{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:46:37Z","timestamp":1774629997801,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":66,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819951765","type":"print"},{"value":"9789819951772","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-5177-2_10","type":"book-chapter","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T23:02:34Z","timestamp":1691017354000},"page":"167-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Graph Analysis of\u00a0Blockchain P2P Overlays and\u00a0Their Security Implications"],"prefix":"10.1007","author":[{"given":"Aristodemos","family":"Paphitis","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Sirivianos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,3]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Alenazi, M.J.F., Sterbenz, J.P.G.: Comprehensive comparison and accuracy of graph metrics in predicting network resilience. In: 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN), pp. 157\u2013164 (2015)","DOI":"10.1109\/DRCN.2015.7149007"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Alenazi, M.J.F., Sterbenz, J.P.G.: Evaluation and comparison of several graph robustness metrics to improve network resilience. In: 2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM), pp. 7\u201313 (2015)","DOI":"10.1109\/RNDM.2015.7324302"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Alstott, J., Bullmore, E., Plenz, D.: powerlaw: a python package for analysis of heavy-tailed distributions. PLoS ONE 9(1) (2014). https:\/\/doi.org\/10.1371\/journal.pone.0085777","DOI":"10.1371\/journal.pone.0085777"},{"key":"10_CR4","unstructured":"Atish Kulkarni, M.: Leeuwen: graph pattern mining for blockchain networks (2021)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: using blockchain for medical data access and permission management. In: OBD. IEEE Computer Society (2016)","DOI":"10.1109\/OBD.2016.11"},{"key":"10_CR6","unstructured":"Barab\u00e1si, A.L., et al.: Network Science. Cambridge University Press, Cambridge (2016)"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Tikhomirov, S.: Deanonymization and linkability of cryptocurrency transactions based on network analysis. In: IEEE European Symposium on Security and Privacy (EuroS &P) (2019). https:\/\/doi.org\/10.1109\/EuroSP.2019.00022","DOI":"10.1109\/EuroSP.2019.00022"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network. In: CCS, ACM (2014)","DOI":"10.1145\/2660267.2660379"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Booker, L.B.: The effects of observation errors on the attack vulnerability of complex networks: technical report, defense technical information center, Fort Belvoir, VA, November 2012. https:\/\/doi.org\/10.21236\/ADA576235, http:\/\/www.dtic.mil\/docs\/citations\/ADA576235","DOI":"10.21236\/ADA576235"},{"issue":"1\u20136","key":"10_CR10","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/S1389-1286(00)00083-9","volume":"33","author":"AZ Broder","year":"2000","unstructured":"Broder, A.Z., et al.: Graph structure in the web. Comput. Networks 33(1\u20136), 309\u2013320 (2000)","journal-title":"Comput. Networks"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Casale-Brunet, S., Ribeca, P., Doyle, P., Mattavelli, M.: Networks of ethereum non-fungible tokens: a graph-based analysis of the ERC-721 ecosystem. In: 2021 IEEE International Conference on Blockchain (Blockchain), IEEE, December 2021. https:\/\/doi.org\/10.1109\/Blockchain53845.2021.00033","DOI":"10.1109\/Blockchain53845.2021.00033"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Chen, W., Xu, Z., Shi, S., Zhao, Y., Zhao, J.: A survey of blockchain applications in different domains. In: ICBTA, ACM (2018)","DOI":"10.1145\/3301403.3301407"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"issue":"4","key":"10_CR14","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1137\/070710111","volume":"51","author":"A Clauset","year":"2009","unstructured":"Clauset, A., Shalizi, C.R., Newman, M.E.J.: Power-law distributions in empirical data. SIAM Rev. 51(4), 661\u2013703 (2009)","journal-title":"SIAM Rev."},{"key":"10_CR15","unstructured":"CoinMarketCap: Coinmarketcap (2021). https:\/\/coinmarketcap.com"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Daniel, E., Rohrer, E., Tschorsch, F.: Map-z: exposing the zcash network in times of transition. In: LCN, IEEE (2019)","DOI":"10.1109\/LCN44214.2019.8990796"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013, IEEE (2013). https:\/\/doi.org\/10.1109\/P2P.2013.6688704","DOI":"10.1109\/P2P.2013.6688704"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1007\/978-3-030-32101-7_32","volume-title":"Financial Cryptography and Data Security","author":"S Delgado-Segura","year":"2019","unstructured":"Delgado-Segura, S., et al.: TxProbe: discovering bitcoin\u2019s network topology using orphan transactions. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 550\u2013566. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_32"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Delgado-Segura, S., P\u00e9rez-Sol\u00e0, C., Herrera-Joancomart\u00ed, J., Navarro-Arribas, G., Borrell, J.: Cryptocurrency networks: A new P2P paradigm. Mob. Inf. Syst. 2018, 2159082:1\u20132159082:16 (2018)","DOI":"10.1155\/2018\/2159082"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Deshpande, V., Badis, H., George, L.: Btcmap: mapping bitcoin peer-to-peer network topology. In: 2018 IFIP\/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), IEEE (2018)","DOI":"10.23919\/PEMWN.2018.8548904"},{"key":"10_CR21","unstructured":"Developers, B.C.: Replace global trickle node with random delays (2015). https:\/\/github.com\/bitcoin\/bitcoin\/pull\/7125"},{"key":"10_CR22","unstructured":"Developers, B.C.: Ignore getaddr msg from inbound connections (2020). https:\/\/github.com\/bitcoin\/bitcoin\/blob\/37e9f07996d3a7504ea54180d188ca91fdf0c884\/src\/net_processing.cpp#L3567"},{"key":"10_CR23","unstructured":"Developers, B.C.: Bitcoin core integration\/staging tree (2021). https:\/\/github.com\/bitcoin\/bitcoin"},{"key":"10_CR24","unstructured":"Developers, B.C.: Bitcoin p2p network (2021). https:\/\/developer.bitcoin.org\/devguide\/p2p_network.html"},{"key":"10_CR25","doi-asserted-by":"publisher","unstructured":"Dotan, M., Pignolet, Y.A., Schmid, S., Tochner, S., Zohar, A.: Sok: cryptocurrency networking context, state-of-the-art, challenges. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020, ACM (2020). https:\/\/doi.org\/10.1145\/3407023.3407043","DOI":"10.1145\/3407023.3407043"},{"key":"10_CR26","unstructured":"Ethereum: Ethereum peer-to-peer networking specifications (2014). https:\/\/github.com\/ethereum\/devp2p"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"94924","DOI":"10.1109\/ACCESS.2022.3204387","volume":"10","author":"F Franzoni","year":"2022","unstructured":"Franzoni, F., Daza, V.: Sok: network-level attacks on the bitcoin p2p network. IEEE Access 10, 94924\u201394962 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3204387","journal-title":"IEEE Access"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Freeman, L.C.: A set of measures of centrality based on betweenness. Sociometry 40(1), 35\u201341 (1977). http:\/\/www.jstor.org\/stable\/3033543","DOI":"10.2307\/3033543"},{"key":"10_CR29","doi-asserted-by":"publisher","unstructured":"Freitas, S., Yang, D., Kumar, S., Tong, H., Chau, D.H.: Graph vulnerability and robustness: a survey. IEEE Trans. Knowl. Data Eng. 1 (2022). https:\/\/doi.org\/10.1109\/TKDE.2022.3163672","DOI":"10.1109\/TKDE.2022.3163672"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: CCS, pp. 3\u201316. ACM (2016)","DOI":"10.1145\/2976749.2978341"},{"key":"10_CR31","unstructured":"Grundmann, M., Amberg, H., Hartenstein, H.: On the estimation of the number of unreachable peers in the bitcoin P2P network by observation of peer announcements. CoRR abs\/2102.12774 (2021)"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Grundmann, M., Baumstark, M., Hartenstein, H.: On the peer degree distribution of the bitcoin p2p network. In: 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1\u20135 (2022)","DOI":"10.1109\/ICBC54727.2022.9805511"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Grundmann, M., Baumstark, M., Hartenstein, H.: On the peer degree distribution of the bitcoin P2P network. In: ICBC, pp. 1\u20135. IEEE (2022)","DOI":"10.1109\/ICBC54727.2022.9805511"},{"key":"10_CR34","doi-asserted-by":"publisher","unstructured":"Grundmann, M., Neudecker, T., Hartenstein, H.: Exploiting transaction accumulation and double spends for topology inference in bitcoin. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 113\u2013126. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_9","DOI":"10.1007\/978-3-662-58820-8_9"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Hagberg, A.A., Schult, D.A., Swart, P.J.: Exploring network structure, dynamics, and function using networkx. In: Varoquaux, G., Vaught, T., Millman, J. (eds.) Proceedings of the 7th Python in Science Conference (2008)","DOI":"10.25080\/TCWV9851"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Iyer, S., Killingback, T., Sundaram, B., Wang, Z.: Attack robustness and centrality of complex networks. PLoS ONE 8, e59613 (2013)","DOI":"10.1371\/journal.pone.0059613"},{"key":"10_CR37","doi-asserted-by":"publisher","unstructured":"D Khan, A.: Graph analysis of the ethereum blockchain data: a survey of datasets, methods, and future work. In: 2022 IEEE International Conference on Blockchain (Blockchain), IEEE, August 2022. https:\/\/doi.org\/10.1109\/Blockchain55522.2022.00042","DOI":"10.1109\/Blockchain55522.2022.00042"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Kim, S.K., Ma, Z., Murali, S., Mason, J., Miller, A., Bailey, M.: Measuring Ethereum network peers. In: IMC, ACM (2018)","DOI":"10.1145\/3278532.3278542"},{"key":"10_CR39","doi-asserted-by":"publisher","first-page":"101108","DOI":"10.1016\/j.pmcj.2019.101108","volume":"61","author":"S Lee","year":"2020","unstructured":"Lee, S., Kim, H.: On the robustness of lightning network in bitcoin. Pervasive Mob. Comput. 61, 101108 (2020)","journal-title":"Pervasive Mob. Comput."},{"issue":"1","key":"10_CR40","first-page":"1","volume":"8","author":"J Leskovec","year":"2016","unstructured":"Leskovec, J., Sosi\u010d, R.: Snap: a general-purpose network analysis and graph-mining library. ACM Trans. Intell. Syst. Technol. (TIST) 8(1), 1\u201320 (2016)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"10_CR41","doi-asserted-by":"publisher","unstructured":"Li, Y., Islambekov, U., Akcora, C., Smirnova, E., Gel, Y.R., Kantarcioglu, M.: Dissecting Ethereum blockchain analytics: what we learn from topology and geometry of the ethereum graph?, pp. 523\u2013531. Society for Industrial and Applied Mathematics, January 2020. https:\/\/doi.org\/10.1137\/1.9781611976236.59","DOI":"10.1137\/1.9781611976236.59"},{"issue":"6","key":"10_CR42","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1109\/JSAC.2003.814364","volume":"21","author":"D Magoni","year":"2003","unstructured":"Magoni, D.: Tearing down the internet. IEEE J. Sel. Areas Commun. 21(6), 949\u2013960 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10_CR43","doi-asserted-by":"publisher","unstructured":"Mahadevan, P., Krioukov, D., Fomenkov, M., Dimitropoulos, X., Claffy, K.C., Vahdat, A.: The internet as-level topology: three data sources and one definitive metric. SIGCOMM Comput. Commun. Rev. 36(1), 17\u201326 (2006). https:\/\/doi.org\/10.1145\/1111322.1111328","DOI":"10.1145\/1111322.1111328"},{"key":"10_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_5"},{"key":"10_CR45","unstructured":"Miller, A., Litton, J., Pachulski, A., Gupta, N., Levin, D., Spring, N., Bhattacharjee, B.: Discovering bitcoin\u2019s network topology and influential nodes. University of Maryland, Technical Report (2015)"},{"key":"10_CR46","doi-asserted-by":"publisher","unstructured":"Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. IMC 2007, Association for Computing Machinery (2007). https:\/\/doi.org\/10.1145\/1298306.1298311","DOI":"10.1145\/1298306.1298311"},{"key":"10_CR47","unstructured":"Montana, C.H.S., Huerta-Quintanilla, R.: Generalization of clustering coefficient on lattice networks applied to criminal networks. Int. J. Math. Comput. Sci. 4 (2017)"},{"key":"10_CR48","doi-asserted-by":"publisher","unstructured":"Neudecker, T.: Characterization of the bitcoin peer-to-peer network (2015\u20132018). Technical Report, 1, Karlsruher Institut f\u00fcr Technologie (KIT) (2019). https:\/\/doi.org\/10.5445\/IR\/1000091933","DOI":"10.5445\/IR\/1000091933"},{"key":"10_CR49","doi-asserted-by":"crossref","unstructured":"Neudecker, T., Andelfinger, P., Hartenstein, H.: Timing analysis for inferring the topology of the bitcoin peer-to-peer network. In: UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld. IEEE Computer Society (2016)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070"},{"key":"10_CR50","doi-asserted-by":"publisher","unstructured":"Neudecker, T., Hartenstein, H.: Network layer aspects of permissionless blockchains. IEEE Commun. Surv. Tutorials 21(1) (2019). https:\/\/doi.org\/10.1109\/COMST.2018.2852480","DOI":"10.1109\/COMST.2018.2852480"},{"key":"10_CR51","doi-asserted-by":"crossref","unstructured":"Newman, M.E.J.: Mixing patterns in networks. Phys. Rev. E, Stat. Nonlinear Soft Matter Phys. 672 Pt 2, 026126 (2002)","DOI":"10.1103\/PhysRevE.67.026126"},{"key":"10_CR52","unstructured":"Nick, J.: Guessing bitcoin\u2019s p2p connections (2015). https:\/\/jonasnick.github.io\/blog\/2015\/03\/06\/guessing-bitcoins-p2p-connections\/"},{"key":"10_CR53","doi-asserted-by":"publisher","unstructured":"Ozisik, A.P., Andresen, G., Levine, B.N., Tapp, D., Bissias, G., Katkuri, S.: Graphene. In: Proceedings of the ACM Special Interest Group on Data Communication. ACM, August 19 2019. https:\/\/doi.org\/10.1145\/3341302.3342082","DOI":"10.1145\/3341302.3342082"},{"key":"10_CR54","doi-asserted-by":"publisher","unstructured":"Paphitis, A., Kourtellis, N., Sirivianos, M.: A first look into the structural properties of blockchain P2P overlays. https:\/\/doi.org\/10.6084\/m9.figshare.23522919","DOI":"10.6084\/m9.figshare.23522919"},{"key":"10_CR55","doi-asserted-by":"crossref","unstructured":"Paphitis, A., Kourtellis, N., Sirivianos, M.: Resilience of blockchain overlay networks. In: LNCS. Lecture Notes in Computer Science, vol. 17th International Conference on Network and System Security (NSS 2023). Springer, Cham (2023)","DOI":"10.1007\/978-3-031-39828-5_6"},{"issue":"2","key":"10_CR56","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10922-016-9391-y","volume":"25","author":"DF Rueda","year":"2016","unstructured":"Rueda, D.F., Calle, E., Marzo, J.L.: Robustness comparison of 15 real telecommunication networks: structural and centrality measurements. J. Netw. Syst. Manage. 25(2), 269\u2013289 (2016). https:\/\/doi.org\/10.1007\/s10922-016-9391-y","journal-title":"J. Netw. Syst. Manage."},{"key":"10_CR57","doi-asserted-by":"publisher","unstructured":"Saad, M., Chen, S., Mohaisen, D.: Syncattack: Double-spending in bitcoin without mining power. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, CCS 2021, pp. 1668\u20131685. ACM, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3460120.3484568","DOI":"10.1145\/3460120.3484568"},{"issue":"3","key":"10_CR58","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/JCN.2006.6182774","volume":"8","author":"G Siganos","year":"2006","unstructured":"Siganos, G., Tauro, S.L., Faloutsos, M.: Jellyfish: a conceptual model for the as internet topology. J. Commun. Networks 8(3), 339\u2013350 (2006)","journal-title":"J. Commun. Networks"},{"key":"10_CR59","doi-asserted-by":"crossref","unstructured":"Telesford, Q.K., Joyce, K.E., Hayasaka, S., Burdette, J.H., Laurienti, P.J.: The ubiquity of small-world networks. Brain Connectivity 1(5) (2011)","DOI":"10.1089\/brain.2011.0038"},{"key":"10_CR60","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1016\/j.socnet.2012.01.003","volume":"34","author":"DJ Wang","year":"2012","unstructured":"Wang, D.J., Shi, X., McFarland, D.A., Leskovec, J.: Measurement error in network data: a re-classification. Soc. Networks 34, 396\u2013409 (2012)","journal-title":"Soc. Networks"},{"key":"10_CR61","unstructured":"Wang, L., Pustogarov, I.: Towards better understanding of bitcoin unreachable peers. CoRR abs\/1709.06837 (2017)"},{"key":"10_CR62","doi-asserted-by":"publisher","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Structural Analysis in the Social Sciences, Cambridge University Press, Cambridge (1994). https:\/\/doi.org\/10.1017\/CBO9780511815478","DOI":"10.1017\/CBO9780511815478"},{"issue":"6","key":"10_CR63","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1016\/j.physa.2009.11.037","volume":"389","author":"Y Xia","year":"2010","unstructured":"Xia, Y., Fan, J., Hill, D.: Cascading failure in watts-strogatz small-world networks. Phys. A Stat. Mech. Appl. 389(6), 1281\u20131285 (2010). https:\/\/doi.org\/10.1016\/j.physa.2009.11.037","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"10_CR64","doi-asserted-by":"crossref","unstructured":"Yap, T.T.V., Ho, T.F., Ng, H., Goh, V.T.: Exploratory graph analysis of the network data of the Ethereum blockchain. F1000Research 10, 908 (2021). http:\/\/dx.doi.org\/10.12688\/f1000research.73141.1","DOI":"10.12688\/f1000research.73141.1"},{"key":"10_CR65","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-24123-4_5","volume-title":"Advances in Digital Forensics XI","author":"C Zhao","year":"2015","unstructured":"Zhao, C., Guan, Y.: A graph-based investigation of bitcoin transactions. In: Peterson, G., Shenoi, S. (eds.) DigitalForensics 2015. IAICT, vol. 462, pp. 79\u201395. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24123-4_5"},{"key":"10_CR66","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., Pentland, A.S.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops (2015)","DOI":"10.1109\/SPW.2015.27"}],"container-title":["Lecture Notes in Computer Science","Security and Privacy in Social Networks and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-5177-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T15:57:39Z","timestamp":1729871859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-5177-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819951765","9789819951772"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-5177-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"3 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocialSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security and Privacy in Social Networks and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canterbury","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socialsec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nss-socialsec2023.cyber.kent.ac.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}