{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T19:49:03Z","timestamp":1777060143644,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":61,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819690947","type":"print"},{"value":"9789819690954","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9095-4_16","type":"book-chapter","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T10:39:00Z","timestamp":1751884740000},"page":"310-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SoK: A Deep Dive Into Anti-money Laundering Techniques for\u00a0Blockchain Cryptocurrencies"],"prefix":"10.1007","author":[{"given":"Qishuang","family":"Fu","sequence":"first","affiliation":[]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shirui","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Tsz Hon","family":"Yuen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,7]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Disc. 29, 626\u2013688 (2015)","journal-title":"Data Min. Knowl. Disc."},{"issue":"6","key":"16_CR2","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.1108\/JMLC-07-2022-0109","volume":"26","author":"TN Al-Tawil","year":"2023","unstructured":"Al-Tawil, T.N.: Anti-money laundering regulation of cryptocurrency: UAE and global approaches. J. Money Laund. Control 26(6), 1150\u20131164 (2023)","journal-title":"J. Money Laund. Control"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Alarab, I., Prakoonwit, S., Nacer, M.I.: Competence of graph convolutional networks for anti-money laundering in bitcoin blockchain. In: Proceedings of the 5th International Conference on Machine Learning Technologies, pp. 23\u201327 (2020)","DOI":"10.1145\/3409073.3409080"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Almeida, H., Pinto, P., Fern\u00e1ndez Vilas, A.: A review on cryptocurrency transaction methods for money laundering. In: Proceedings of the 5th International Conference on Finance, Economics, Management and IT Business, pp. 114\u2013121 (2023)","DOI":"10.5220\/0011993300003494"},{"issue":"5","key":"16_CR5","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.3982\/ECTA12043","volume":"86","author":"A Babus","year":"2018","unstructured":"Babus, A., Kondor, P.: Trading and information diffusion in over-the-counter markets. Econometrica 86(5), 1727\u20131769 (2018)","journal-title":"Econometrica"},{"key":"16_CR6","first-page":"889","volume":"31","author":"Y Bathaee","year":"2017","unstructured":"Bathaee, Y.: The artificial intelligence black box and the failure of intent and causation. Harv. JL Tech. 31, 889 (2017)","journal-title":"Harv. JL Tech."},{"key":"16_CR7","unstructured":"Bellei, C., et\u00a0al.: The shape of money laundering: subgraph representation learning on the blockchain with the elliptic2 dataset. arXiv preprint arXiv:2404.19109 (2024)"},{"key":"16_CR8","unstructured":"Buterin, V., et al.: Ethereum white paper. GitHub Repository 1, 22\u201323 (2013)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Calafos, M.W., Dimitoglou, G.: Cyber laundering: money laundering from fiat money to cryptocurrency. In: Principles and Practice of Blockchains, pp. 271\u2013300 (2022)","DOI":"10.1007\/978-3-031-10507-4_12"},{"key":"16_CR10","unstructured":"Chanalysis: The 2024 crypto crime report (2024). https:\/\/go.chainalysis.com\/crypto-crime-2024.html"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Charoenwong, B., Bernardi, M.: A decade of cryptocurrency \u2018hacks\u2019: 2011\u20132021. Available at SSRN 3944435 (2021)","DOI":"10.2139\/ssrn.3944435"},{"issue":"1","key":"16_CR12","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1108\/JFC-06-2020-0113","volume":"28","author":"D Dupuis","year":"2020","unstructured":"Dupuis, D., Gleason, K.: Money laundering with cryptocurrency: open doors and the regulatory dialectic. J. Financ. Crime 28(1), 60\u201374 (2020)","journal-title":"J. Financ. Crime"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Durrant, S., Natarajan, M.: 12 cryptocurrencies and money laundering opportunities. In: International and Transnational Crime and Justice, p.\u00a073 (2019)","DOI":"10.1017\/9781108597296.012"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Elmougy, Y., Liu, L.: Demystifying fraudulent transactions and illicit nodes in the bitcoin network for financial forensics. In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 3979\u20133990 (2023)","DOI":"10.1145\/3580305.3599803"},{"key":"16_CR15","doi-asserted-by":"publisher","first-page":"113318","DOI":"10.1016\/j.eswa.2020.113318","volume":"150","author":"S Farrugia","year":"2020","unstructured":"Farrugia, S., Ellul, J., Azzopardi, G.: Detection of illicit accounts over the ethereum blockchain. Expert Syst. Appl. 150, 113318 (2020)","journal-title":"Expert Syst. Appl."},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Fu, Q., Lin, D., Wu, J.: Bigger than we thought: the upbit hack gang. In: The International Conference on Mathematical Research for Blockchain Economy, pp. 178\u2013185 (2023)","DOI":"10.1007\/978-3-031-48731-6_11"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Fu, Q., Lint, D., Cao, Y., Wu, J.: Does money laundering on ethereum have traditional traits? In: 2023 IEEE International Symposium on Circuits and Systems, pp.\u00a01\u20135 (2023)","DOI":"10.1109\/ISCAS46773.2023.10181696"},{"issue":"18","key":"16_CR18","doi-asserted-by":"publisher","first-page":"3927","DOI":"10.3390\/math11183927","volume":"11","author":"C Guo","year":"2023","unstructured":"Guo, C., Zhang, S., Zhang, P., Alkubati, M., Song, J.: LB-GLAT: long-term bi-graph layer attention convolutional network for anti-money laundering in transactional blockchain. Mathematics 11(18), 3927 (2023)","journal-title":"Mathematics"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Hyun, W., Lee, J., Suh, B.: Anti-money laundering in cryptocurrency via multi-relational graph neural network. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 118\u2013130 (2023)","DOI":"10.1007\/978-3-031-33377-4_10"},{"key":"16_CR20","first-page":"1911","volume":"62","author":"KN Johnson","year":"2020","unstructured":"Johnson, K.N.: Decentralized finance: regulating cryptocurrency exchanges. Wm. Mary L. Rev. 62, 1911 (2020)","journal-title":"Wm. Mary L. Rev."},{"issue":"3","key":"16_CR21","first-page":"285","volume":"35","author":"D K\u00fc\u00e7\u00fck","year":"2023","unstructured":"K\u00fc\u00e7\u00fck, D., \u00c7akar, E., Yakut, \u00d6.F., Ertam, F.: Investigation of cryptocurrency-centered money laundering scenarios in terms of digital forensics. Int. J. Adv. Eng. Pure Sci. 35(3), 285\u2013296 (2023)","journal-title":"Int. J. Adv. Eng. Pure Sci."},{"issue":"9","key":"16_CR22","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/3474355","volume":"64","author":"L Kugler","year":"2021","unstructured":"Kugler, L.: Non-fungible tokens and the future of art. Commun. ACM 64(9), 19\u201320 (2021)","journal-title":"Commun. ACM"},{"key":"16_CR23","unstructured":"Li, C., et al.: A decentralized blockchain with high throughput and fast confirmation. In: 2020 USENIX Annual Technical Conference, pp. 515\u2013528 (2020)"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: FlowScope: spotting money laundering based on graphs. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a034, pp. 4731\u20134738 (2020)","DOI":"10.1609\/aaai.v34i04.5906"},{"issue":"2","key":"16_CR25","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TDSC.2019.2910058","volume":"18","author":"Y Li","year":"2019","unstructured":"Li, Y., Yang, G., Susilo, W., Yu, Y., Au, M.H., Liu, D.: Traceable monero: anonymous cryptocurrency with enhanced accountability. IEEE Trans. Dependable Secure Comput. 18(2), 679\u2013691 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Lin, D., Wu, J., Yu, Y., Fu, Q., Zheng, Z., Yang, C.: DenseFlow: spotting cryptocurrency money laundering in ethereum transaction graphs. In: Proceedings of the ACM on Web Conference 2024, pp. 4429\u20134438 (2024)","DOI":"10.1145\/3589334.3645692"},{"issue":"8","key":"16_CR27","doi-asserted-by":"publisher","first-page":"083022","DOI":"10.1088\/1367-2630\/aba062","volume":"22","author":"JH Lin","year":"2020","unstructured":"Lin, J.H., Primicerio, K., Squartini, T., Decker, C., Tessone, C.J.: Lightning network: a second path towards centralisation of the bitcoin economy. New J. Phys. 22(8), 083022 (2020)","journal-title":"New J. Phys."},{"issue":"14","key":"16_CR28","doi-asserted-by":"publisher","first-page":"3180","DOI":"10.3390\/electronics12143180","volume":"12","author":"J Liu","year":"2023","unstructured":"Liu, J., Yin, C., Wang, H., Wu, X., Lan, D., Zhou, L., Ge, C.: Graph embedding-based money laundering detection for ethereum. Electronics 12(14), 3180 (2023)","journal-title":"Electronics"},{"issue":"16","key":"16_CR29","doi-asserted-by":"publisher","first-page":"19406","DOI":"10.1007\/s10489-023-04504-9","volume":"53","author":"WW Lo","year":"2023","unstructured":"Lo, W.W., Kulatilleke, G.K., Sarhan, M., Layeghy, S., Portmann, M.: Inspection-l: self-supervised GNN node embeddings for money laundering detection in bitcoin. Appl. Intell. 53(16), 19406\u201319417 (2023)","journal-title":"Appl. Intell."},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Lv, W., Liu, J., Zhou, L.: Detection of money laundering address over the ethereum blockchain. In: 2023 5th International Conference on Frontiers Technology of Information and Computer, pp. 866\u2013869 (2023)","DOI":"10.1109\/ICFTIC59930.2023.10455883"},{"issue":"11","key":"16_CR31","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1257\/aer.20140759","volume":"107","author":"S Malamud","year":"2017","unstructured":"Malamud, S., Rostek, M.: Decentralized exchange. Am. Econ. Rev. 107(11), 3320\u20133362 (2017)","journal-title":"Am. Econ. Rev."},{"key":"16_CR32","unstructured":"Nakamoto, S., Bitcoin, A.: A peer-to-peer electronic cash system. Bitcoin 4(2), 15 (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Nicholls, J., Kuppa, A., Le-Khac, N.A.: FraudLens: graph structural learning for bitcoin illicit activity identification. In: Proceedings of the 39th Annual Computer Security Applications Conference, pp. 324\u2013336 (2023)","DOI":"10.1145\/3627106.3627200"},{"key":"16_CR34","doi-asserted-by":"publisher","first-page":"109378","DOI":"10.1016\/j.comnet.2022.109378","volume":"218","author":"W Ou","year":"2022","unstructured":"Ou, W., Huang, S., Zheng, J., Zhang, Q., Zeng, G., Han, W.: An overview on cross-chain: mechanism, platforms, challenges and advances. Comput. Netw. 218, 109378 (2022)","journal-title":"Comput. Netw."},{"issue":"3","key":"16_CR35","doi-asserted-by":"publisher","first-page":"211","DOI":"10.3390\/e26030211","volume":"26","author":"S Ouyang","year":"2024","unstructured":"Ouyang, S., Bai, Q., Feng, H., Hu, B.: Bitcoin money laundering detection via subgraph contrastive learning. Entropy 26(3), 211 (2024)","journal-title":"Entropy"},{"key":"16_CR36","doi-asserted-by":"publisher","first-page":"e23","DOI":"10.1017\/S0269888920000314","volume":"35","author":"B Pillai","year":"2020","unstructured":"Pillai, B., Biswas, K., Muthukkumarasamy, V.: Cross-chain interoperability among blockchain-based systems using transactions. Knowl. Eng. Rev. 35, e23 (2020)","journal-title":"Knowl. Eng. Rev."},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"Schueffel, P.: DeFi: decentralized finance-an introduction and overview. Journal of Innovation Management 9(3), I\u2013XI (2021)","DOI":"10.24840\/2183-0606_009.003_0001"},{"key":"16_CR38","doi-asserted-by":"crossref","unstructured":"Schumacher, L.V.: A primer on crypto-assets and the unavoidable blockchain, pp. 49\u201358 (2024)","DOI":"10.1007\/978-3-031-54601-3_9"},{"key":"16_CR39","doi-asserted-by":"crossref","unstructured":"Shirole, M., Darisi, M., Bhirud, S.: Cryptocurrency token: an overview. In: IC-BCT 2019: Proceedings of the International Conference on Blockchain Technology, pp. 133\u2013140 (2020)","DOI":"10.1007\/978-981-15-4542-9_12"},{"key":"16_CR40","unstructured":"Slowmist: Analysis of the 2024 blockchain security and anti-money laundering annual report: Security landscape. http:\/\/slowmist.medium.com\/analysis-of-the-2024-blockchain-security-and-anti-money-laundering-annual-report-security-248140ff666b"},{"key":"16_CR41","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1109\/TIFS.2024.3518068","volume":"20","author":"J Song","year":"2024","unstructured":"Song, J., Zhang, S., Zhang, P., Park, J., Gu, Y., Yu, G.: Illicit social accounts? Anti-money laundering for transactional blockchains. IEEE Trans. Inf. Forensics Secur. 20, 391\u2013404 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR42","doi-asserted-by":"crossref","unstructured":"Song, K., et al.: Identifying money laundering subgraphs on the blockchain. In: Proceedings of the 5th ACM International Conference on AI in Finance, pp. 195\u2013203 (2024)","DOI":"10.1145\/3677052.3698635"},{"key":"16_CR43","unstructured":"Staples, M., et al.: Risks and opportunities for systems using blockchain and smart contracts. data61. CSIRO, Sydney (2017)"},{"issue":"4","key":"16_CR44","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/MNET.011.2000473","volume":"35","author":"X Sun","year":"2021","unstructured":"Sun, X., Yu, F.R., Zhang, P., Sun, Z., Xie, W., Peng, X.: A survey on zero-knowledge proof in blockchain. IEEE Netw. 35(4), 198\u2013205 (2021)","journal-title":"IEEE Netw."},{"key":"16_CR45","unstructured":"Team, C.: Types of cryptocurrency. https:\/\/corporatefinanceinstitute.com\/resources\/cryptocurrency\/types-of-cryptocurrency\/"},{"key":"16_CR46","unstructured":"Team, S.P.: Over 25,000 eth from bancor hack moved to exchange (2019). https:\/\/medium.com\/sentinel-protocol\/over-25-000-eth-from-bancor-hack-moved-to-exchange-db2da879b4be"},{"key":"16_CR47","doi-asserted-by":"publisher","first-page":"7555","DOI":"10.1109\/ACCESS.2024.3452003","volume":"13","author":"A Ven\u010dkauskas","year":"2024","unstructured":"Ven\u010dkauskas, A., Grigali\u016bnas, \u0160, Pocius, L., Br\u016bzgien\u0117, R., Romanovs, A.: Machine learning in money laundering detection over blockchain technology. IEEE Access 13, 7555\u20137573 (2024)","journal-title":"IEEE Access"},{"issue":"1","key":"16_CR48","doi-asserted-by":"publisher","first-page":"30","DOI":"10.69554\/KLRO4841","volume":"18","author":"HJ Von Haenisch","year":"2024","unstructured":"Von Haenisch, H.J., Egner, T.: Know your customer: unravelling the challenges. J. Payments Strategy Syst. 18(1), 30\u201338 (2024)","journal-title":"J. Payments Strategy Syst."},{"key":"16_CR49","doi-asserted-by":"crossref","unstructured":"Wang, Q., Tsai, W.T., Shi, T.: GraphALM: active learning for detecting money laundering transactions on blockchain networks. IEEE Netw. (2024)","DOI":"10.1109\/MNET.2024.3457577"},{"key":"16_CR50","doi-asserted-by":"crossref","unstructured":"Wang, W., et al.: A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7, 22328\u201322370 (2019)","DOI":"10.1109\/ACCESS.2019.2896108"},{"key":"16_CR51","unstructured":"Weber, M., et al.: Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2019)"},{"key":"16_CR52","doi-asserted-by":"crossref","unstructured":"Wu, J., et al.: Towards understanding asset flows in crypto money laundering through the lenses of ethereum heists. IEEE Trans. Inf. Forensics Secur. 19, 1994\u20132009 (2023)","DOI":"10.1109\/TIFS.2023.3346276"},{"key":"16_CR53","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.1109\/TIFS.2023.3266162","volume":"18","author":"Z Wu","year":"2023","unstructured":"Wu, Z., Liu, J., Wu, J., Zheng, Z., Chen, T.: TRacer: scalable graph-based transaction tracing for account-based blockchain trading systems. IEEE Trans. Inf. Forensics Secur. 18, 2609\u20132621 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"16_CR54","doi-asserted-by":"publisher","first-page":"1659","DOI":"10.1007\/s10614-020-10050-0","volume":"59","author":"SP Yadav","year":"2022","unstructured":"Yadav, S.P., Agrawal, K.K., Bhati, B.S., Al-Turjman, F., Mostarda, L.: Blockchain-based cryptocurrency regulation: An overview. Comput. Econ. 59(4), 1659\u20131675 (2022)","journal-title":"Comput. Econ."},{"key":"16_CR55","doi-asserted-by":"crossref","unstructured":"Yao, Y., Duan, J., Xu, K., Cai, Y., Sun, Z., Zhang, Y.: A survey on large language model (LLM) security and privacy: the good, the bad, and the ugly. High-Confidence Comput. 100211 (2024)","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"16_CR56","doi-asserted-by":"crossref","unstructured":"Youn, M., Chin, K., Omote, K.: Empirical analysis of cryptocurrency mixer: tornado cash. In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing, pp. 2324\u20132331 (2023)","DOI":"10.1109\/CSCE60160.2023.00378"},{"key":"16_CR57","doi-asserted-by":"crossref","unstructured":"Yu, Y., Wu, J., Lin, D., Fu, Q.: Money laundering detection on ethereum: applying traditional approaches to new scene. In: IEEE 29th International Conference on Parallel and Distributed Systems, pp. 1759\u20131766 (2023)","DOI":"10.1109\/ICPADS60453.2023.00244"},{"key":"16_CR58","unstructured":"Zhao, W.: Coinrail exchange hacked, loses possibly \\$40 million in cryptos (2021). https:\/\/www.coindesk.com\/markets\/2018\/06\/11\/coinrail-exchange-hacked-loses-possibly-40-million-in-cryptos"},{"key":"16_CR59","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","volume":"105","author":"Z Zheng","year":"2020","unstructured":"Zheng, Z., Xie, S., Dai, H.N., Chen, W., Chen, X., Weng, J., Imran, M.: An overview on smart contracts: challenges, advances and platforms. Futur. Gener. Comput. Syst. 105, 475\u2013491 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"16_CR60","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Xie, S., Dai, H.N., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352\u2013375 (2018)","journal-title":"Int. J. Web Grid Serv."},{"issue":"1","key":"16_CR61","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1109\/TCSS.2022.3231687","volume":"11","author":"F Zhou","year":"2023","unstructured":"Zhou, F., et al.: Visual analysis of money laundering in cryptocurrency exchange. IEEE Trans. Comput. Soc. Syst. 11(1), 731\u2013745 (2023)","journal-title":"IEEE Trans. Comput. Soc. Syst."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9095-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T19:22:45Z","timestamp":1777058565000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9095-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819690947","9789819690954"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9095-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACISP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Conference on Information Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wollongong, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acisp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/uow-ic2.github.io\/acisp2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}