{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T06:27:55Z","timestamp":1761719275414,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031562518"},{"type":"electronic","value":"9783031562525"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56252-5_3","type":"book-chapter","created":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T06:51:26Z","timestamp":1710831086000},"page":"37-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["On the\u00a0Dark Side of\u00a0the\u00a0Coin: Characterizing Bitcoin Use for\u00a0Illicit Activities"],"prefix":"10.1007","author":[{"given":"Hampus","family":"Rosenquist","sequence":"first","affiliation":[]},{"given":"David","family":"Hasselquist","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Arlitt","sequence":"additional","affiliation":[]},{"given":"Niklas","family":"Carlsson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,20]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Proceedings of Financial Cryptography and Data Security (FC) (2013)","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"3_CR2","unstructured":"Australian Cyber Security Centre: Sextortion email campaign impacting Australians (2020). https:\/\/www.cyber.gov.au\/about-us\/alerts\/sextortion-email-campaign-impacting-australians. Accessed 17 May 2023"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I.: Bitcoin over tor isn\u2019t a good idea. In: Proceedings of IEEE Symposium on Security and Privacy (S &P) (2015)","DOI":"10.1109\/SP.2015.15"},{"key":"3_CR4","unstructured":"BitcoinAbuse: Bitcoin Abuse Database (2023). https:\/\/www.bitcoinabuse.com. Accessed 08 May 2023"},{"key":"3_CR5","unstructured":"Blockchain: Blockchain Developer APIs (2023). https:\/\/www.blockchain.com\/explorer\/api. Accessed 25 May 2023"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J.A., Felten, E.W.: Mixcoin: anonymity for bitcoin with accountable mixes. In: Proceedings of Financial Cryptography and Data Security (FC) (2014)","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.forsciint.2016.02.045","volume":"264","author":"J Bros\u00e9us","year":"2016","unstructured":"Bros\u00e9us, J., Rhumorbarbe, D., Mireault, C., Ouellette, V., Crispino, F., D\u00e9cary-H\u00e9tu, D.: Studying illicit drug trafficking on darknet markets: structure and organisation from a Canadian perspective. Forensic Sci. Int. 264, 7\u201314 (2016)","journal-title":"Forensic Sci. Int."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of World Wide Web (WWW) (2013)","DOI":"10.21236\/ADA579383"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.cose.2018.08.008","volume":"79","author":"M Conti","year":"2018","unstructured":"Conti, M., Gangwal, A., Ruj, S.: On the economic significance of ransomware campaigns: a bitcoin transactions perspective. Comput. Secur. 79, 162\u2013189 (2018)","journal-title":"Comput. Secur."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Gomez, G., Moreno-Sanchez, P., Caballero, J.: Watch your back: identifying cybercrime financial relationships in bitcoin through back-and-forth exploration. In: Proceedings of ACM Computer and Communications Security (CCS) (2022)","DOI":"10.1145\/3548606.3560587"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Harrigan, M., Fretter, C.: The unreasonable effectiveness of address clustering. In: Proceedings of UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld (2016)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0071"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Herrera-Joancomart\u00ed, J.: Research and challenges on bitcoin anonymity. In: Proceedings of Workshop on Data Privacy Management (DPM) (2015)","DOI":"10.1007\/978-3-319-17016-9_1"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Huang, D.Y., et al.: Tracking ransomware end-to-end. In: Proceedings of IEEE Symposium on Security and Privacy (S &P) (2018)","DOI":"10.1109\/SP.2018.00047"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Huang, D.Y., et al.: Botcoin: monetizing stolen cycles. In: Proceedings of Network and Distributed System Security Symposium (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23044"},{"key":"3_CR15","unstructured":"International Monetary Fund: IMF.org (2023). Accessed 15 Oct 2023"},{"key":"3_CR16","unstructured":"Investing.com: Bitcoin Historical Data (2023). https:\/\/www.investing.com\/crypto\/bitcoin\/historical-data. Accessed 17 May 2023"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the gordian knot: a look under the hood of ransomware attacks. In: Proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) (2015)","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Lee, S., et al.: Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web. In: Proceedings of Network and Distributed System Security Symposium (NDSS) (2019)","DOI":"10.14722\/ndss.2019.23055"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Li, X., Yepuri, A., Nikiforakis, N.: Double and nothing: understanding and detecting cryptocurrency giveaway scams. In: Proceedings of Network and Distributed System Security Symposium (NDSS) (2023)","DOI":"10.14722\/ndss.2023.24584"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Liao, K., Zhao, Z., Doup\u00e9, A., Ahn, G.J.: Behind closed doors: measurement and analysis of cryptolocker ransoms in bitcoin. In: Proceedings of Electronic Crime Research (eCrime) (2016)","DOI":"10.1109\/ECRIME.2016.7487938"},{"issue":"253","key":"3_CR21","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1080\/01621459.1951.10500769","volume":"46","author":"FJ Massey Jr","year":"1951","unstructured":"Massey, F.J., Jr.: The Kolmogorov-Smirnov test for goodness of fit. J. Am. Stat. Assoc. 46(253), 68\u201378 (1951)","journal-title":"J. Am. Stat. Assoc."},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of ACM Internet Measurement Conference (IMC) (2016)","DOI":"10.1145\/2896384"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"M\u00f6ser, M., B\u00f6hme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: Proceedings of APWG eCrime Researchers Summit (2013)","DOI":"10.1109\/eCRS.2013.6805780"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Myung, I.J.: Tutorial on maximum likelihood estimation. J. Math. Psychol. (2003)","DOI":"10.1016\/S0022-2496(02)00028-7"},{"key":"3_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13278-019-0612-8","volume":"10","author":"F Oggier","year":"2020","unstructured":"Oggier, F., Datta, A., Phetsouvanh, S.: An ego network analysis of sextortionists. Soc. Netw. Anal. Mining 10, 1\u201314 (2020)","journal-title":"Soc. Netw. Anal. Mining"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Paquet-Clouston, M., Romiti, M., Haslhofer, B., Charvat, T.: Spams meet cryptocurrencies: Sextortion in the bitcoin ecosystem. In: Proceedings of ACM Advances in Financial Technologies (AFT) (2019)","DOI":"10.1145\/3318041.3355466"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Pastrana, S., Hutchings, A., Thomas, D., Tapiador, J.: Measuring ewhoring. In: Proceedings of ACM Internet Measurement Conference (IMC) (2019)","DOI":"10.1145\/3355369.3355597"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Pastrana, S., Suarez-Tangil, G.: A first look at the crypto-mining malware ecosystem: a decade of unrestricted wealth. In: Proceedings of ACM Internet Measurement Conference (IMC) (2019)","DOI":"10.1145\/3355369.3355576"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Pletinckx, S., Trap, C., Doerr, C.: Malware coordination using the blockchain: an analysis of the cerber ransomware. In: Proceedings of IEEE Communications and Network Security (CNS) (2018)","DOI":"10.1109\/CNS.2018.8433199"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Portnoff, R.S., Huang, D.Y., Doerfler, P., Afroz, S., McCoy, D.: Backpage and bitcoin: uncovering human traffickers. In: Proceedings of Knowledge Discovery and Data Mining (KDD) (2017)","DOI":"10.1145\/3097983.3098082"},{"key":"3_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4139-7_10","volume-title":"An Analysis of Anonymity in the Bitcoin System","author":"F Reid","year":"2013","unstructured":"Reid, F., Harrigan, M.: An Analysis of Anonymity in the Bitcoin System. Springer, Heidelberg (2013)"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Ron, D., Shamir, A.: How did dread pirate roberts acquire and protect his bitcoin wealth? In: Proceedings of Financial Cryptography and Data Security (FC) (2014)","DOI":"10.1007\/978-3-662-44774-1_1"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Ruffing, T., Moreno-Sanchez, P., Kate, A.: Coinshuffle: practical decentralized coin mixing for bitcoin. In: Proceedings of ESORICS (2014)","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"3_CR34","unstructured":"Small, B.: Scam emails demand Bitcoin, threaten blackmail \u2013 consumer.ftc.gov (2020). https:\/\/consumer.ftc.gov\/consumer-alerts\/2020\/04\/scam-emails-demand-bitcoin-threaten-blackmail. Accessed 17 May 2023"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Spagnuolo, M., Maggi, F., Zanero, S.: Bitiodine: extracting intelligence from the bitcoin network. In: Proceedings of Financial Cryptography and Data Security (FC) (2014)","DOI":"10.1007\/978-3-662-45472-5_29"},{"key":"3_CR36","unstructured":"Staugh, G.: Bull capital trading review 2022: 5 disturbing facts about bullcapitaltrading.com (2023). https:\/\/www.forexbrokerz.com\/brokers\/bull-capital-trading-review. Accessed 2 Nov 2023"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Taniguchi, T., Griffioen, H., Doerr, C.: Analysis and takeover of the bitcoin-coordinated pony malware. In: Proceedings ACM Asia Computer and Communications Security (ASIACCS) (2021)","DOI":"10.1145\/3433210.3437520"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Tekiner, E., Acar, A., Uluagac, A.S., Kirda, E., Selcuk, A.A.: SoK: cryptojacking malware. In: Proceedings of IEEE European Symposium on Security and Privacy (EuroS &P) (2021)","DOI":"10.1109\/EuroSP51992.2021.00019"},{"key":"3_CR39","unstructured":"U.S. Bureau of Economic Analysis (BEA): GDP by State (2023). https:\/\/www.bea.gov\/data\/gdp\/gdp-state. Accessed 15 Oct 2023"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Valenta, L., Rowan, B.: Blindcoin: blinded, accountable mixes for bitcoin. In: Proceedings of Financial Cryptography and Data Security (FC) (2015)","DOI":"10.1007\/978-3-662-48051-9_9"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Vu, A.V., et al.: Turning up the dial: the evolution of a cybercrime market through set-up, stable, and covid-19 eras. In: Proceedings of ACM Internet Measurement Conference (IMC) (2020)","DOI":"10.1145\/3419394.3423636"},{"issue":"2","key":"3_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3494557","volume":"16","author":"K Wang","year":"2021","unstructured":"Wang, K., et al.: A large-scale empirical analysis of ransomware activities in bitcoin. ACM Trans. Web 16(2), 1\u201329 (2021)","journal-title":"ACM Trans. Web"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56252-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T06:57:47Z","timestamp":1710831467000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56252-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031562518","9783031562525"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56252-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"20 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pam2024.cs.northwestern.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.42","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}