{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T06:49:16Z","timestamp":1776322156930,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662447734","type":"print"},{"value":"9783662447741","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44774-1_5","type":"book-chapter","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T12:50:47Z","timestamp":1412686247000},"page":"57-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":149,"title":["Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem"],"prefix":"10.1007","author":[{"given":"Marie","family":"Vasek","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Micah","family":"Thornton","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tyler","family":"Moore","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,10,8]]},"reference":[{"key":"5_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009). http:\/\/www.bitcoin.org\/bitcoin.pdf"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1038\/scientificamerican0892-96","volume":"267","author":"D Chaum","year":"1992","unstructured":"Chaum, D.: Achieving electronic privacy. Sci. Am. 267, 96\u2013101 (1992)","journal-title":"Sci. Am."},{"key":"5_CR3","unstructured":"Gallu, J.: Bitcoin Ponzi scheme alleged by SEC in lawsuit against Texas man. Bloomberg, July 2013. http:\/\/www.bloomberg.com\/news\/2013-07-23\/bitcoin-ponzi-scheme-alleged-by-sec-in-lawsuit-against-texas-man.html"},{"key":"5_CR4","unstructured":"Jeffries, A.: Suspected multi-million dollar Bitcoin pyramid scheme shuts down, investors revolt. The Verge, August 2012. http:\/\/www.theverge.com\/2012\/8\/27\/3271637\/bitcoin-savings-trust-pyramid-scheme-shuts-down"},{"key":"5_CR5","unstructured":"Leyden, J.: Linode hackers escape with $${\\$}$$70k in daring Bitcoin heist. The Register, March 2012. http:\/\/www.theregister.co.uk\/2012\/03\/02\/linode_bitcoin_heist\/"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-39884-1_3","volume-title":"Financial Cryptography and Data Security","author":"T Moore","year":"2013","unstructured":"Moore, T., Christin, N.: Beware the middleman: empirical analysis of bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25\u201333. Springer, Heidelberg (2013)"},{"key":"5_CR7","unstructured":"Leyden, J.: How mystery DDoSers tried to take down Bitcoin exchange with 100Gbps crapflood. The Register, October 2013. http:\/\/www.theregister.co.uk\/2013\/10\/17\/bitcoin_exchange_ddos_flood\/"},{"key":"5_CR8","series-title":"LNCS","first-page":"72","volume-title":"FC 2014 Workshops","author":"B Johnson","year":"2014","unstructured":"Johnson, B., Laszka, A., Grossklags, J., Vasek, M., Moore, T.: Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 72\u201386. Springer, Heidelberg (2014)"},{"key":"5_CR9","unstructured":"Bitcoin Wiki: Trade. https:\/\/en.bitcoin.it\/wiki\/Trade. Accessed 21 Nov 2013"},{"key":"5_CR10","unstructured":"Bitcoin Wiki: Category: Pool operators. https:\/\/en.bitcoin.it\/wiki\/Category:Pool_Operators. Accessed 21 Nov 2013"},{"key":"5_CR11","unstructured":"CloudFlare: Cloudflare IP ranges. http:\/\/www.cloudflare.com\/ips. Accessed 21 Nov 2013"},{"key":"5_CR12","unstructured":"Harel, U.: Restricting direct access to your website (Incapsula\u2019s IP addresses). http:\/\/support.incapsula.com\/hc\/en-us\/articles\/200627570-Restricting-direct-access-to-your-website-Incapsula-s-IP-addresses-. Accessed 15 Jan 2014"},{"key":"5_CR13","unstructured":"Amazon Web Services: Announcement: Amazon EC2 public IP ranges. https:\/\/forums.aws.amazon.com\/ann.jspa?annID=1701. Accessed 21 Nov 2013"},{"key":"5_CR14","unstructured":"organofcorti: MTGOX volume post Dwolla: a single statistical test, Neighbourhood Pool Watch, July 2013. http:\/\/organofcorti.blogspot.com\/2013\/07\/114-mtgox-volume-post-dwolla-single.html"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full Bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of Bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, ser. IMC 2013, pp. 127\u2013140. ACM, New York (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"M\u00f6ser, M., B\u00f6hme, R., Breuker, D.: An inquiry into money laundering tools in the Bitcoin ecosystem. In: 8th APWG eCrime Researchers Summit. IEEE (2013)","DOI":"10.1109\/eCRS.2013.6805780"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International Conference on the World Wide Web, International World Wide Web Conferences Steering Committee, pp. 213\u2013224 (2013)","DOI":"10.1145\/2488388.2488408"},{"key":"5_CR19","unstructured":"Zuckerman, E., Roberts, H., McGrady, R., York, J., Palfrey, J.G.: 2010 report on distributed denial of service (DDoS) attacks. Technical report 2010-16, Berkman Center Research Publication (2010). http:\/\/ssrn.com\/abstract=1872065"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-32946-3_29","volume-title":"Financial Cryptography and Data Security","author":"S Barber","year":"2012","unstructured":"Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better \u2014 how to make Bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399\u2013414. Springer, Heidelberg (2012)"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Proceedings of the 18th International Conference on Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science, vol. (to appear). Springer (2014)","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"5_CR22","unstructured":"Kroll, J., Davey, I., Felten, E.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of the Twelfth Annual Workshop on the Economics of Information Security (WEIS 2013), Washington, DC, June 2013"},{"key":"5_CR23","unstructured":"Rosenfeld, M.: Analysis of hashrate-based double-spending (2012). https:\/\/bitcoil.co.il\/Doublespend.pdf"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44774-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T04:09:59Z","timestamp":1675829399000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44774-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662447734","9783662447741"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44774-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}