{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T09:59:25Z","timestamp":1774173565418,"version":"3.50.1"},"reference-count":65,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100024370","name":"Ministero dell'Istruzione dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}],"id":[{"id":"10.13039\/501100024370","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009112","name":"Istituto Nazionale di Alta Matematica \"Francesco Severi\"","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009112","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017142","name":"Gruppo Nazionale per il Calcolo Scientifico","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100017142","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.comnet.2026.112166","type":"journal-article","created":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T20:38:18Z","timestamp":1772483898000},"page":"112166","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Toward estimating speculation in a cryptocurrency transaction network: The Polkadot case study"],"prefix":"10.1016","volume":"280","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8237-0539","authenticated-orcid":false,"given":"Maurantonio","family":"Caprolu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1909-0336","authenticated-orcid":false,"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0723-7847","authenticated-orcid":false,"given":"Flavio","family":"Lombardi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8391-2563","authenticated-orcid":false,"given":"Elia","family":"Onofri","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2026.112166_bib0001","doi-asserted-by":"crossref","first-page":"9451","DOI":"10.1109\/ACCESS.2023.3240103","article-title":"On the vital aspects and characteristics of cryptocurrency\u2014a survey","volume":"11","author":"Shahen Shah","year":"2023","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.comnet.2026.112166_bib0002","doi-asserted-by":"crossref","first-page":"1196","DOI":"10.1109\/TEM.2019.2948861","article-title":"Trust in blockchain cryptocurrency ecosystem","volume":"67","author":"Rehman","year":"2020","journal-title":"IEEE Trans. Eng. Manage."},{"issue":"2","key":"10.1016\/j.comnet.2026.112166_bib0003","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1108\/JMLC-12-2017-0074","article-title":"The use of cryptocurrencies in the money laundering process","volume":"22","author":"Albrecht","year":"2019","journal-title":"J. Money Laundering Control"},{"issue":"1","key":"10.1016\/j.comnet.2026.112166_bib0004","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1108\/JFC-06-2020-0113","article-title":"Money laundering with cryptocurrency: open doors and the regulatory dialectic","volume":"28","author":"Dupuis","year":"2020","journal-title":"J. Financ. Crime"},{"key":"10.1016\/j.comnet.2026.112166_bib0005","doi-asserted-by":"crossref","first-page":"148353","DOI":"10.1109\/ACCESS.2021.3123894","article-title":"Cryptocurrency scams: analysis and perspectives","volume":"9","author":"Bartoletti","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112166_bib0006","series-title":"New Dimensions of Information Warfare","volume":"84","author":"Di Pietro","year":"2021"},{"key":"10.1016\/j.comnet.2026.112166_bib0007","series-title":"Problems of Monetary Management: The UK Experience","first-page":"91","author":"Goodhart","year":"1984"},{"key":"10.1016\/j.comnet.2026.112166_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2021.126405","article-title":"Do cryptocurrency exchanges fake trading volumes? An empirical analysis of wash trading based on data mining","volume":"586","author":"Chen","year":"2022","journal-title":"Phys. A"},{"key":"10.1016\/j.comnet.2026.112166_bib0009","article-title":"Wash trading at cryptocurrency exchanges","volume":"43","author":"Pennec","year":"2021","journal-title":"Fin. Res. Lett."},{"key":"10.1016\/j.comnet.2026.112166_bib0010","series-title":"28th USENIX Security Symp.)","first-page":"1609","article-title":"The anatomy of a cryptocurrency pump-and-dump scheme","author":"Xu","year":"2019"},{"issue":"1","key":"10.1016\/j.comnet.2026.112166_bib0011","doi-asserted-by":"crossref","DOI":"10.1145\/3561300","article-title":"The doge of wall street: analysis and detection of pump and dump cryptocurrency manipulations","volume":"23","author":"La Morgia","year":"2023","journal-title":"ACM Trans. Internet Technol."},{"key":"10.1016\/j.comnet.2026.112166_bib0012","unstructured":"C. Campajola, R. Cristodaro, F.M. De Collibus, T. Yan, N. Vallarano, C.J. Tessone, The evolution of centralisation on cryptocurrency platforms, 2023, 10.48550\/ARXIV.2206.05081."},{"key":"10.1016\/j.comnet.2026.112166_bib0013","series-title":"Proceedings of the 13th International RAIS Conference on Social Sciences and Humanities","first-page":"268","article-title":"An examination of cryptocurrency from inception to future state","author":"Kramer","year":"2019"},{"key":"10.1016\/j.comnet.2026.112166_bib0014","series-title":"Proceedings of the 35th ACM Conference on Hypertext and Social Media","first-page":"388","article-title":"Open challenges in online social networks (OASIS)","author":"Guidi","year":"2024"},{"key":"10.1016\/j.comnet.2026.112166_bib0015","series-title":"Proceedings of the ACM Web Conference 2022","first-page":"1475","article-title":"Generating simple directed social network graphs for information spreading","author":"Schweimer","year":"2022"},{"issue":"4","key":"10.1016\/j.comnet.2026.112166_bib0016","doi-asserted-by":"crossref","DOI":"10.1145\/3008662","article-title":"Exploring and analyzing the tor hidden services graph","volume":"11","author":"Bernaschi","year":"2017","journal-title":"ACM Trans. Web"},{"issue":"4","key":"10.1016\/j.comnet.2026.112166_bib0017","doi-asserted-by":"crossref","DOI":"10.1145\/1841909.1841913","article-title":"Fast and compact web graph representations","volume":"4","author":"Claude","year":"2010","journal-title":"ACM Trans. Web"},{"issue":"2","key":"10.1016\/j.comnet.2026.112166_bib0018","doi-asserted-by":"crossref","DOI":"10.1145\/1513876.1513879","article-title":"Extraction and classification of dense implicit communities in the web graph","volume":"3","author":"Dourisboure","year":"2009","journal-title":"ACM Trans. Web"},{"issue":"4","key":"10.1016\/j.comnet.2026.112166_bib0019","doi-asserted-by":"crossref","DOI":"10.1145\/3396374","article-title":"Foundations, properties, and security applications of puzzles: a survey","volume":"53","author":"Ali","year":"2020","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10.1016\/j.comnet.2026.112166_bib0020","series-title":"Financial Cryptography and Data Security. FC 2024 International Workshops","first-page":"253","article-title":"Ethereum proof-of-stake consensus layer: participation and decentralization","author":"Grandjean","year":"2025"},{"key":"10.1016\/j.comnet.2026.112166_bib0021","article-title":"Cryptocurrencies activity as a complex network: analysis of transactions graphs","author":"Serena","year":"2021","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"1","key":"10.1016\/j.comnet.2026.112166_bib0022","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41109-019-0163-y","article-title":"The bow tie structure of the bitcoin users graph","volume":"4","author":"Maesa","year":"2019","journal-title":"Appl. Netw. Sci."},{"issue":"2","key":"10.1016\/j.comnet.2026.112166_bib0023","doi-asserted-by":"crossref","DOI":"10.1145\/3381036","article-title":"Understanding ethereum via graph analysis","volume":"20","author":"Chen","year":"2020","journal-title":"ACM Trans. Internet Technol."},{"key":"10.1016\/j.comnet.2026.112166_bib0024","series-title":"2022 IEEE International Conference on Blockchain (Blockchain)","first-page":"250","article-title":"Graph analysis of the ethereum blockchain data: a survey of datasets, methods, and future work","author":"Khan","year":"2022"},{"key":"10.1016\/j.comnet.2026.112166_bib0025","series-title":"2016 Intl IEEE UIC","first-page":"368","article-title":"The unreasonable effectiveness of address clustering","author":"Harrigan","year":"2016"},{"key":"10.1016\/j.comnet.2026.112166_bib0026","series-title":"Financial Cryptography and Data Security","first-page":"155","article-title":"Could network information facilitate address clustering in bitcoin?","author":"Neudecker","year":"2017"},{"key":"10.1016\/j.comnet.2026.112166_bib0027","series-title":"Proceedings of the ACM Web Conference 2024","first-page":"1880","article-title":"Exploring unconfirmed transactions for effective bitcoin address clustering","author":"Wang","year":"2024"},{"key":"10.1016\/j.comnet.2026.112166_bib0028","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2019.101684","article-title":"Deanonymizing tor hidden service users through bitcoin transactions analysis","volume":"89","author":"Jawaheri","year":"2020","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2026.112166_bib0029","series-title":"Proceedings of the ACM Web Conference 2024","first-page":"4429","article-title":"DenseFlow: spotting cryptocurrency money laundering in ethereum transaction graphs","author":"Lin","year":"2024"},{"key":"10.1016\/j.comnet.2026.112166_bib0030","series-title":"Proceedings of the Web Conference 2021","first-page":"33","article-title":"Towards understanding and demystifying bitcoin mixing services","author":"Wu","year":"2021"},{"key":"10.1016\/j.comnet.2026.112166_bib0031","series-title":"Proceedings of the Web Conference 2020","first-page":"1411","article-title":"Traveling the token world: a graph analysis of ethereum ERC20 token ecosystem","author":"Chen","year":"2020"},{"issue":"1","key":"10.1016\/j.comnet.2026.112166_bib0032","doi-asserted-by":"crossref","DOI":"10.1145\/3623376","article-title":"Understanding rug pulls: an in-depth behavioral analysis of fraudulent NFT creators","volume":"18","author":"Sharma","year":"2023","journal-title":"ACM Trans. Web"},{"key":"10.1016\/j.comnet.2026.112166_bib0033","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111123","article-title":"Pheromone-based graph embedding algorithm for ethereum phishing detection","volume":"260","author":"Xiao","year":"2025","journal-title":"Comput. Netw."},{"issue":"11","key":"10.1016\/j.comnet.2026.112166_bib0034","first-page":"2737","article-title":"Modeling and understanding ethereum transaction records via a complex network approach","volume":"67","author":"Lin","year":"2020","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"10.1016\/j.comnet.2026.112166_bib0035","series-title":"Proceedings of Blockchain Kaigi 2022 (BCK22)","article-title":"The evolving liaisons between the transaction networks of bitcoin and its price dynamics","author":"Bovet","year":"2023"},{"key":"10.1016\/j.comnet.2026.112166_bib0036","series-title":"IEEE ICBC","article-title":"Graph-centric crypto price prediction","author":"Kleitsikas","year":"2023"},{"issue":"15","key":"10.1016\/j.comnet.2026.112166_bib0037","doi-asserted-by":"crossref","first-page":"4284","DOI":"10.1016\/j.comnet.2007.06.004","article-title":"Sampling large internet topologies for simulation purposes","volume":"51","author":"Krishnamurthy","year":"2007","journal-title":"Comput. Netw."},{"issue":"1","key":"10.1016\/j.comnet.2026.112166_bib0038","first-page":"73","article-title":"Graph contraction for mapping data on parallel computers: a quality\u2013cost tradeoff","volume":"3","author":"Ponnusamy","year":"1994","journal-title":"Sci. Program."},{"key":"10.1016\/j.comnet.2026.112166_bib0039","series-title":"Experimental Algorithms","first-page":"351","article-title":"Partitioning complex networks via size-constrained clustering","author":"Meyerhenke","year":"2014"},{"issue":"2","key":"10.1016\/j.comnet.2026.112166_bib0040","doi-asserted-by":"crossref","DOI":"10.1145\/3379347","article-title":"A critical survey of the multilevel method in complex networks","volume":"53","author":"Valejo","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.comnet.2026.112166_bib0041","unstructured":"E. Onofri, A Mathematical Formalisation of the \u03b3-contraction Problem, 2024, 2404.12080."},{"key":"10.1016\/j.comnet.2026.112166_bib0042","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.dss.2016.12.001","article-title":"The technology and economic determinants of cryptocurrency exchange rates: the case of bitcoin","volume":"95","author":"Li","year":"2017","journal-title":"Decis. Support Syst."},{"key":"10.1016\/j.comnet.2026.112166_bib0043","series-title":"Proc WWW","first-page":"23","article-title":"Detecting and quantifying wash trading on decentralized cryptocurrency exchanges","author":"Victor","year":"2021"},{"key":"10.1016\/j.comnet.2026.112166_bib0044","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.101993","article-title":"Characterizing cryptocurrency exchange scams","volume":"98","author":"Xia","year":"2020","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2026.112166_bib0045","series-title":"Proceedings of the ACM Web Conference 2024","first-page":"99","article-title":"Identifying risky vendors in cryptocurrency P2P marketplaces","author":"Tsuchiya","year":"2024"},{"issue":"3","key":"10.1016\/j.comnet.2026.112166_bib0046","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/MNET.2023.3321546","article-title":"Web3 technologies: challenges and opportunities","volume":"38","author":"Liu","year":"2024","journal-title":"IEEE Netw."},{"key":"10.1016\/j.comnet.2026.112166_bib0047","series-title":"2023 IEEE ICBC","article-title":"The web3 financial de-revolution: mapping the impact of centralization on exchanges and decentralization as a survival mechanism","author":"Gage","year":"2023"},{"key":"10.1016\/j.comnet.2026.112166_bib0048","series-title":"Financial Cryptography and Data Security","first-page":"457","article-title":"BitIodine: extracting intelligence from the bitcoin network","author":"Spagnuolo","year":"2014"},{"issue":"4","key":"10.1016\/j.comnet.2026.112166_bib0049","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/2896384","article-title":"A fistful of bitcoins: characterizing payments among men with no names","volume":"59","author":"Meiklejohn","year":"2016","journal-title":"Commun. ACM"},{"issue":"1","key":"10.1016\/j.comnet.2026.112166_bib0050","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1109\/TVCG.2018.2864814","article-title":"BitExTract: interactive visualization for extracting bitcoin exchange intelligence","volume":"25","author":"Yue","year":"2019","journal-title":"IEEE Trans. Vis. Comput. Graphics"},{"key":"10.1016\/j.comnet.2026.112166_bib0051","series-title":"Financial Cryptography and Data Security","first-page":"248","article-title":"Exchange pattern mining in the bitcoin transaction directed hypergraph","author":"Ranshous","year":"2017"},{"key":"10.1016\/j.comnet.2026.112166_bib0052","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2022.127799","article-title":"On-chain analysis-based detection of abnormal transaction amount on cryptocurrency exchanges","volume":"604","author":"Gu","year":"2022","journal-title":"Phys. A"},{"key":"10.1016\/j.comnet.2026.112166_bib0053","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.109378","article-title":"An overview on cross-chain: mechanism, platforms, challenges and advances","volume":"218","author":"Ou","year":"2022","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2026.112166_bib0054","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108488","article-title":"Survey of crosschain communications protocols","volume":"200","author":"Robinson","year":"2021","journal-title":"Comput. Netw."},{"issue":"2327","key":"10.1016\/j.comnet.2026.112166_bib0055","first-page":"4662","article-title":"Polkadot: vision for a heterogeneous multi-chain framework","volume":"21","author":"Wood","year":"2016","journal-title":"White Paper"},{"key":"10.1016\/j.comnet.2026.112166_bib0056","series-title":"Companion Proceedings of the ACM Web Conference 2024","first-page":"1776","article-title":"Seamlessly transferring assets through layer-0 bridges: an empirical analysis of stargate Bridge\u2019s architecture and dynamics","author":"Huang","year":"2024"},{"key":"10.1016\/j.comnet.2026.112166_bib0057","series-title":"IEEE Blockchain","first-page":"61","article-title":"Analysis of Polkadot: architecture, internals, and contradictions","author":"Abbas","year":"2022"},{"key":"10.1016\/j.comnet.2026.112166_bib0058","series-title":"Financial Cryptography and Data Security","first-page":"259","article-title":"Understanding Polkadot through graph analysis: transaction model, network properties, and insights","author":"Abbas","year":"2024"},{"key":"10.1016\/j.comnet.2026.112166_bib0059","series-title":"IEEE ICBC","article-title":"Bow-tie structure of the Polkadot transfer network","author":"Piskorec","year":"2023"},{"key":"10.1016\/j.comnet.2026.112166_bib0060","series-title":"IEE ICBC)","first-page":"1","article-title":"Account clustering in the Polkadot network: heuristic, experiments, and insights","author":"Caprolu","year":"2023"},{"key":"10.1016\/j.comnet.2026.112166_bib0061","series-title":"2024 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS)","first-page":"51","article-title":"Characterizing Polkadot\u2019s transactions ecosystem: methodology, tools, and insights","author":"Caprolu","year":"2024"},{"key":"10.1016\/j.comnet.2026.112166_bib0062","series-title":"2018 IEEE International Conference on Data Mining Workshops (ICDMW)","first-page":"55","article-title":"Characterizing entities in the bitcoin blockchain","author":"Jourdan","year":"2018"},{"key":"10.1016\/j.comnet.2026.112166_bib0063","series-title":"24th FC Conf.","article-title":"Address clustering heuristics for ethereum","author":"Friedhelm","year":"2020"},{"issue":"2","key":"10.1016\/j.comnet.2026.112166_bib0064","first-page":"91","article-title":"Some results on colored network contraction","volume":"17","author":"Lombardi","year":"2022","journal-title":"J. Ubiquitous Syst. Pervasive Netw."},{"key":"10.1016\/j.comnet.2026.112166_bib0065","doi-asserted-by":"crossref","unstructured":"Graph contraction on attribute-based coloring, vol. ANT 2022 201, 2022. ANT 2022. 10.1016\/j.procs.2022.03.056.","DOI":"10.1016\/j.procs.2022.03.056"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626001787?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626001787?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T09:41:57Z","timestamp":1774172517000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128626001787"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":65,"alternative-id":["S1389128626001787"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112166","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Toward estimating speculation in a cryptocurrency transaction network: The Polkadot case study","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112166","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112166"}}