{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T17:32:07Z","timestamp":1755797527652,"version":"3.40.4"},"reference-count":86,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10974373","type":"proceedings-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T17:50:17Z","timestamp":1745430617000},"page":"1-12","source":"Crossref","is-referenced-by-count":2,"title":["Cryptocurrencies Forensics With Real-Time Intelligence and Graph Database: a Comprehensive Review"],"prefix":"10.1109","author":[{"given":"Rodrigue Tonga","family":"Naha","sequence":"first","affiliation":[{"name":"&#x00C9;TS Montr&#x00E9;al,Department of Software and IT Engineering,Quebec,Canada"}]},{"given":"Kaiwen","family":"Zhang","sequence":"additional","affiliation":[{"name":"&#x00C9;TS Montr&#x00E9;al,Department of Software and IT Engineering,Quebec,Canada"}]}],"member":"263","reference":[{"key":"ref1","article-title":"The 2024 crypto crime report the latest trends in ransomware, scams, hacking, and more","volume-title":"chainAlysis","author":"Chainalysis","year":"2024"},{"volume-title":"Kaspersky Security Bulletin 2016. The ransomware revolution","year":"2019","author":"Ivanov","key":"ref2"},{"volume-title":"2024 cybersecurity almanac: 100 facts, figures, predictions and statistics","year":"2024","author":"Freeze","key":"ref3"},{"volume-title":"The largest cryptocurrency hacks so far","year":"2024","author":"George","key":"ref4"},{"key":"ref5","article-title":"Crypto mixer usage reaches all-time highs in 2022, with nation state actors and cybercriminals contributing significant volume","volume-title":"ChainAlysis","author":"Chainalysis","year":"2022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/blc2.12014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3039570"},{"key":"ref8","article-title":"Digital forensics vs. anti-digital forensics: Techniques, limitations and recommendations","author":"Yaacoub","year":"2021","journal-title":"arXiv preprint arXiv"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3062652"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411970"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4450488"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CRC50527.2021.9392563"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CRC50527.2021.9392446"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034816"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.56578\/ida020302"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2023.301576"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITQMIS51053.2020.9322974"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-021-00163-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06365-7_17"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3183367"},{"key":"ref22","article-title":"A forensic look at bitcoin cryptocurrency","volume-title":"Ph.D. dissertation","author":"Doran","year":"2014"},{"volume-title":"Investigation of cryptocurrency wallets on ios and android mobile devices for potential forensic artifacts","year":"2014","author":"Montanez","key":"ref23"},{"volume-title":"Blockchain size (mb)","key":"ref24"},{"volume-title":"Ethereum full node sync (default) chart \u2014 etherscan","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233290"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2019.200891"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.301002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00010"},{"key":"ref30","article-title":"Forensic artefact discovery and attribution from android cryptocurrency wallet applications","author":"Chang","year":"2022","journal-title":"arXiv preprint arXiv"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948774"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2019.200894"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560672"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3390566.3391671"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2022.102094"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3266162"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS52256.2021.00013"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2970113"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2022.301340"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2022.301486"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/math10060949"},{"issue":"3","key":"ref42","first-page":"1","article-title":"Trade or trick ? detecting and characterizing scam tokens on uniswap decentralized exchange","volume-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems","volume":"5","author":"Xia","year":"2021"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3346276"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_9"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67208-3_8"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/app9122519"},{"issue":"3","key":"ref47","article-title":"Bitcoin and beyond: Crypto asset considerations for auditors\/forensic accountants","volume":"15","author":"Dupuis","year":"2023","journal-title":"Journal of Forensic and Investigative Accounting"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.18280\/ijsse.130118"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-5166-6_18"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003370"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102506"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0038"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2022.301477"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948774"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2022.301340"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus.2019.8656687"},{"key":"ref57","article-title":"Big data architecture for cryptocurrency real-time data processing","volume-title":"Proceedings of the ICIST","author":"Horvat","year":"2020"},{"volume-title":"Big Data: Principles and best practices of scalable real-time data systems","year":"2015","author":"Warren","key":"ref58"},{"key":"ref59","first-page":"18","article-title":"Questioning the lambda architecture","author":"Kreps","year":"0205","journal-title":"Online article"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945049"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0965-7_50"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/a15050140"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3390\/app14010154"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2022.102787"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2021.100035"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC.2019.8784580"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA-C.2019.00042"},{"journal-title":"Comparative Evaluation for the Performance of Big Stream Processing Systems","year":"2018","author":"Shahverdi","key":"ref68"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CICT48419.2019.9066123"},{"key":"ref70","article-title":"Spark streaming vs flink vs storm vs kafka streams vs samza: Choose your stream processing framework","author":"Prakash","year":"2018","journal-title":"Why Not Learn Something Blogspot"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPC51351.2021.9451718"},{"issue":"21","key":"ref72","article-title":"Scada live forensics: real time data acquisition process to detect, prevent or evaluate critical situations","volume":"9","author":"Taveras","year":"2013","journal-title":"European Scientific Journal"},{"journal-title":"Using open source tools to investigate malware in the android operating system","year":"2014","author":"Hanaysha","key":"ref73"},{"key":"ref74","first-page":"18769","article-title":"Live graph lab: Towards open, dynamic and real transaction graphs with nft","volume-title":"Advances in Neural Information Processing Systems","volume":"36","author":"Zhang","year":"2023"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.3390\/a15050140"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTM.2016.7890788"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.284"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2019.8729264"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/IC3TSN.2017.8284494"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1900008.1900067"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.15439\/2021f33"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-019-00110-3"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3582302.3582320"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus49466.2020.9039530"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/DSC50466.2020.00059"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.08.002"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10974373.pdf?arnumber=10974373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T17:02:29Z","timestamp":1745514149000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10974373\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":86,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10974373","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}