{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T03:13:57Z","timestamp":1775272437798,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319721491","type":"print"},{"value":"9783319721507","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T00:00:00Z","timestamp":1511740800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72150-7_14","type":"book-chapter","created":{"date-parts":[[2017,11,26]],"date-time":"2017-11-26T08:21:29Z","timestamp":1511684489000},"page":"166-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Tracking Bitcoin Users Activity Using Community Detection on a Network of Weak Signals"],"prefix":"10.1007","author":[{"given":"Cazabet","family":"Remy","sequence":"first","affiliation":[]},{"given":"Baccour","family":"Rym","sequence":"additional","affiliation":[]},{"given":"Latapy","family":"Matthieu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,27]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: International Conference on Financial Cryptography and Data Security, pp. 34\u201351. Springer (2013)","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin p2p network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 15\u201329. ACM (2014)","DOI":"10.1145\/2660267.2660379"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 2008(10), P10008 (2008)","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Cazabet, R., Amblard, F.: Dynamic community detection. In: Encyclopedia of Social Network Analysis and Mining, pp. 404\u2013414. Springer (2014)","DOI":"10.1007\/978-1-4614-6170-8_383"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: Analysis and applications. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 281\u2013310. Springer (2015)","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Harrigan, M., Fretter, C.: The unreasonable effectiveness of address clustering. In: 2016 International IEEE Conferences, Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld), 2016 Intl IEEE Conferences, pp. 368\u2013373. IEEE (2016)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0071"},{"issue":"3","key":"14_CR7","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.physrep.2012.03.001","volume":"519","author":"P Holme","year":"2012","unstructured":"Holme, P., Saram\u00e4ki, J.: Temporal networks. Phys. Rep. 519(3), 97\u2013125 (2012)","journal-title":"Phys. Rep."},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839\u2013858. IEEE (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Lancichinetti, A., Fortunato, S., Kert\u00e9sz, J.: Detecting the overlapping and hierarchical community structure in complex networks. New J. Phys. 11(3), 033015 (2009)","DOI":"10.1088\/1367-2630\/11\/3\/033015"},{"issue":"1","key":"14_CR10","doi-asserted-by":"crossref","first-page":"7","DOI":"10.3390\/fi8010007","volume":"8","author":"M Lischke","year":"2016","unstructured":"Lischke, M., Fabian, B.: Analyzing the bitcoin network: the first four years. Futur. Internet 8(1), 7 (2016)","journal-title":"Futur. Internet"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 conference on Internet measurement conference, pp. 127\u2013140. ACM (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Monaco, J.V.: Identifying bitcoin users by transaction behavior. In: International Society for Optics and Photonics, SPIE Defense+ Security, pp. 945704\u2013945704 (2015)","DOI":"10.1117\/12.2177039"},{"key":"14_CR13","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Security and privacy in social networks, pp. 197\u2013223. Springer (2013)","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Spagnuolo, M., Maggi, F., Zanero, S.: Bitiodine: Extracting intelligence from the bitcoin network. In: International Conference on Financial Cryptography and Data Security, pp. 457\u2013468. Springer (2014)","DOI":"10.1007\/978-3-662-45472-5_29"},{"key":"14_CR16","unstructured":"Vinh, N.X., Epps, J., Bailey, J.: Information theoretic measures for clusterings comparison: Variants, properties, normalization and correction for chance. J. Mach. Learn. Res. 11, 2837\u20132854 (2010)"}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72150-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T17:00:32Z","timestamp":1570381232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72150-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,27]]},"ISBN":["9783319721491","9783319721507"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72150-7_14","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,27]]}}}