchain: Blueprint for a new economy, O\u2019Reilly Media"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data. In: Security and privacy workshops (SPW), 2015. IEEE, pp 180\u2013184","DOI":"10.1109\/SPW.2015.27"},{"key":"10_CR19","unstructured":"McDonald J (Valve), Using deep learning to combat cheating in CSGO"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Data-Centric Business and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34706-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T06:21:37Z","timestamp":1613110897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34706-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,15]]},"ISBN":["9783030347055","9783030347062"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34706-2_10","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,15]]},"assertion":[{"value":"15 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}