{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T06:26:38Z","timestamp":1773901598047,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T00:00:00Z","timestamp":1748217600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T00:00:00Z","timestamp":1748217600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01057-5","type":"journal-article","created":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T07:45:10Z","timestamp":1748245510000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Optimizing gas efficiency and enhancing security in Ethereum smart contracts through integrated clustering and anomaly detection"],"prefix":"10.1007","volume":"24","author":[{"given":"Faris A.","family":"Almalki","sequence":"first","affiliation":[]},{"given":"A.","family":"Rajaram","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,26]]},"reference":[{"key":"1057_CR1","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s11390-021-1162-y","volume":"37","author":"J Chen","year":"2022","unstructured":"Chen, J., Xia, X., Lo, D., Grundy, J., Luo, X., Chen, T.: Characterizing and detecting Gas-Inefficient patterns in smart contracts. J. Comput. Sci. Technol. 37, 39\u201350 (2022). https:\/\/doi.org\/10.1007\/s11390-021-1162-y","journal-title":"J. Comput. Sci. Technol."},{"key":"1057_CR2","doi-asserted-by":"publisher","unstructured":"Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., Zhou, Y.: Detecting ponzi schemes on Ethereum: Towards healthier blockchain technology. Proc. World Wide Web Conf. 1409\u20131418 (2020). https:\/\/doi.org\/10.1145\/3178876.3186015","DOI":"10.1145\/3178876.3186015"},{"issue":"18","key":"1057_CR3","doi-asserted-by":"publisher","first-page":"2937","DOI":"10.3390\/electronics11182937","volume":"11","author":"A Aljofey","year":"2022","unstructured":"Aljofey, A., Rasool, Q., Jiang, Qu, Q.: A Feature-Based robust method for abnormal contracts detection in Ethereum blockchain. Electronics. 11(18), 2937 (2022). https:\/\/doi.org\/10.3390\/electronics11182937","journal-title":"Electronics"},{"key":"1057_CR4","doi-asserted-by":"publisher","first-page":"25495","DOI":"10.1109\/ACCESS.2021.3057565","volume":"9","author":"G Correas","year":"2021","unstructured":"Correas, G., Gordillo, P., Rom\u00e1n-D\u00edez, G.: Static profiling and optimization of Ethereum smart contracts using resource analysis. IEEE Access. 9, 25495\u201325507 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3057565","journal-title":"IEEE Access."},{"key":"1057_CR5","doi-asserted-by":"publisher","unstructured":"Chen, T., Zhang, Z., Chen, L., Y.: Traveling the token world: A graph analysis of Ethereum ERC20 token ecosystem. Proc. Web Conf. 1411\u20131421 (2020). https:\/\/doi.org\/10.1145\/3366423.3380198","DOI":"10.1145\/3366423.3380198"},{"key":"1057_CR6","doi-asserted-by":"publisher","first-page":"33654","DOI":"10.1109\/ACCESS.2021.3059843","volume":"9","author":"L Bian","year":"2021","unstructured":"Bian, L., Zhang, L., Zhao, K., Wang, H., Gong, S.: Image-Based scam detection method using an attention capsule network. IEEE Access. 9, 33654\u201333665 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3059843","journal-title":"IEEE Access."},{"key":"1057_CR7","doi-asserted-by":"publisher","unstructured":"Li, Z., Chen, T.H., Yang, J., Shang, W.: DLFinder: Characterizing and Detecting Duplicate Logging Code Smells, Proc. IEEE\/ACM Int. Conf. Software Engineering, pp. 152\u2013163 (2019). https:\/\/doi.org\/10.1109\/ICSE.2019.00032","DOI":"10.1109\/ICSE.2019.00032"},{"key":"1057_CR8","doi-asserted-by":"publisher","unstructured":"Chen, W., et al.: Sadponzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts, Proc. ACM Meas. Anal. Comput. Syst. 5(2), 1\u201330 (2021). https:\/\/doi.org\/10.1145\/3460118","DOI":"10.1145\/3460118"},{"issue":"1","key":"1057_CR9","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1108\/JMLC-04-2019-0032","volume":"23","author":"FMJ Teichmann","year":"2020","unstructured":"Teichmann, F.M.J., Falker, M.C.: Cryptocurrencies and financial crime: Solutions from Liechtenstein. J. Money Laundering Control. 23(1), 89\u2013103 (2020). https:\/\/doi.org\/10.1108\/JMLC-04-2019-0032","journal-title":"J. Money Laundering Control"},{"issue":"15","key":"1057_CR10","doi-asserted-by":"publisher","first-page":"1766","DOI":"10.3390\/electronics10151766","volume":"10","author":"Oad","year":"2021","unstructured":"Oad, et al.: Blockchain-Enabled transaction scanning method for money laundering detection. Electronics. 10(15), 1766 (2021). https:\/\/doi.org\/10.3390\/electronics10151766","journal-title":"Electronics"},{"key":"1057_CR11","doi-asserted-by":"publisher","unstructured":"Jung, J., Le Tilly, M., Gehani, A.: Data Mining-Based Ethereum fraud detection. Proc. IEEE Int. Conf. Blockchain. 266\u2013273 (2019). https:\/\/doi.org\/10.1109\/Blockchain.2019.00040","DOI":"10.1109\/Blockchain.2019.00040"},{"key":"1057_CR12","doi-asserted-by":"publisher","unstructured":"Grech, N., Kong, M., Jurisevic, A., Brent, L., Scholz, B., Smaragdakis, Y.: MadMax: Surviving Out-of-Gas Conditions in Ethereum Smart Contracts, Proc. ACM Program. Lang. 2(OOPSLA, Art. 116), (2018). https:\/\/doi.org\/10.1145\/3276486","DOI":"10.1145\/3276486"},{"key":"1057_CR13","doi-asserted-by":"publisher","unstructured":"Li, Z., et al.: ContractFuzzer: Fuzzing smart contracts for vulnerability detection. Proc. IEEE\/ACM Int. Conf. Automated Softw. Eng. 259\u2013269 (2018). https:\/\/doi.org\/10.1145\/3238147.3238177","DOI":"10.1145\/3238147.3238177"},{"key":"1057_CR14","doi-asserted-by":"publisher","unstructured":"Chen, T., et al.: Under-Optimized smart contracts devour your money. Proc. IEEE Int. Conf. Softw. Anal. Evol. Reengineering. 442\u2013446 (2017). https:\/\/doi.org\/10.1109\/SANER.2017.7884650","DOI":"10.1109\/SANER.2017.7884650"},{"issue":"1","key":"1057_CR15","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/TSE.2020.2989002","volume":"48","author":"J Chen","year":"2022","unstructured":"Chen, J., et al.: Defining smart contract defects on Ethereum. IEEE Trans. Softw. Eng. 48(1), 327\u2013345 (2022). https:\/\/doi.org\/10.1109\/TSE.2020.2989002","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1057_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11390-022-1245-3","volume":"39","author":"F Correas","year":"2023","unstructured":"Correas, F., et al.: Towards Cost-Efficient smart contract execution: A study on proxy and diamond patterns. J. Comput. Sci. Technol. 39, 1\u201317 (2023). https:\/\/doi.org\/10.1007\/s11390-022-1245-3","journal-title":"J. Comput. Sci. Technol."},{"key":"1057_CR17","unstructured":"Zhang, P., Xiao, F., Luo, X., SolidityCheck: Quickly detecting smart contract problems through regular expressions. arXiv:1911.09425 (2021). Available: https:\/\/arxiv.org\/abs\/1911.09425"},{"key":"1057_CR18","doi-asserted-by":"publisher","unstructured":"Tikhomirov, S., et al.: SmartCheck: Static analysis of Ethereum smart contracts. Proc. Int. Workshop Emerg. Trends Softw. Eng. Blockchain. 9\u201316 (2018). https:\/\/doi.org\/10.1145\/3194113.3194115","DOI":"10.1145\/3194113.3194115"},{"key":"1057_CR19","doi-asserted-by":"publisher","unstructured":"Alarab, S., Prakoonwit, Nacer, M.I.: Comparative Analysis Using Supervised Learning Methods for Anti-Money Laundering in Bitcoin, Proc. Int. Conf. Mach. Learn. Technol. 11\u201317 (2020). https:\/\/doi.org\/10.1145\/3381767.3381781","DOI":"10.1145\/3381767.3381781"},{"key":"1057_CR20","doi-asserted-by":"publisher","unstructured":"Chen, Z., et al.: MuSC: A tool for mutation testing of Ethereum smart contract. Proc. IEEE\/ACM Int. Conf. Automated Softw. Eng. 1198\u20131201 (2019). https:\/\/doi.org\/10.1109\/ASE.2019.00136","DOI":"10.1109\/ASE.2019.00136"},{"key":"1057_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2020.2975274","volume":"15","author":"H Jiang","year":"2020","unstructured":"Jiang, H., et al.: ContractGuard: A framework for detecting and mitigating security threats in Ethereum smart contracts. IEEE Trans. Inf. Forensics Secur. 15, 1\u201315 (2020). https:\/\/doi.org\/10.1109\/TIFS.2020.2975274","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1057_CR22","doi-asserted-by":"publisher","unstructured":"Zhang, Y., et al.: Ponzi contracts detection based on improved convolutional neural network. Proc. IEEE Int. Conf. Serv. Comput. 353\u2013360 (2020). https:\/\/doi.org\/10.1109\/SCC49832.2020.00058","DOI":"10.1109\/SCC49832.2020.00058"},{"key":"1057_CR23","doi-asserted-by":"publisher","unstructured":"Maksutov, M.S.: Alexeev Detection of blockchain transactions used in blockchain mixer of coin join type. Proc. IEEE Conf. Russian Young Researchers Electr. Electron. Eng. 274\u2013277 (2019) https:\/\/doi.org\/10.1109\/EIConRus.2019.8657074","DOI":"10.1109\/EIConRus.2019.8657074"},{"issue":"3","key":"1057_CR24","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3390\/bdcc5030031","volume":"5","author":"K Park","year":"2021","unstructured":"Park, K., Youm, H.Y., Proposal for Customer Identification Service Model Based on Distributed Ledger Technology to Transfer Virtual Assets,: Big Data Cogn. Comput. 5(3), 31 (2021). https:\/\/doi.org\/10.3390\/bdcc5030031","journal-title":"Big Data Cogn. Comput."},{"key":"1057_CR25","unstructured":"Zarir, M., Di, Kannengiesser, S.: Gas Cost Analysis of Proxy and Diamond Patterns: Towards Trusted Smart Contract Engineering in EVM Blockchains. arXiv:2312.08945 (2023). Available: https:\/\/arxiv.org\/abs\/2312.08945"},{"issue":"57","key":"1057_CR26","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1108\/JMLC-04-2019-0033","volume":"4","author":"G Guerra","year":"2019","unstructured":"Guerra, G., Marcos, H.J.: Legal remarks on the overarching complexities of Crypto Anti-Money laundering regulation. Rev. Juridica. 4(57), 83\u2013115 (2019). https:\/\/doi.org\/10.1108\/JMLC-04-2019-0033","journal-title":"Rev. Juridica"},{"key":"1057_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2139\/ssrn.3393664","volume":"408","author":"F Teichmann","year":"2019","unstructured":"Teichmann, F., Falker, M.: Gatekeepers are vital participants in Anti-Money-Laundering laws and enforcement regimes as permissionless Blockchain-Based transactions pose challenges. Indiana Legal Stud. Res. Paper. 408, 1\u201323 (2019). https:\/\/doi.org\/10.2139\/ssrn.3393664","journal-title":"Indiana Legal Stud. Res. Paper"},{"issue":"2","key":"1057_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3478497","volume":"5","author":"W Chen","year":"2021","unstructured":"Chen, W., et al.: Ponzi schemes on Ethereum: Towards healthier blockchain technology. J. Meas. Anal. Comput. Syst. 5(2), 1\u201324 (2021). https:\/\/doi.org\/10.1145\/3478497","journal-title":"J. Meas. Anal. Comput. Syst."},{"key":"1057_CR29","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.jpdc.2021.07.004","volume":"147","author":"Z Zhang","year":"2021","unstructured":"Zhang, Z., Xiong, Y., Liu, C.: Gas cost optimization in smart contracts on the Ethereum blockchain. J. Parallel Distrib. Comput. 147, 110\u2013124 (2021). https:\/\/doi.org\/10.1016\/j.jpdc.2021.07.004","journal-title":"J. Parallel Distrib. Comput."},{"key":"1057_CR30","doi-asserted-by":"crossref","unstructured":"Ilakkiya, N., Rajaram, A.: Blockchain-assisted secure routing protocol for cluster-based mobile-ad hoc networks. Int. J. Comput. Commun. Control. 18(2), (2023)","DOI":"10.15837\/ijccc.2023.2.5144"},{"issue":"1","key":"1057_CR31","first-page":"1717","volume":"45","author":"CR Komala","year":"2023","unstructured":"Komala, C.R., Velmurugan, V., Maheswari, K., Deena, S., Kavitha, M., Rajaram, A.: Multi-UAV computing enabling efficient clustering-based IoT for energy reduction and data transmission. J. Intell. Fuzzy Syst. 45(1), 1717\u20131730 (2023)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"1057_CR32","unstructured":"Rajaram, A., Baskar, A.: Hybrid optimization-based multi-path Routing for Dynamic cluster-based MANET. Cybernetics and Systems (2023)"},{"key":"1057_CR33","doi-asserted-by":"crossref","unstructured":"Ilakkiya, N., Rajaram, A.: A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment. Multimedia Tools Appl. 1\u201326, (2024)","DOI":"10.1007\/s11042-024-18845-1"},{"key":"1057_CR34","unstructured":"Sridevi, A.P., Rajaram, A.: Efficient energy based multipath cluster routing protocol for wireless sensor networks. J. Theor. Appl. Inf. Technol. 68(2), (2014)"},{"key":"1057_CR35","unstructured":"Kumari, A., Tanwar, S.: Artificial Intelligence-Empowered Modern Electric Vehicles in Smart Grid Systems: Fundamentals, Technologies, and Solutions. Elsevier (2024)"},{"key":"1057_CR36","doi-asserted-by":"crossref","unstructured":"Chaturvedi, P., Manekar, S., Kumari, A., Bishnoi, D.: Disease identification and classification from Pearl millet leaf images using machine learning techniques. In: Methodologies, Frameworks, and Applications of Machine Learning, pp. 232\u2013243. IGI Global (2024)","DOI":"10.4018\/979-8-3693-1062-5.ch013"},{"issue":"8","key":"1057_CR37","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TC.2011.125","volume":"61","author":"M Mozaffari-Kermani","year":"2011","unstructured":"Mozaffari-Kermani, M., Reyhani-Masoleh, A.: Efficient and high-performance parallel hardware architectures for the AES-GCM. IEEE Trans. Comput. 61(8), 1165\u20131178 (2011)","journal-title":"IEEE Trans. Comput."},{"key":"1057_CR38","first-page":"p101015","volume":"44","author":"R Elavarasan","year":"2024","unstructured":"Elavarasan, R., Rajaram, A.: Distributed clustering model for energy efficiency based topology control using game theory in wireless sensor networks. Sustainable Computing: Inf. Syst. 44, 101015 (2024)","journal-title":"Sustainable Computing: Inf. Syst."},{"issue":"4","key":"1057_CR39","doi-asserted-by":"publisher","first-page":"2667","DOI":"10.1007\/s42835-023-01749-9","volume":"19","author":"N Ilakkiya","year":"2024","unstructured":"Ilakkiya, N., Rajaram, A.: Blockchain-enabled lightweight intrusion detection system for secure MANETs. J. Electr. Eng. Technol. 19(4), 2667\u20132681 (2024)","journal-title":"J. Electr. Eng. Technol."},{"key":"1057_CR40","doi-asserted-by":"crossref","unstructured":"Chinnadurai, J., Karthik, A., Ramesh, J.V.N., Banerjee, S., Rajlakshmi, P.V., Rao, K.V., Sudarvizhi, D., Rajaram, A.: Enhancing online education recommendations through clustering-driven deep learning. Biomed. Signal Process. Control. 97, 106669 (2024)","DOI":"10.1016\/j.bspc.2024.106669"},{"key":"1057_CR41","doi-asserted-by":"crossref","unstructured":"Priya, S.S., Vijayabhasker, R., Rajaram, A.: Advanced security and efficiency framework for mobile ad-hoc networks using adaptive clustering and optimization techniques. J. Electr. Eng. Technol. 1\u201312 (2025)","DOI":"10.1007\/s42835-024-02119-9"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01057-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01057-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01057-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:10:44Z","timestamp":1750500644000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01057-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,26]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1057"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01057-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,26]]},"assertion":[{"value":"26 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No participation of humans takes place in this implementation process.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"No violation of Human and Animal Rights is involved.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"145"}}