{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T16:30:12Z","timestamp":1758126612637,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":61,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811680588"},{"type":"electronic","value":"9789811680595"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_2","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"18-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Conceptual Model to Identify Illegal Activities on the Bitcoin System"],"prefix":"10.1007","author":[{"given":"Khaled Gubran","family":"Al-Hashedi","sequence":"first","affiliation":[]},{"given":"Pritheega","family":"Magalingam","sequence":"additional","affiliation":[]},{"given":"Nurazean","family":"Maarop","sequence":"additional","affiliation":[]},{"given":"Ganthan Narayana","family":"Samy","sequence":"additional","affiliation":[]},{"given":"Azizah Abdul","family":"Manaf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"100402","DOI":"10.1016\/j.cosrev.2021.100402","volume":"40","author":"KG Al-Hashedi","year":"2021","unstructured":"Al-Hashedi, K.G., Magalingam, P.: Financial fraud detection applying data mining techniques: a comprehensive review from 2009 to 2019. Comput. Sci. Rev. 40, 100402 (2021). https:\/\/doi.org\/10.1016\/j.cosrev.2021.100402","journal-title":"Comput. Sci. Rev."},{"key":"2_CR2","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"2_CR3","unstructured":"Khalilov, M.C.K., Levi, A.: A survey on anonymity and privacy in Bitcoin-like digital cash systems. IEEE Commun. Surv. Tutorials (2018)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Irwin, A.S., Turner, A.B.: Illicit Bitcoin transactions: challenges in getting to the who, what, when and where. J. Money Laundering Control (2018)","DOI":"10.1108\/JMLC-07-2017-0031"},{"key":"2_CR5","unstructured":"Hill, A.: Bitcoin: Is Cryptocurrency Viable? (2014)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., et al.: A fistful of Bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127\u2013140. ACM (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"22385","DOI":"10.1109\/ACCESS.2017.2759766","volume":"5","author":"LVD Horst","year":"2017","unstructured":"Horst, L.V.D., Choo, K.K.R., Le-Khac, N.A.: Process memory investigation of the Bitcoin clients electrum and Bitcoin core. IEEE Access 5, 22385\u201322398 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2759766","journal-title":"IEEE Access"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 213\u2013224. ACM (2013)","DOI":"10.1145\/2488388.2488408"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Baravalle, A., Lopez, M.S., Lee, S.W.: Mining the dark web: drugs and fake ids. In: 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), pp. 350\u2013356 (2016)","DOI":"10.1109\/ICDMW.2016.0056"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Monamo, P., Marivate, V., Twala, B.: Unsupervised learning for robust Bitcoin fraud detection. In: Information Security for South Africa (ISSA), pp. 129\u2013134. IEEE (2016)","DOI":"10.1109\/ISSA.2016.7802939"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-662-44774-1_5","volume-title":"Financial Cryptography and Data Security","author":"M Vasek","year":"2014","unstructured":"Vasek, M., Thornton, M., Moore, T.: Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 57\u201371. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_5"},{"key":"2_CR12","first-page":"837","volume":"18","author":"A Walch","year":"2015","unstructured":"Walch, A.: The Bitcoin blockchain as financial market infrastructure: a consideration of operational risk. NYUJ Legis. Pub. Pol\u2019y 18, 837 (2015)","journal-title":"NYUJ Legis. Pub. Pol\u2019y"},{"key":"2_CR13","first-page":"271","volume":"90","author":"KV Tu","year":"2015","unstructured":"Tu, K.V., Meredith, M.W.: Rethinking virtual currency regulation in the Bitcoin age. Wash. L. Rev. 90, 271 (2015)","journal-title":"Wash. L. Rev."},{"key":"2_CR14","unstructured":"Zambre, D., Shah, A.: Analysis of Bitcoin network dataset for fraud. Unpublished Report (2013)"},{"key":"2_CR15","unstructured":"Jobse, F.: Detecting suspicious behavior in the Bitcoin network. Tilburg University (2017)"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-662-44774-1_2","volume-title":"Financial Cryptography and Data Security","author":"M M\u00f6ser","year":"2014","unstructured":"M\u00f6ser, M., B\u00f6hme, R., Breuker, D.: Towards risk scoring of Bitcoin transactions. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 16\u201332. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_2"},{"key":"2_CR17","unstructured":"Marcin, S.I.: Bitcoin live: scalable system for detecting Bitcoin network behaviors in real time (2015)"},{"key":"2_CR18","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-981-15-9213-3_8","volume-title":"Blockchain and Trustworthy Systems","author":"Y Li","year":"2020","unstructured":"Li, Y., Cai, Y., Tian, H., Xue, G., Zheng, Z.: Identifying illicit addresses in Bitcoin network. In: Zheng, Z., Dai, H.-N., Fu, X., Chen, B. (eds.) BlockSys 2020. CCIS, vol. 1267, pp. 99\u2013111. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-9213-3_8"},{"key":"2_CR19","unstructured":"Pham, T., Lee, S.: Anomaly detection in Bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941 (2016)"},{"key":"2_CR20","unstructured":"Pham, T., Lee, S.: Anomaly Detection in the Bitcoin System-A Network Perspective. arXiv preprint arXiv:1611.03942 (2016)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Monamo, P.M., Marivate, V., Twala, B.: A multifaceted approach to Bitcoin fraud detection: global and local outliers. In: 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 188\u2013194 IEEE (2016)","DOI":"10.1109\/ICMLA.2016.0039"},{"key":"2_CR22","unstructured":"Bitcoin Abuse: Bitcoin Abuse Database (2021). Accessed 1 July 2021"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Turner, A., Irwin, A.S.M.: Bitcoin transactions: a digital discovery of illicit activity on the blockchain. J. Finan. Crime (2018)","DOI":"10.1108\/JFC-12-2016-0078"},{"issue":"6","key":"2_CR24","doi-asserted-by":"publisher","first-page":"3824","DOI":"10.1007\/s10489-020-02048-w","volume":"51","author":"P Nerurkar","year":"2021","unstructured":"Nerurkar, P., Bhirud, S., Patel, D., Ludinard, R., Busnel, Y., Kumari, S.: Supervised learning model for Identifying illegal activities in Bitcoin. Appl. Intell. 51(6), 3824\u20133843 (2021)","journal-title":"Appl. Intell."},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Yang, L., Dong, X., Xing, S., Zheng, J., Gu, X., Song, X.: An abnormal transaction detection mechanim on Bitcoin. In: 2019 International Conference on Networking and Network Applications (NaNA), pp. 452\u2013457 IEEE (2019)","DOI":"10.1109\/NaNA.2019.00083"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-030-20074-9_13","volume-title":"Information Security Theory and Practice","author":"BB Zarpel\u00e3o","year":"2019","unstructured":"Zarpel\u00e3o, B.B., Miani, R.S., Rajarajan, M.: Detection of Bitcoin-based botnets using a one-class classifier. In: Blazy, O., Yeun, C.Y. (eds.) WISTP 2018. LNCS, vol. 11469, pp. 174\u2013189. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20074-9_13"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Liao, K., Zhao, Z., Doup\u00e9, A., Ahn, G.-J.: Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin. In: 2016 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201313. IEEE (2016)","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"2_CR28","unstructured":"Zhang, Z., Zhou, T., Xie, Z.: BITSCOPE: scaling Bitcoin address deanonymization using multi-resolution clustering. In: Proceedings of the 51st Hawaii International Conference on System Sciences (2018)"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Pes, B., Serusi, S.: Data mining for detecting Bitcoin Ponzi schemes. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 75\u201384. IEEE (2018)","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Lin, Y.-J., Wu, P.-W., Hsu, C.-H., Tu, I.-P., Liao, S.-W.: An evaluation of Bitcoin address classification based on transaction history summarization. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 302\u2013310. IEEE (2019)","DOI":"10.1109\/BLOC.2019.8751410"},{"key":"2_CR31","unstructured":"Janze, C.: Are cryptocurrencies criminals best friends? Examining the co-evolution of Bitcoin and darknet markets (2017)"},{"issue":"2","key":"2_CR32","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1257\/jep.29.2.213","volume":"29","author":"R B\u00f6hme","year":"2015","unstructured":"B\u00f6hme, R., Christin, N., Edelman, B., Moore, T.: Bitcoin: economics, technology, and governance. J. Econ. Perspect. 29(2), 213\u2013238 (2015)","journal-title":"J. Econ. Perspect."},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Conti, M., Kumar, S., Lal, C., Ruj, S.: A survey on security and privacy issues of Bitcoin. IEEE Commun. Surv. Tutorials (2018)","DOI":"10.1109\/COMST.2018.2842460"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Yin, H.S., Vatrapu, R.: A first estimation of the proportion of cybercriminal entities in the Bitcoin ecosystem using supervised machine learning. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 3690\u20133699. IEEE (2017)","DOI":"10.1109\/BigData.2017.8258365"},{"key":"2_CR35","unstructured":"Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of WEIS, p. 11 (2013)"},{"key":"2_CR36","unstructured":"Courtois, N.T., Bahack, L.: On subversive miner strategies and block withholding attack in Bitcoin digital currency. arXiv preprint arXiv:1402.1718 (2014)"},{"issue":"7","key":"2_CR37","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/3212998","volume":"61","author":"I Eyal","year":"2018","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61(7), 95\u2013102 (2018)","journal-title":"Commun. ACM"},{"key":"2_CR38","unstructured":"Bahack, L.: Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft). arXiv preprint arXiv:1312.7013 (2013)"},{"key":"2_CR39","unstructured":"Rosenfeld, M.: Analysis of Bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980 (2011)"},{"issue":"8","key":"2_CR40","doi-asserted-by":"publisher","first-page":"1967","DOI":"10.1109\/TIFS.2016.2623588","volume":"12","author":"S Bag","year":"2017","unstructured":"Bag, S., Ruj, S., Sakurai, K.: Bitcoin block withholding attack: analysis and mitigation. IEEE Trans. Inf. Forensics Secur. 12(8), 1967\u20131978 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Karame, G.O., Androulaki, E., Capkun, S.: Double-spending fast payments in Bitcoin. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 906\u2013917. ACM (2012)","DOI":"10.1145\/2382196.2382292"},{"key":"2_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-319-11212-1_18","volume-title":"Computer Security - ESORICS 2014","author":"C Decker","year":"2014","unstructured":"Decker, C., Wattenhofer, R.: Bitcoin transaction malleability and MtGox. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 313\u2013326. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11212-1_18"},{"key":"2_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-662-48051-9_1","volume-title":"Financial Cryptography and Data Security","author":"M Andrychowicz","year":"2015","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, \u0141: On the malleability of Bitcoin transactions. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 1\u201318. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48051-9_1"},{"key":"2_CR44","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-662-44774-1_6","volume-title":"Financial Cryptography and Data Security","author":"B Johnson","year":"2014","unstructured":"Johnson, B., Laszka, A., Grossklags, J., Vasek, M., Moore, T.: Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) Financial Cryptography and Data Security, pp. 72\u201386. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_6"},{"key":"2_CR45","doi-asserted-by":"crossref","unstructured":"Kondor, D., Csabai, I., Sz\u00fcle, J., P\u00f3sfai, M., Vattay, G.: Inferring the interplay between network structure and market effects in Bitcoin. New J. Phys. 16(12), 125003 (2014)","DOI":"10.1088\/1367-2630\/16\/12\/125003"},{"key":"2_CR46","unstructured":"Neo4j Graph Platform: Neo4j Graph Platform \u2013 The Leader in Graph Databases (2021). Accessed 1 June 2021"},{"key":"2_CR47","doi-asserted-by":"crossref","unstructured":"Magalingam, P., Rao, A., Davis, S.: Identifying a criminal\u2019s network of trust. In: 2014 Tenth International Conference on Signal-Image Technology and Internet-Based Systems, pp. 309\u2013316 (2014)","DOI":"10.1109\/SITIS.2014.64"},{"key":"2_CR48","doi-asserted-by":"crossref","unstructured":"Paquet-Clouston, M., Haslhofer, B., Dupont, B.: Ransomware payments in the Bitcoin ecosystem. J. Cybersecur. 5(1), tyz003 (2019)","DOI":"10.1093\/cybsec\/tyz003"},{"key":"2_CR49","unstructured":"Weber, M., et al.: Anti-money laundering in Bitcoin: experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591 (2019)"},{"key":"2_CR50","doi-asserted-by":"crossref","unstructured":"Bahnsen, A.C., Aouada, D., Stojanovic, A., Ottersten, B.: Detecting credit card fraud using periodic features. In: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp. 208\u2013213. IEEE (2015)","DOI":"10.1109\/ICMLA.2015.28"},{"key":"2_CR51","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.eswa.2015.12.030","volume":"51","author":"AC Bahnsen","year":"2016","unstructured":"Bahnsen, A.C., Aouada, D., Stojanovic, A., Ottersten, B.: Feature engineering strategies for credit card fraud detection. Expert Syst. Appl. 51, 134\u2013142 (2016)","journal-title":"Expert Syst. Appl."},{"key":"2_CR52","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-44952-3_1","volume-title":"Advances in Digital Forensics X","author":"W-Y Lim","year":"2014","unstructured":"Lim, W.-Y., Sachan, A., Thing, V.: Conditional weighted transaction aggregation for credit card fraud detection. In: Peterson, G., Shenoi, S. (eds.) DigitalForensics 2014. IAICT, vol. 433, pp. 3\u201316. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44952-3_1"},{"key":"2_CR53","unstructured":"Ke, G., et al.: LightGBM: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems, vol. 30, pp. 3146\u20133154 (2017)"},{"issue":"1","key":"2_CR54","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"issue":"4","key":"2_CR55","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst, M.A., Dumais, S.T., Osuna, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Intell. Syst. Appl. 13(4), 18\u201328 (1998)","journal-title":"IEEE Intell. Syst. Appl."},{"issue":"2004","key":"2_CR56","first-page":"41","volume":"2","author":"S Haykin","year":"2004","unstructured":"Haykin, S., Network, N.: A comprehensive foundation. Neural Netw. 2(2004), 41 (2004)","journal-title":"Neural Netw."},{"issue":"3","key":"2_CR57","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1029\/95WR02966","volume":"32","author":"U Lall","year":"1996","unstructured":"Lall, U., Sharma, A.: A nearest neighbor bootstrap for resampling hydrologic time series. Water Resour. Res. 32(3), 679\u2013693 (1996)","journal-title":"Water Resour. Res."},{"key":"2_CR58","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)"},{"key":"2_CR59","doi-asserted-by":"crossref","unstructured":"Devi, D., Biswas, S.K., Purkayastha, B.: A boosting based adaptive oversampling technique for treatment of class imbalance. In: 2019 International Conference on Computer Communication and Informatics (ICCCI), pp. 1\u20137 (2019)","DOI":"10.1109\/ICCCI.2019.8821947"},{"key":"2_CR60","doi-asserted-by":"crossref","unstructured":"Subudhi, S., Panigrahi, S.: Effect of class imbalanceness in detecting automobile insurance fraud. In: 2018 2nd International Conference on Data Science and Business Analytics (ICDSBA), pp. 528\u2013531. IEEE (2018)","DOI":"10.1109\/ICDSBA.2018.00104"},{"key":"2_CR61","doi-asserted-by":"crossref","unstructured":"Haibo, H., Yang, B., Garcia, E.A., Shutao, L.: ADASYN: adaptive synthetic sampling approach for imbalanced learning. In: 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), pp. 1322\u20131328 (2008)","DOI":"10.1109\/IJCNN.2008.4633969"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T15:49:21Z","timestamp":1726242561000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}