{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:09:15Z","timestamp":1764238155413},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/acitt.2019.8779855","type":"proceedings-article","created":{"date-parts":[[2019,8,2]],"date-time":"2019-08-02T00:21:07Z","timestamp":1564705267000},"page":"447-451","source":"Crossref","is-referenced-by-count":10,"title":["Blockchain\u2019s Future Role in Cybersecurity. Analysis of Defensive and Offensive Potential Leveraging Blockchain-Based Platforms"],"prefix":"10.1109","author":[{"given":"Artur","family":"Rot","sequence":"first","affiliation":[]},{"given":"Bartosz","family":"Blaicke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"article-title":"A Survey on the Security of Blockchain Systems","year":"2018","author":"lia","key":"ref14"},{"journal-title":"Hacker Noon","article-title":"Is it too late to invest in Bitcoin? is it just a bubble?","year":"2018","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"59","DOI":"10.35784\/jcsi.640","article-title":"Blockchain technology and its applications","author":"dikariev","year":"2018","journal-title":"(In Polish) Journal of Computer Sciences Institute (JCSI)"},{"article-title":"Ransomware payments in the bitcoin ecosystem","year":"2018","author":"paquet-clouston","key":"ref6"},{"journal-title":"Big Think","article-title":"Bitcoin burglaries: the 5 biggest cryptocurrency heists in history","year":"2018","key":"ref5"},{"article-title":"The Blockchain as a Decentralized Security Framework","year":"2018","author":"puthal","key":"ref8"},{"key":"ref7","article-title":"Security threats classification in blockchains","author":"mosakheil","year":"2018","journal-title":"Culminating Projects in Information Assurance"},{"key":"ref2","article-title":"A very brief history of blockchain technology everyone should read","author":"marr","year":"2018","journal-title":"Forbes"},{"key":"ref9","article-title":"Smart pool: practical decentralized pooled mining","author":"luu","year":"2017","journal-title":"USENIX Security Symposium"},{"article-title":"Bitcoin: a peer-to-peer electronic cash system","year":"2008","author":"nakamoto","key":"ref1"}],"event":{"name":"2019 9th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2019,6,5]]},"location":"Ceske Budejovice, Czech Republic","end":{"date-parts":[[2019,6,7]]}},"container-title":["2019 9th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8767904\/8779853\/08779855.pdf?arnumber=8779855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:23:55Z","timestamp":1658262235000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8779855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/acitt.2019.8779855","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}