{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T13:23:28Z","timestamp":1774099408778,"version":"3.50.1"},"reference-count":74,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T00:00:00Z","timestamp":1737331200000},"content-version":"vor","delay-in-days":19,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100019486","name":"Biocodex Microbiota Foundation","doi-asserted-by":"publisher","award":["905300"],"award-info":[{"award-number":["905300"]}],"id":[{"id":"10.13039\/100019486","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004955","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["898883"],"award-info":[{"award-number":["898883"]}],"id":[{"id":"10.13039\/501100004955","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004955","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["909237"],"award-info":[{"award-number":["909237"]}],"id":[{"id":"10.13039\/501100004955","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Decentralized finance (DeFi) has been the target of numerous profit-driven crimes, but the prevalence and cumulative impact of these crimes have not yet been assessed. This study provides a comprehensive assessment of profit-driven crimes targeting the DeFi sector. We collected data on 1141 crime events from 2017 to 2022. Of these, 1036 were related to DeFi (the main focus of this study) and 105 to centralized finance (CeFi). The findings show that the entire cryptoasset industry has suffered a minimum loss of US$30B, with two-thirds related to CeFi and one-third to DeFi. Focusing on DeFi, a taxonomy was developed to clarify the similarities and differences among these crimes. All events were mapped onto the DeFi stack to assess the impacted technical layers, and the financial damages were quantified to gauge their scale. The results highlight that during an attack, a DeFi actor (an entity developing a DeFi technology) can serve as a direct target (due to technical vulnerabilities or exploitation of human risks), as a perpetrator (through malicious uses of contracts or market manipulations), or as an intermediary (by being imitated through, for example, phishing scams). The findings also show that DeFi actors are the first victims of crimes targeting the DeFi industry: 52% of events targeted them, primarily due to technical vulnerabilities at the protocol layer, and these events accounted for 83% of all financial damages. Alternatively, in 41% of events, DeFi actors were themselves malicious perpetrators, predominantly misusing contracts at the cryptoasset layer (e.g. rug pull scams). However, these events accounted for only 17% of all financial damages. The study offers a preliminary assessment of the size and scope of crime events within the DeFi sector and highlights the vulnerable position of DeFi actors in the ecosystem.<\/jats:p>","DOI":"10.1093\/cybsec\/tyae029","type":"journal-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T09:25:01Z","timestamp":1737365101000},"source":"Crossref","is-referenced-by-count":14,"title":["Mapping the DeFi crime landscape: an evidence-based picture"],"prefix":"10.1093","volume":"11","author":[{"given":"Catherine","family":"Carpentier-Desjardins","sequence":"first","affiliation":[{"name":"School of Criminology, Universit\u00e9 de Montr\u00e9al , H3C 3J7, Montr\u00e9al ,","place":["Canada"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8275-8445","authenticated-orcid":false,"given":"Masarah","family":"Paquet-Clouston","sequence":"additional","affiliation":[{"name":"School of Criminology, Universit\u00e9 de Montr\u00e9al , H3C 3J7, Montr\u00e9al ,","place":["Canada"]},{"name":"Complexity Science Hub Vienna , 1080, Vienna ,","place":["Austria"]}]},{"given":"Stefan","family":"Kitzler","sequence":"additional","affiliation":[{"name":"Complexity Science Hub Vienna , 1080, Vienna ,","place":["Austria"]},{"name":"AIT Austrian Institute of Technology , 1210, Vienna ,","place":["Austria"]}]},{"given":"Bernhard","family":"Haslhofer","sequence":"additional","affiliation":[{"name":"Complexity Science Hub Vienna , 1080, Vienna ,","place":["Austria"]}]}],"member":"286","published-online":{"date-parts":[[2025,1,20]]},"reference":[{"key":"2025021914450974700_bib1","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1093\/jfr\/fjaa010","article-title":"Decentralized finance","volume":"6","author":"Zetzsche","year":"2020","journal-title":"J Finan Regul"},{"key":"2025021914450974700_bib2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICCCI54379.2022.9740843","article-title":"Blockchain enabled cyber security: a comprehensive survey","volume-title":"Proceedings of the 2022 International Conference on Computer Communication and Informatics (ICCCI) Coimbatore","author":"Deshmukh","year":"2022"},{"key":"2025021914450974700_bib3","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s42521-023-00088-8","article-title":"The technology of decentralized finance (DeFi)","volume":"6","author":"Auer","year":"2023","journal-title":"Digit Finance"},{"key":"2025021914450974700_bib4","article-title":"CeFi vs. DeFi\u2013comparing centralized to decentralized finance","author":"Qin","year":"2021"},{"key":"2025021914450974700_bib5","article-title":"Top cryptocurrency exchanges ranked by volume","author":"CoinMarketCap"},{"key":"2025021914450974700_bib6","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/s10657-019-09609-6","article-title":"Cryptocurrency or usury? Crime and alternative money laundering techniques","volume":"47","author":"Barone","year":"2019","journal-title":"Eur J Law Econ"},{"key":"2025021914450974700_bib7","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.qref.2021.01.004","article-title":"Cash, crime, and cryptocurrencies","volume":"85","author":"Hendrickson","year":"2022","journal-title":"Q Rev Econ Financ"},{"key":"2025021914450974700_bib8","doi-asserted-by":"crossref","first-page":"298","DOI":"10.18517\/ijaseit.8.1.4954","article-title":"Smarter city: smart energy grid based on blockchain technology","volume":"8","author":"Pieroni","year":"2018","journal-title":"Int J Adv Sci Eng Inf Technol"},{"key":"2025021914450974700_bib9","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1080\/01639625.2019.1706706","article-title":"Convenience theory of cryptocurrency crime: a content analysis of U.S. Federal court decisions","volume":"42","author":"Nolasco\u00a0Braaten","year":"2021","journal-title":"Deviant Behav"},{"key":"2025021914450974700_bib10","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s11187-019-00135-y","article-title":"The geography of initial coin offerings","volume":"55","author":"Huang","year":"2018","journal-title":"Small Bus Econ"},{"key":"2025021914450974700_bib11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyz003\/5488907","article-title":"Ransomware payments in the Bitcoin ecosystem","volume":"5","author":"Paquet-Clouston","year":"2019","journal-title":"J Cybersecur"},{"key":"2025021914450974700_bib12","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/3318041.3355466","article-title":"Spams meet cryptocurrencies: sextortion in the bitcoin ecosystem","volume-title":"Proceedings of the 1st ACM Conference on Advances in Financial Technologies AFT \u201919","author":"Paquet-Clouston","year":"2019"},{"key":"2025021914450974700_bib13","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1093\/bjc\/azab118","article-title":"Criminology towards the metaverse: cryptocurrency scams, grey economy and the technosocial","volume":"62","author":"Mackenzie","year":"2022","journal-title":"Brit J Criminol"},{"key":"2025021914450974700_bib14","first-page":"1","article-title":"A survey on ethereum systems security: vulnerabilities, attacks, and defenses","volume":"53","author":"Chen","year":"2020","journal-title":"ACM Comput Surv"},{"key":"2025021914450974700_bib15","article-title":"Flashot: a snapshot of flash loan attack on DeFi ecosystem","author":"Cao","year":"2021"},{"key":"2025021914450974700_bib16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11187-022-00726-2","article-title":"Initial coin offerings: a hybrid empirical review","volume":"61","author":"Alshater","year":"2023","journal-title":"Small Bus Econ"},{"key":"2025021914450974700_bib17","first-page":"469","article-title":"Dependability analysis of bitcoin subject to eclipse attacks","volume":"6","author":"Zhou","year":"2021","journal-title":"Int J Math Eng Manage Sci"},{"key":"2025021914450974700_bib18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3491102.3517585","article-title":"Impact and user perception of sandwich attacks in the DeFi ecosystem","volume-title":"Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems CHI \u201922","author":"Wang","year":"2022"},{"key":"2025021914450974700_bib19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion52605.2021.00025","article-title":"BLOCKEYE: hunting for defi attacks on blockchain","volume-title":"Proceedings of the 2021 IEEE\/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)","author":"Wang","year":"2021"},{"key":"2025021914450974700_bib20","doi-asserted-by":"crossref","first-page":"115284","DOI":"10.1016\/j.eswa.2021.115284","article-title":"Detecting cryptocurrency pump-and-dump frauds using market and social signals","volume":"182","author":"Nghiem","year":"2021","journal-title":"Expert Syst Appl"},{"key":"2025021914450974700_bib21","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.future.2019.08.014","article-title":"Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact","volume":"102","author":"Bartoletti","year":"2020","journal-title":"Fut Gener Comp Syst"},{"key":"2025021914450974700_bib22","article-title":"Data-driven smart ponzi scheme detection","author":"Liang","year":"2021"},{"key":"2025021914450974700_bib23","article-title":"Significant digits: using large-scale blockchain data to predict fraudulent addresses","author":"Gridley","year":"2023"},{"key":"2025021914450974700_bib24","doi-asserted-by":"crossref","first-page":"7572","DOI":"10.3390\/app11167572","article-title":"The blockchain oracle problem in decentralized finance\u2014a multivocal approach","volume":"11","author":"Caldarelli","year":"2021","journal-title":"Appl Sci"},{"key":"2025021914450974700_bib25","article-title":"Crypto rug pulls: what is a rug pull in crypto and 6 ways to spot it","author":"Puggioni","year":"2022"},{"key":"2025021914450974700_bib26","doi-asserted-by":"crossref","first-page":"101993","DOI":"10.1016\/j.cose.2020.101993","article-title":"Characterizing cryptocurrency exchange scams","volume":"98","author":"Xia","year":"2020","journal-title":"Comput Secur"},{"key":"2025021914450974700_bib27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICBC48266.2020.9169433","article-title":"Tracing cryptocurrency scams: clustering replicated advance-fee and phishing websites","volume-title":"Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","author":"Phillips","year":"2020"},{"key":"2025021914450974700_bib28","first-page":"71","article-title":"Cryptocurrency: a tool and target for cybercrime","volume":"31","author":"Reddy","year":"2018","journal-title":"South Afr J Criminol"},{"key":"2025021914450974700_bib29","article-title":"Flash crash for cash: cyber threats in decentralized finance","author":"Oosthoek","year":"2021"},{"key":"2025021914450974700_bib30","doi-asserted-by":"crossref","DOI":"10.1145\/3558535.3559780","article-title":"SoK: decentralized finance (DeFi)","volume-title":"Proceedings of the 4th ACM Conference on Advances in Financial Technologies","author":"Werner","year":"2022"},{"key":"2025021914450974700_bib31","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-662-54455-6_8","article-title":"A survey of attacks on ethereum smart contracts (SoK)","volume-title":"Principles of Security and Trust Lecture Notes in Computer Science","author":"Atzei","year":"2017"},{"key":"2025021914450974700_bib32","doi-asserted-by":"crossref","first-page":"107978","DOI":"10.1016\/j.comnet.2021.107978","article-title":"Attacks and countermeasures on blockchains: a survey from layering perspective","volume":"191","author":"Wen","year":"2021","journal-title":"Comput Netw"},{"key":"2025021914450974700_bib33","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1007\/s12083-021-01268-2","article-title":"A survey on security in consensus and smart contracts","volume":"15","author":"Cao","year":"2022","journal-title":"Peer Peer Netw Appl"},{"key":"2025021914450974700_bib34","first-page":"10378","article-title":"A survey of defi security: challenges and opportunities","volume-title":"J King Saud Univ Comput Inf Sci","author":"Li","year":"2022"},{"key":"2025021914450974700_bib35","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179435","article-title":"SoK: decentralized finance (DeFi) attacks","volume-title":"Proceedings of the IEEE Symposium of Security and Privacy","author":"Zhou","year":"2023"},{"key":"2025021914450974700_bib36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3551349.3559567","article-title":"Towards effective static analysis approaches for security vulnerabilities in smart contracts","volume-title":"Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering","author":"Ghaleb","year":"2022."},{"key":"2025021914450974700_bib37","article-title":"Smart contract vulnerability detection technique: a survey","author":"Qian","year":"2022"},{"key":"2025021914450974700_bib38","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-64322-8_1","article-title":"Attacking the DeFi ecosystem with flash loans for fun and profit","author":"Qin","year":"2021"},{"key":"2025021914450974700_bib39","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1109\/Blockchain55522.2022.00075","article-title":"Security analysis of DeFi: vulnerabilities, attacks and advances","volume-title":"Proceedings of the 2022 IEEE International Conference on Blockchain (Blockchain)","author":"Li","year":"2022"},{"key":"2025021914450974700_bib40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICCCNT45670.2019.8944615","article-title":"Blockchain security attack: a brief survey","volume-title":"Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","author":"Anita","year":"2019"},{"key":"2025021914450974700_bib41","first-page":"1","article-title":"Crypto-assets illicit activities: theoretical approach with empirical review","volume":"17","author":"Matakovi\u0107","year":"2022","journal-title":"Int J Crim Sci"},{"key":"2025021914450974700_bib42","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/EnT.2019.00008","article-title":"Phishing attacks and preventions in blockchain based projects","volume-title":"Proceedings of the 2019 International Conference on Engineering Technologies and Computer Science (EnT)","author":"Andryukhin","year":"2019"},{"key":"2025021914450974700_bib43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ASIANCON55314.2022.9908800","article-title":"Addressing security issues and future prospects of web 3.0","volume-title":"Proceedings of the 2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","author":"Shukla","year":"2022"},{"key":"2025021914450974700_bib44","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2021.100021","article-title":"A great disturbance in the crypto: understanding cryptocurrency returns under attacks","volume":"2","author":"Ramos","year":"2021","journal-title":"Blockchain Res Appl"},{"key":"2025021914450974700_bib45","first-page":"28","article-title":"Cryptocurrencies: boons and curses for fraud prevention","volume-title":"A Fresh Look at Fraud","author":"Kleinberg","year":"2022"},{"key":"2025021914450974700_bib46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40163-018-0093-5","article-title":"To the moon: defining and detecting cryptocurrency pump-and-dumps","volume":"7","author":"Kamps","year":"2018","journal-title":"Crime Sci"},{"key":"2025021914450974700_bib47","article-title":"The 2022 geography of cryptocurrency report","author":"Chainalysis","year":"2022"},{"key":"2025021914450974700_bib48","doi-asserted-by":"publisher","DOI":"10.1145\/3491051","article-title":"Trade or Trick? Detecting and characterizing scam tokens on uniswap decentralized exchange","volume-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems","author":"Xia","year":"2021"},{"key":"2025021914450974700_bib49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209660","article-title":"Pump and dumps in the bitcoin era: real time detection of cryptocurrency market manipulations","volume-title":"Proceedings of the 2020 29th International Conference on Computer Communications and Networks (ICCCN)","author":"La\u00a0Morgia","year":"2020"},{"key":"2025021914450974700_bib50","doi-asserted-by":"crossref","first-page":"949","DOI":"10.3390\/math10060949","article-title":"Do not rug on me: leveraging machine learning techniques for automated scam detection","volume":"10","author":"Mazorra","year":"2022","journal-title":"Mathematics"},{"key":"2025021914450974700_bib51","article-title":"Hybrid cryptocurrency pump and dump detection","author":"Mansourifar","year":"2020"},{"key":"2025021914450974700_bib52","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1093\/bjc\/43.1.81","article-title":"Towards a general theory of profit-driven crimes","volume":"43","author":"Naylor","year":"2003","journal-title":"Brit J Criminol"},{"key":"2025021914450974700_bib53","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3138\/9781442670242-004","article-title":"Predators, parasites, or free-market pioneers: reflections on the nature and analysis of profit-driven crime","volume-title":"Critical Reflections on Transnational Organized Crime, Money Laundering, and Corruption","author":"Naylor","year":"2003"},{"key":"2025021914450974700_bib54","article-title":"DeFi \u2013 DeFi Investing & Yield Farming Platform","author":"DeFi"},{"key":"2025021914450974700_bib55","article-title":"SlowMist Hacked \u2013 SlowMist Zone. A platform providing comprehensive information on various hacking incidents in the blockchain space","author":"SlowMist"},{"key":"2025021914450974700_bib56","article-title":"Cryptosec \u2013 Crypto, Blockchain, Web3, CBDC, Digital Assets Cybersecurity and Investigations","author":"Cryptosec (now ChainSec)"},{"key":"2025021914450974700_bib57","article-title":"Announcing the world\u2019s first defi REKT database","author":"DeFi","year":"2023"},{"key":"2025021914450974700_bib58","article-title":"SlowMist: a blockchain security firm","author":"Slowmist"},{"key":"2025021914450974700_bib59","article-title":"Historical Market Cap Snapshots of Cryptocurrencies. Historical market cap snapshots of cryptocurrencies, starting in April 2013. See all time high crypto prices from 2017 and 2018. Bitcoin. Ethereum. More","author":"CoinMarketCap"},{"key":"2025021914450974700_bib60","article-title":"South African Brothers Vanish, and So Does $3.6 Billion in Bitcoin","author":"Bloomberg","year":"2021"},{"key":"2025021914450974700_bib61","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-030-30199-6_2","article-title":"Inductive content analysis","volume-title":"The Application of Content Analysis in Nursing Science Research","author":"Kyng\u00e4s","year":"2020"},{"key":"2025021914450974700_bib62","article-title":"DefiLlama: A DeFi TVL Aggregator. DefiLlama is a DeFi TVL aggregator committed to providing accurate data without ads or sponsored content, as well as transparency","author":"DefiLlama"},{"key":"2025021914450974700_bib63","article-title":"Statistics: 2.3 the Mann\u2013Whitney U test","author":"Shier","year":"2004"},{"key":"2025021914450974700_bib64","doi-asserted-by":"publisher","DOI":"10.7275\/pare.1977","article-title":"Using Cliff\u2019s delta as a non-parametric effect size measure: an accessible web app and R tutorial","volume":"29","author":"Meissel","year":"2024","journal-title":"Pract Assess Res Eval"},{"key":"2025021914450974700_bib65","doi-asserted-by":"crossref","first-page":"115","DOI":"10.4028\/www.scientific.net\/AMM.611.115","article-title":"Methodology and application of the Kruskal\u2013Wallis test","volume":"611","author":"Ostertagov\u00e1","year":"2014","journal-title":"Appl Mech Mater"},{"key":"2025021914450974700_bib66","first-page":"19","article-title":"The need to report effect size estimates revisited. An overview of some recommended measures of effect size","volume-title":"TRENDS Sport Sci","author":"Tomczak","year":"2014"},{"key":"2025021914450974700_bib67","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1214\/aoms\/1177706374","article-title":"Estimation of the medians for dependent variables","volume":"30","author":"Dunn","year":"1959","journal-title":"Ann Math Stat"},{"key":"2025021914450974700_bib68","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1080\/01621459.1961.10482090","article-title":"Multiple comparisons among means","volume":"56","author":"Dunn","year":"1961","journal-title":"J Am Stat Assoc"},{"key":"2025021914450974700_bib69","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1093\/slr\/hmz001","article-title":"Analysing the investigation and prosecution of cryptocurrency crime as provided for by the south african cybercrimes bill","volume":"41","author":"Reddy","year":"2020","journal-title":"Statute Law Rev"},{"key":"2025021914450974700_bib70","article-title":"DeFi risks and the decentralisation illusion","author":"Aramonte","year":"2021"},{"key":"2025021914450974700_bib71","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.4416784","article-title":"Banking in the shadow of bitcoin? The institutional adoption of cryptocurrencies","author":"Auer","year":"2023"},{"key":"2025021914450974700_bib72","doi-asserted-by":"crossref","first-page":"e5307697","DOI":"10.1155\/2022\/5307697","article-title":"Multiple-layer security threats on the ethereum blockchain and their countermeasures","volume":"2022","author":"Duan","year":"2022","journal-title":"Secur Commun Netw"},{"key":"2025021914450974700_bib73","article-title":"The 12 Biggest DeFi and Crypto Hacks in the History of Crypto","author":"CryptoSec","year":"2022"},{"key":"2025021914450974700_bib74","article-title":"Axie Infinity\u2019s Ronin Network Suffers $625M Exploit","author":"Handagama","year":"2022"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyae029\/61510649\/tyae029.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyae029\/61510649\/tyae029.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T14:45:33Z","timestamp":1739976333000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyae029\/7962044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":74,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyae029","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyae029"}}