{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:49:29Z","timestamp":1761130169141,"version":"3.40.4"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01829-1","type":"journal-article","created":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T06:48:38Z","timestamp":1734072518000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Unveiling bitcoin network attack using deep reinforcement learning with Boltzmann exploration"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2907-1294","authenticated-orcid":false,"given":"Monali","family":"Shetty","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9350-1549","authenticated-orcid":false,"given":"Sharvari","family":"Tamane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,13]]},"reference":[{"key":"1829_CR1","doi-asserted-by":"crossref","unstructured":"Al-Haija QA (2022) Time-series analysis of cryptocurrency price: Bitcoin as a case study. In International Conference on Electrical Engineering, Computer and Information Technology (ICEECIT) (pp. 49\u201353). IEEE. (2022)","DOI":"10.1109\/ICEECIT55908.2022.10030536"},{"key":"1829_CR2","doi-asserted-by":"publisher","first-page":"101568","DOI":"10.1016\/j.cose.2019.101568","volume":"87","author":"LY Connolly","year":"2019","unstructured":"Connolly LY, Wall DS (2019) The rise of crypto-ransomware in a changing cybercrime landscape: taxonomising countermeasures. Computers Secur 87:101568","journal-title":"Computers Secur"},{"issue":"2","key":"1829_CR3","first-page":"136","volume":"19","author":"S Kok","year":"2019","unstructured":"Kok S, Abdullah A, Jhanjhi N, Supramaniam M (2019) Ransomware, threat and detection techniques: a review. Int J Comput Sci Netw Secur 19(2):136","journal-title":"Int J Comput Sci Netw Secur"},{"key":"1829_CR4","doi-asserted-by":"crossref","unstructured":"Badawi AA, Al-Haija QA (2021) Detection of money laundering in bitcoin transactions. In 4th Smart Cities Symposium (SCS 2021) (Vol. pp. 458\u2013464). IET. (2021)","DOI":"10.1049\/icp.2022.0387"},{"issue":"5","key":"1829_CR5","doi-asserted-by":"publisher","first-page":"1837","DOI":"10.3390\/s22051837","volume":"22","author":"A Alqahtani","year":"2022","unstructured":"Alqahtani A, Sheldon FT (2022) A survey of crypto ransomware attack detection methodologies: an evolving outlook. Sensors 22(5):1837","journal-title":"Sensors"},{"issue":"1","key":"1829_CR6","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1108\/JMLC-08-2017-0041","volume":"22","author":"AS Irwin","year":"2019","unstructured":"Irwin AS, Dawson C (2019) Following the cyber money trail: global challenges when investigating ransomware attacks and how regulation can help. J Money Laundering Control 22(1):110\u2013131","journal-title":"J Money Laundering Control"},{"issue":"10","key":"1829_CR7","doi-asserted-by":"publisher","first-page":"2509","DOI":"10.3390\/en13102509","volume":"13","author":"K Shaukat","year":"2020","unstructured":"Shaukat K, Luo S, Varadharajan V, Hameed IA, Chen S, Liu D, Li J (2020) Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies 13(10):2509","journal-title":"Energies"},{"key":"1829_CR8","first-page":"102646","volume":"55","author":"SH Kok","year":"2020","unstructured":"Kok SH, Azween A, Jhanjhi NZ (2020) Evaluation metric for crypto-ransomware detection using machine learning. J Inform Secur Appl 55:102646","journal-title":"J Inform Secur Appl"},{"key":"1829_CR9","doi-asserted-by":"crossref","unstructured":"Ding Z, Huang Y, Yuan H, Dong H (2020) Introduction to reinforcement learning. Deep reinforcement learning: fundamentals, research and applications, 47\u2013123","DOI":"10.1007\/978-981-15-4095-0_2"},{"issue":"5","key":"1829_CR10","doi-asserted-by":"publisher","first-page":"1984","DOI":"10.1016\/j.jksuci.2020.06.012","volume":"34","author":"SH Kok","year":"2022","unstructured":"Kok SH, Abdullah A, Jhanjhi NZ (2022) Early detection of crypto-ransomware using pre-encryption detection algorithm. J King Saud University-Computer Inform Sci 34(5):1984\u20131999","journal-title":"J King Saud University-Computer Inform Sci"},{"key":"1829_CR11","doi-asserted-by":"crossref","unstructured":"Sathya T, Keertika N, Shwetha S, Upodhyay D, Muzafar H (2023) Bitcoin Heist Ransomware Attack Prediction Using Data Science Process. In E3S Web of Conferences (Vol. 399, p. 04056). EDP Sciences","DOI":"10.1051\/e3sconf\/202339904056"},{"key":"1829_CR12","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.future.2019.06.005","volume":"101","author":"BAS Al-rimy","year":"2019","unstructured":"Al-rimy BAS, Maarof MA, Shaid SZM (2019) Crypto-Ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection. Future Generation Comput Syst 101:476\u2013491","journal-title":"Future Generation Comput Syst"},{"key":"1829_CR13","first-page":"102923","volume":"61","author":"K Sethi","year":"2021","unstructured":"Sethi K, Madhav YV, Kumar R, Bera P (2021) Attention based multi-agent intrusion detection systems using reinforcement learning. J Inform Secur Appl 61:102923","journal-title":"J Inform Secur Appl"},{"key":"1829_CR14","unstructured":"Sutton RS (2018) Reinforcement learning: an introduction. A Bradford Book"},{"issue":"13\u201315","key":"1829_CR15","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1016\/j.neucom.2007.11.040","volume":"71","author":"Y Achbany","year":"2008","unstructured":"Achbany Y, Fouss F, Yen L, Pirotte A, Saerens M (2008) Tuning continual exploration in reinforcement learning: an optimality property of the Boltzmann strategy. Neurocomputing 71(13\u201315):2507\u20132520","journal-title":"Neurocomputing"},{"key":"1829_CR16","doi-asserted-by":"crossref","unstructured":"Wang S, Pu Y, Yang S, Yao X, Li B (2020) Boltzmann Exploration for Deterministic Policy Optimization. In Neural Information Processing: 27th International Conference, ICONIP Bangkok, Thailand, November 23\u201327, 2020, Proceedings, Part II 27 (pp. 214\u2013222). Springer International Publishing. (2020)","DOI":"10.1007\/978-3-030-63833-7_18"},{"key":"1829_CR17","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.comnet.2019.01.023","volume":"151","author":"KA Da Costa","year":"2019","unstructured":"Da Costa KA, Papa JP, Lisboa CO, Munoz R, de Albuquerque VHC (2019) Internet of things: a survey on machine learning-based intrusion detection approaches. Comput Netw 151:147\u2013157","journal-title":"Comput Netw"},{"key":"1829_CR18","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.cose.2018.11.001","volume":"81","author":"D Ucci","year":"2019","unstructured":"Ucci D, Aniello L, Baldoni R (2019) Survey of machine learning techniques for malware analysis. Computers Secur 81:123\u2013147","journal-title":"Computers Secur"},{"key":"1829_CR19","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.1016\/j.neucom.2017.10.009","volume":"275","author":"D Ding","year":"2018","unstructured":"Ding D, Han QL, Xiang Y, Ge X, Zhang XM (2018) A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275:1674\u20131683","journal-title":"Neurocomputing"},{"issue":"2","key":"1829_CR20","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/s10462-021-09997-9","volume":"55","author":"B Singh","year":"2022","unstructured":"Singh B, Kumar R, Singh VP (2022) Reinforcement learning in robotic applications: a comprehensive survey. Artif Intell Rev 55(2):945\u2013990","journal-title":"Artif Intell Rev"},{"key":"1829_CR21","doi-asserted-by":"crossref","unstructured":"Jeerige A, Bein D, Verma A (2019) Comparison of deep reinforcement learning approaches for intelligent game playing. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0366\u20130371). IEEE","DOI":"10.1109\/CCWC.2019.8666545"},{"issue":"11","key":"1829_CR22","doi-asserted-by":"publisher","first-page":"e1010695","DOI":"10.1371\/journal.pcbi.1010695","volume":"18","author":"NJ Treloar","year":"2022","unstructured":"Treloar NJ, Braniff N, Ingalls B, Barnes CP (2022) Deep reinforcement learning for optimal experimental design in biology. PLoS Comput Biol 18(11):e1010695","journal-title":"PLoS Comput Biol"},{"key":"1829_CR23","doi-asserted-by":"crossref","unstructured":"Feng M, Xu H (2017) Deep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack. In 2017 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 1\u20138). IEEE","DOI":"10.1109\/SSCI.2017.8285298"},{"issue":"12","key":"1829_CR24","doi-asserted-by":"publisher","first-page":"2823","DOI":"10.1109\/TSE.2020.2969178","volume":"47","author":"Y Yamagata","year":"2020","unstructured":"Yamagata Y, Liu S, Akazaki T, Duan Y, Hao J (2020) Falsification of cyber-physical systems using deep reinforcement learning. IEEE Trans Software Eng 47(12):2823\u20132840","journal-title":"IEEE Trans Software Eng"},{"key":"1829_CR25","doi-asserted-by":"crossref","unstructured":"Xu X, Luo Y (2007) A kernel-based reinforcement learning approach to dynamic behavior modeling of intrusion detection. In International Symposium on Neural Networks (pp. 455\u2013464). Berlin, Heidelberg: Springer Berlin Heidelberg","DOI":"10.1007\/978-3-540-72383-7_54"},{"key":"1829_CR26","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.engappai.2014.02.001","volume":"32","author":"S Shamshirband","year":"2014","unstructured":"Shamshirband S, Patel A, Anuar NB, Kiah MLM, Abraham A (2014) Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng Appl Artif Intell 32:228\u2013241","journal-title":"Eng Appl Artif Intell"},{"key":"1829_CR27","unstructured":"Moreno DL, Regueiro CV, Iglesias R, Barro S (2004) Using prior knowledge to improve reinforcement learning in mobile robotics. Proc. Towards Autonomous Robotics Systems. Univ. of Essex, UK, 33"},{"key":"1829_CR28","doi-asserted-by":"crossref","unstructured":"Cahyani NDW, Nuha HH (2021) Ransomware detection on bitcoin transactions using artificial neural network methods. In 9th International Conference on Information and Communication Technology (ICoICT) (pp. 1\u20135). IEEE. (2021)","DOI":"10.1109\/ICoICT52021.2021.9527414"},{"key":"1829_CR29","doi-asserted-by":"publisher","first-page":"144925","DOI":"10.1109\/ACCESS.2019.2945839","volume":"7","author":"E Berrueta","year":"2019","unstructured":"Berrueta E, Morato D, Maga\u00f1a E, Izal M (2019) A survey on detection techniques for cryptographic ransomware. IEEE Access 7:144925\u2013144944","journal-title":"IEEE Access"},{"key":"1829_CR30","doi-asserted-by":"publisher","first-page":"47053","DOI":"10.1109\/ACCESS.2019.2907485","volume":"7","author":"AO Almashhadani","year":"2019","unstructured":"Almashhadani AO, Kaiiali M, Sezer S, O\u2019Kane P (2019) A multi-classifier network-based crypto ransomware detection system: a case study of locky ransomware. IEEE Access 7:47053\u201347067","journal-title":"IEEE Access"},{"issue":"2","key":"1829_CR31","doi-asserted-by":"publisher","first-page":"e192","DOI":"10.1002\/spy2.192","volume":"5","author":"K Martin","year":"2022","unstructured":"Martin K, Rahouti M, Ayyash M, Alsmadi I (2022) Anomaly detection in blockchain using network representation and machine learning. Secur Priv 5(2):e192","journal-title":"Secur Priv"},{"issue":"1","key":"1829_CR32","first-page":"6274260","volume":"2023","author":"SA Alsaif","year":"2023","unstructured":"Alsaif SA (2023) Machine learning-based ransomware classification of Bitcoin transactions. Appl Comput Intell Soft Comput 2023(1):6274260","journal-title":"Appl Comput Intell Soft Comput"},{"key":"1829_CR33","doi-asserted-by":"crossref","unstructured":"Liao K, Zhao Z, Doup\u00e9 A, Ahn GJ (2016) Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin. In 2016 APWG symposium on electronic crime research (eCrime) (pp. 1\u201313). IEEE","DOI":"10.1109\/ECRIME.2016.7487938"},{"issue":"1","key":"1829_CR34","doi-asserted-by":"publisher","first-page":"5","DOI":"10.25271\/sjuoz.2022.10.1.865","volume":"10","author":"HS Talabani","year":"2022","unstructured":"Talabani HS, Abdulhadi HMT (2022) Bitcoin ransomware detection employing rule-based algorithms. Sci J Univ Zakho 10(1):5\u201310","journal-title":"Sci J Univ Zakho"},{"key":"1829_CR35","doi-asserted-by":"crossref","unstructured":"Akcora CG, Li Y, Gel YR, Kantarcioglu M (1906) Bitcoinheist: Topological data analysis for ransomware detection on the bitcoin blockchain. arXiv preprint arXiv:07852. (2019)","DOI":"10.24963\/ijcai.2020\/612"},{"key":"1829_CR36","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"issue":"2","key":"1829_CR37","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1080\/23080477.2022.2152933","volume":"11","author":"J Manokaran","year":"2023","unstructured":"Manokaran J, Vairavel G (2023) GIWRF-SMOTE: Gini impurity-based weighted random forest with SMOTE for effective malware attack and anomaly detection in IoT-Edge. Smart Sci 11(2):276\u2013292","journal-title":"Smart Sci"},{"issue":"17","key":"1829_CR38","doi-asserted-by":"publisher","first-page":"2113","DOI":"10.3390\/electronics10172113","volume":"10","author":"QA Al-Haija","year":"2021","unstructured":"Al-Haija QA, Alsulami AA (2021) High performance classification model to identify ransomware payments for heterogeneous bitcoin networks. Electronics 10(17):2113","journal-title":"Electronics"},{"key":"1829_CR39","doi-asserted-by":"crossref","unstructured":"Lee C, Maharjan S, Ko K, Woo J, Hong JWK (2020) Machine learning based bitcoin address classification. In Blockchain and Trustworthy Systems: Second International Conference, BlockSys Dali, China, August 6\u20137, 2020, Revised Selected Papers 2 (pp. 517\u2013531). Springer Singapore. (2020)","DOI":"10.1007\/978-981-15-9213-3_40"},{"key":"1829_CR40","doi-asserted-by":"crossref","unstructured":"Cahyani, N. D. W., Nuha, H. H.: Ransomware detection on bitcoin transactions using artificial neural network methods. In 2021 9th International Conference on Information and Communication Technology (ICoICT) (pp. 1-5). IEEE. (2021).","DOI":"10.1109\/ICoICT52021.2021.9527414"},{"key":"1829_CR41","doi-asserted-by":"crossref","unstructured":"Goyal PS, Kakkar A, Vinod G, Joseph G (2020) Crypto-ransomware detection using behavioural analysis. In Reliability, Safety and Hazard Assessment for Risk-Based Technologies: Proceedings of ICRESH 2019 (pp. 239\u2013251). Springer Singapore","DOI":"10.1007\/978-981-13-9008-1_20"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01829-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01829-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01829-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T13:47:52Z","timestamp":1746193672000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01829-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,13]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1829"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01829-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2024,12,13]]},"assertion":[{"value":"5 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All the authors involved have agreed to participate in this submitted article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Consent to participate"}},{"value":"All the authors involved in this manuscript give full consent for publication of this submitted article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Authors declare that they have no conflict of interest.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"47"}}