{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:33:01Z","timestamp":1768411981574,"version":"3.49.0"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s12083-023-01553-2","type":"journal-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T07:02:57Z","timestamp":1694588577000},"page":"2985-3002","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Predicting functional roles of Ethereum blockchain addresses"],"prefix":"10.1007","volume":"16","author":[{"given":"Tania","family":"Saleem","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Ismaeel","sequence":"additional","affiliation":[]},{"given":"Muhammad Umar","family":"Janjua","sequence":"additional","affiliation":[]},{"given":"Abdul Rehman","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Awab","family":"Aqib","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Saeed Ul","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,13]]},"reference":[{"issue":"2014","key":"1553_CR1","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1\u201332","journal-title":"Ethereum Project Yellow Paper"},{"key":"1553_CR2","unstructured":"Market C (2020) Coin Market Cap, Top 100 Cryptocurrencies by Market Capitalization. https:\/\/coinmarketcap.com\/"},{"key":"1553_CR3","unstructured":"Bambrough B (2020) Ethereum Is Beating Bitcoin In More Ways Than One. https:\/\/www.forbes.com\/sites\/billybambrough\/2020\/07\/14\/ethereum-is-beating-bitcoin-in-more-ways-than-one\/#5d0f6a783c69"},{"issue":"3","key":"1553_CR4","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1080\/23738871.2019.1680720","volume":"4","author":"S Butler","year":"2019","unstructured":"Butler S (2019) Criminal use of cryptocurrencies: a great new threat or is cash still king? J Cyber Policy 4(3):326\u2013345. https:\/\/doi.org\/10.1080\/23738871.2019.1680720","journal-title":"J Cyber Policy"},{"issue":"5","key":"1553_CR5","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1093\/rfs\/hhz015","volume":"32","author":"S Foley","year":"2019","unstructured":"Foley S, Karlsen JR, Putni\u0146\u0161 TJ (2019) Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies? Rev Financ Stud 32(5):1798\u20131853","journal-title":"Rev Financ Stud"},{"key":"1553_CR6","unstructured":"Groysman I (2018) Revolution in Crime: How Cryptocurrencies Have Changed the Criminal Landscape, CUNY Academic Works. https:\/\/academicworks.cuny.edu\/jj_etds\/87"},{"key":"1553_CR7","doi-asserted-by":"crossref","unstructured":"Yeoh P (2019) Banks\u2019 vulnerabilities to money laundering activities. J Money Laund Control","DOI":"10.1108\/JMLC-05-2019-0040"},{"key":"1553_CR8","unstructured":"ERAZO F (2020) Bitcoin Activity on the Dark Web Grew by 65% in Q1 2020, Says Study. https:\/\/cointelegraph.com\/news\/bitcoin-activity-on-the-dark-web-grew-by-65-in-q1-2020-says-study. Accessed 12 Jan 2020"},{"key":"1553_CR9","doi-asserted-by":"crossref","unstructured":"Harlev MA, SunYin H, Langenheldt KC, Mukkamala R, Vatrapu R (2018) Breaking bad: De-anonymising entity types on the bitcoin blockchain using supervised machine learning. In: Proceedings of the 51st Hawaii International Conference on System Sciences, pp 3497\u20133506","DOI":"10.24251\/HICSS.2018.443"},{"key":"1553_CR10","doi-asserted-by":"publisher","unstructured":"Biryukov A, Khovratovich D, Pustogarov I (2014) Deanonymisation of clients in bitcoin p2p network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201914, pp. 15\u201329. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/2660267.2660379","DOI":"10.1145\/2660267.2660379"},{"key":"1553_CR11","unstructured":"Santamaria Ortega M (2013) The bitcoin transaction graph anonymity"},{"key":"1553_CR12","doi-asserted-by":"crossref","unstructured":"Spagnuolo M, Maggi F, Zanero S (2014) Bitiodine: Extracting intelligence from the bitcoin network. In: International Conference on Financial Cryptography and Data Security, pp. 457\u2013468. Springer","DOI":"10.1007\/978-3-662-45472-5_29"},{"key":"1553_CR13","unstructured":"Klusman R (2018) Deanonymisation in ethereum using existing methods for bitcoin"},{"key":"1553_CR14","doi-asserted-by":"crossref","unstructured":"B\u00e9res F, Seres IA, Bencz\u00far AA, Quintyne-Collins M (2020) Blockchain is watching you: Profiling and deanonymizing ethereum users. arXiv preprint arXiv:2005.14051","DOI":"10.1109\/DAPPS52256.2021.00013"},{"key":"1553_CR15","unstructured":"Victor F (2017) Address clustering heuristics for Ethereum"},{"issue":"3","key":"1553_CR16","first-page":"1","volume":"1","author":"J Abraham","year":"2018","unstructured":"Abraham J, Higdon D, Nelson J, Ibarra J (2018) Cryptocurrency price prediction using tweet volumes and sentiment analysis. SMU Data Sci Rev 1(3):1","journal-title":"SMU Data Sci Rev"},{"key":"1553_CR17","unstructured":"Chen M, Narwal N, Schultz M (2019) Predicting price changes in ethereum. International Journal on Computer Science and Engineering (IJCSE) ISSN, 0975\u20133397"},{"key":"1553_CR18","doi-asserted-by":"crossref","unstructured":"Kumar D, Rath S (2020) Predicting the trends of price for ethereum using deep learning techniques. In: Artificial Intelligence and Evolutionary Computations in Engineering Systems, pp. 103\u2013114. Springer","DOI":"10.1007\/978-981-15-0199-9_9"},{"issue":"3","key":"1553_CR19","first-page":"1","volume":"1","author":"C Lamon","year":"2017","unstructured":"Lamon C, Nielsen E, Redondo E (2017) Cryptocurrency price prediction using news and social media sentiment. SMU Data Sci Rev 1(3):1\u201322","journal-title":"SMU Data Sci Rev"},{"key":"1553_CR20","doi-asserted-by":"crossref","unstructured":"Chen T, Zhu Y, Li Z, Chen J, Li X, Luo X, Lin X, Zhange X (2018) Understanding ethereum via graph analysis. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp 1484\u20131492. IEEE","DOI":"10.1109\/INFOCOM.2018.8486401"},{"key":"1553_CR21","unstructured":"Wil (2019) Ethereum 101, Externally Owned Accounts (EOAs). https:\/\/kauri.io\/ethereum-101-part-4-accounts-transactions-and-me\/7e79b6932f8a41a4bcbbd194fd2fcc3a\/a"},{"key":"1553_CR22","doi-asserted-by":"crossref","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557\u2013564","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"1553_CR23","doi-asserted-by":"crossref","unstructured":"Wahab A, Mehmood W (2018) Survey of consensus protocols. CoRR abs\/1810.03357 arXiv:1810.03357","DOI":"10.2139\/ssrn.3556482"},{"key":"1553_CR24","unstructured":"Qian C, Ouyang K (2015) Predicting bitcoin transactions from blockchain records through recursive clustering"},{"key":"1553_CR25","doi-asserted-by":"crossref","unstructured":"Ron D, Shamir A (2013) Quantitative analysis of the full bitcoin transaction graph. In: International Conference on Financial Cryptography and Data Security, pp 6\u201324. Springer","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"1553_CR26","doi-asserted-by":"crossref","unstructured":"Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2013) A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp 127\u2013140","DOI":"10.1145\/2504730.2504747"},{"key":"1553_CR27","doi-asserted-by":"crossref","unstructured":"Jourdan M, Blandin S, Wynter L, Deshpande P (2018) Characterizing entities in the bitcoin blockchain. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW), pp 55\u201362. IEEE","DOI":"10.1109\/ICDMW.2018.00016"},{"key":"1553_CR28","doi-asserted-by":"crossref","unstructured":"Ermilov D, Panov M, Yanovich Y (2017) Automatic bitcoin address clustering. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 461\u2013466. IEEE","DOI":"10.1109\/ICMLA.2017.0-118"},{"key":"1553_CR29","doi-asserted-by":"crossref","unstructured":"Wu J, Lin D, Zheng Z, Yuan Q (2019) T-edge: Temporal weighted multidigraph embedding for ethereum transaction network analysis. arXiv preprint arXiv:1905.08038","DOI":"10.3389\/fphy.2020.00204"},{"key":"1553_CR30","doi-asserted-by":"crossref","unstructured":"Ferretti S, D\u2019Angelo G (2019) On the ethereum blockchain structure: A complex networks theory perspective. Concurr Comput Pract Exp 5493","DOI":"10.1002\/cpe.5493"},{"key":"1553_CR31","doi-asserted-by":"crossref","unstructured":"Chan W, Olmsted A (2017) Ethereum transaction graph analysis. In: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), pp 498\u2013500. IEEE","DOI":"10.23919\/ICITST.2017.8356459"},{"key":"1553_CR32","unstructured":"Higgins S (2016) Gatecoin Hack. https:\/\/www.coindesk.com\/gatecoin-2-million-bitcoin-ether-security-breach"},{"key":"1553_CR33","doi-asserted-by":"crossref","unstructured":"Chen W, Zheng Z, Cui J, Ngai E, Zheng P, Zhou Y (2018) Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference, pp 1409\u20131418","DOI":"10.1145\/3178876.3186046"},{"key":"1553_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.08.023","author":"L Liu","year":"2021","unstructured":"Liu L, Tsai W-T, Bhuiyan MZA, Peng H, Liu M (2021) Blockchain-enabled fraud discovery through abnormal smart contract detection on ethereum. Futur Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2021.08.023","journal-title":"Futur Gener Comput Syst"},{"key":"1553_CR35","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.future.2019.08.014","volume":"102","author":"M Bartoletti","year":"2020","unstructured":"Bartoletti M, Carta S, Cimoli T, Saia R (2020) Dissecting ponzi schemes on ethereum: Identification, analysis, and impact. Futur Gener Comput Syst 102:259\u2013277. https:\/\/doi.org\/10.1016\/j.future.2019.08.014","journal-title":"Futur Gener Comput Syst"},{"key":"1553_CR36","unstructured":"Payette J, Schwager S, Murphy JW (2017) Characterizing the ethereum address space"},{"key":"1553_CR37","unstructured":"Day A (2018) Ethereum Dataset hosted on Google BigQuery. https:\/\/cloud.google.com\/blog\/products\/data-analytics\/ethereum-bigquery-public-dataset-smart-contract-analytics"},{"key":"1553_CR38","unstructured":"Etherscan: Dex label (2020) https:\/\/etherscan.io\/accounts\/label\/dex"},{"key":"1553_CR39","unstructured":"Etherscan: Exchange label (2020) https:\/\/etherscan.io\/accounts\/label\/exchange"},{"key":"1553_CR40","unstructured":"Etherscan: Mining label (2020) https:\/\/etherscan.io\/accounts\/label\/mining"},{"key":"1553_CR41","unstructured":"Etherscan: ICO wallet label (2020) https:\/\/etherscan.io\/accounts\/label\/ico-wallets"},{"key":"1553_CR42","unstructured":"Etherscan: Walletapp label (2020) https:\/\/etherscan.io\/accounts\/label\/wallet-app"},{"key":"1553_CR43","unstructured":"Etherscan: Mining label (2020) https:\/\/etherscan.io\/accounts\/label\/bitfinex"},{"key":"1553_CR44","unstructured":"Etherscan: Compromised label (2020) https:\/\/etherscan.io\/accounts\/label\/compromised"},{"key":"1553_CR45","unstructured":"Etherscan: Mining label (2020) https:\/\/etherscan.io\/accounts\/label\/shapeshift"},{"key":"1553_CR46","unstructured":"Etherscan: Mining label (2020) https:\/\/etherscan.io\/accounts\/label\/phish-hack"},{"key":"1553_CR47","unstructured":"Kastner E (2020) HISTORY OF THE DARK WEB. https:\/\/www.soscanhelp.com\/blog\/history-of-the-dark-web"},{"key":"1553_CR48","unstructured":"NIG (2020) Taking on the Dark Web: Law Enforcement Experts ID Investigative Needs. https:\/\/nij.ojp.gov\/topics\/articles\/taking-dark-web-law-enforcement-experts-id-investigative-needs"},{"key":"1553_CR49","doi-asserted-by":"crossref","unstructured":"Goodison SE, Woods D, Barnum JD, Kemerer AR, Jackson BA (2019) Identifying law enforcement needs for conducting criminal investigations involving evidence on the dark web","DOI":"10.7249\/RR2704"},{"key":"1553_CR50","doi-asserted-by":"crossref","unstructured":"Lee S, Yoon C, Kang H, Kim Y, Kim Y, Han D, Son S, Shin S (2019) Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web. In: Network and Distributed System Security Symposium, pp 1\u201315. Internet Society","DOI":"10.14722\/ndss.2019.23055"},{"key":"1553_CR51","unstructured":"Daniel: Daniel Page (2020) http:\/\/danielas3rtn54uwmofdo3x2bsdifr47huasnmbgqzfrec5ubupvtpid.onion.ly\/. Accessed 15 Nov 2020"},{"key":"1553_CR52","unstructured":"Tor: Donations for Tor Development (2020) https:\/\/onionsearchengine.com\/donation.php. Accessed 4 Feb 2021"},{"key":"1553_CR53","unstructured":"Tor: Guerrilamail (2020) http:\/\/grrmailb3fxpjbwm.onion.ly. Accessed 4 Feb 2021"},{"key":"1553_CR54","unstructured":"Etherscan: Word Label Cloud (2020) https:\/\/etherscan.io\/labelcloud"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01553-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01553-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01553-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T15:57:23Z","timestamp":1712073443000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-023-01553-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,13]]},"references-count":54,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["1553"],"URL":"https:\/\/doi.org\/10.1007\/s12083-023-01553-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,13]]},"assertion":[{"value":"28 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"On the basis of their contribution, all authors agree to participate.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"This publication has been consented to by all authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The Authors do not have any conflict to declare.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest\/Competing interests"}}]}}