{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T04:10:44Z","timestamp":1763007044360,"version":"3.45.0"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819530540","type":"print"},{"value":"9789819530557","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3055-7_13","type":"book-chapter","created":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T04:07:31Z","timestamp":1763006851000},"page":"162-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TIEBN: An Eigenvalue-Driven Blockchain Network for\u00a0Anomaly Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-2128-3693","authenticated-orcid":false,"given":"Grace Mupoyi","family":"Ntuala","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7014-6417","authenticated-orcid":false,"given":"Jianbin","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6497-1373","authenticated-orcid":false,"given":"Patrick","family":"Mukala","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2245-2588","authenticated-orcid":false,"given":"Qi","family":"Xia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5301-7521","authenticated-orcid":false,"given":"Ansu","family":"Badjie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5265-2865","authenticated-orcid":false,"given":"Godfred","family":"Doe","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9851-666X","authenticated-orcid":false,"given":"Hu","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,14]]},"reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-981-97-5101-3_5","volume-title":"Information Security and Privacy - ACISP 2024","author":"Y Lin","year":"2024","unstructured":"Lin, Y., et al.: CrossAAD: cross-chain abnormal account detection. In: Zhu, T., Li, Y. (eds.) ACISP 2024. LNCS, vol. 14897, pp. 84\u2013104. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-97-5101-3_5"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-031-22301-3_22","volume-title":"Information Security and Privacy - ACISP 2022","author":"X Wu","year":"2022","unstructured":"Wu, X., et al.: CCOM: cost-efficient and collusion-resistant oracle mechanism for smart contracts. In: Nguyen, K., Yang, G., Guo, F., Susilo, W. (eds.) ACISP 2022. LNCS, vol. 13494, pp. 449\u2013468. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22301-3_22"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-3-031-22301-3_23","volume-title":"Information Security and Privacy - ACISP 2022","author":"S Chen","year":"2022","unstructured":"Chen, S., et al.: Dechain: a blockchain framework enhancing decentralization via sharding. In: Nguyen, K., Yang, G., Guo, F., Susilo, W. (eds.) ACISP 2022. LNCS, vol. 13494, pp. 469\u2013488. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22301-3_23"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-031-22301-3_24","volume-title":"Information Security and Privacy - ACISP 2022","author":"A Mirzaei","year":"2022","unstructured":"Mirzaei, A., et al.: Garrison: a novel watchtower scheme for bitcoin. In: Nguyen, K., Yang, G., Guo, F., Susilo, W. (eds.) ACISP 2022. LNCS, vol. 13494, pp. 489\u2013508. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22301-3_24"},{"key":"13_CR5","unstructured":"Chen, B., et al.: A comprehensive survey of blockchain scalability: shaping inner-chain and inter-chain perspectives. arXiv preprint arXiv:2409.02968 (2024)"},{"key":"13_CR6","unstructured":"Ko, H.-J., Han, S.-S.: TPS analysis, performance indicator of public blockchain scalability. J. Inf. Process. Syst. 20(1) (2024)"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/TCI.2021.3130977","volume":"7","author":"F Wu","year":"2021","unstructured":"Wu, F., Li, Y., Li, C., Wu, Y.: A fast tensor completion method based on tensor QR decomposition and tensor nuclear norm minimization. IEEE Trans. Comput. Imaging 7, 1267\u20131277 (2021)","journal-title":"IEEE Trans. Comput. Imaging"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Zhou, Q., et al.: Solutions to scalability of blockchain: a survey. IEEE Access 8, 16440\u201316455 (2020)","DOI":"10.1109\/ACCESS.2020.2967218"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Hisseine, M.A., Chen, D., Yang, X.: The application of blockchain in social media: a systematic literature review. Appl. Sci. 12(13), 6567 (2022)","DOI":"10.3390\/app12136567"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"16440","DOI":"10.1109\/ACCESS.2020.2967218","volume":"8","author":"Q Zhou","year":"2020","unstructured":"Zhou, Q., Huang, H., Zheng, Z., Bian, J.: Solutions to scalability of blockchain: a survey. IEEE Access 8, 16440\u201316455 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2967218","journal-title":"IEEE Access"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Guo, H., Yu, X.: A survey on blockchain technology and its security. Blockchain: Res. Appl. 3(2), 100067 (2022)","DOI":"10.1016\/j.bcra.2022.100067"},{"key":"13_CR12","unstructured":"Rao, I.S., et al.: Scalability of blockchain: a comprehensive review and future research direction. Cluster Comput. 1\u201324 (2024)"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Gao, J., et al.: Supply chain equilibrium on a game theory-incentivized blockchain network. J. Industr. Inf. Integr. 26, 100288 (2022)","DOI":"10.1016\/j.jii.2021.100288"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"QI Xia","year":"2017","unstructured":"Xia, Q.I., et al.: MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5, 14757\u201314767 (2017)","journal-title":"IEEE Access"},{"key":"13_CR15","unstructured":"Baird, L., Harmon, M., Madsen, P.: Hedera: a public hashgraph network & governing council. In: White Paper, vol. 1, no. 1, pp. 9\u201310 (2019)"},{"issue":"1","key":"13_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00320-x","volume":"7","author":"S Thudumu","year":"2020","unstructured":"Thudumu, S., Branch, P., Jin, J., Singh, J.J.: A comprehensive survey of anomaly detection techniques for high dimensional big data. J. Big Data 7(1), 1\u201330 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00320-x","journal-title":"J. Big Data"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Nofer, M., et al.: Blockchain. Bus. Inf. Syst. Eng. 59, 183\u2013187 (2017)","DOI":"10.1007\/s12599-017-0467-3"},{"key":"13_CR18","unstructured":"Micali, S.: Algorand: the efficient and democratic ledger. arXiv preprint arXiv:1607.01341 (2016)"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/978-3-030-55304-3_35","volume-title":"Information Security and Privacy","author":"B Wang","year":"2020","unstructured":"Wang, B., Wang, Q., Chen, S., Xiang, Y.: Security analysis on tangle-based blockchain through simulation. In: Liu, J.K., Cui, H. (eds.) ACISP 2020. LNCS, vol. 12248, pp. 653\u2013663. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55304-3_35"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Ortega, A., et al.: Graph signal processing: overview, challenges, and applications. Proc. IEEE 106(5), 808\u2013828 (2018)","DOI":"10.1109\/JPROC.2018.2820126"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Vuji\u010di\u0107, D., Jagodi\u0107, D., Ran\u0111i\u0107, S.: Blockchain technology, bitcoin, and Ethereum: a brief overview. In: 2018 17th International Symposium Infoteh-Jahorina (infoteh). IEEE (2018)","DOI":"10.1109\/INFOTEH.2018.8345547"},{"key":"13_CR22","unstructured":"Nakamoto, S.: Bitcoin. A peer-to-peer electronic cash system 21260 (2008)"},{"key":"13_CR23","unstructured":"Shamsi, K., et al.: Chartalist: labeled graph datasets for utxo and account-based blockchains. In: Advances in Neural Information Processing Systems, vol. 35, 34926\u201334939 (2022)"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3055-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T04:07:37Z","timestamp":1763006857000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3055-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"ISBN":["9789819530540","9789819530557"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3055-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,14]]},"assertion":[{"value":"14 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ksem2025.scimeeting.cn\/en\/web\/index\/27434","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}