{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T05:21:58Z","timestamp":1769232118336,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,27]]},"DOI":"10.1109\/brains52497.2021.9569782","type":"proceedings-article","created":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T19:51:25Z","timestamp":1635191485000},"page":"105-112","source":"Crossref","is-referenced-by-count":13,"title":["A Comprehensive Study of the Bitcoin P2P Network"],"prefix":"10.1109","author":[{"given":"Jean-Philippe","family":"Eisenbarth","sequence":"first","affiliation":[{"name":"Universite de Lorraine, CNRS, Inria, LORIA,Nancy,France,F-54000"}]},{"given":"Thibault","family":"Cholez","sequence":"additional","affiliation":[{"name":"Universite de Lorraine, CNRS, Inria, LORIA,Nancy,France,F-54000"}]},{"given":"Olivier","family":"Perrin","sequence":"additional","affiliation":[{"name":"Universite de Lorraine, CNRS, Inria, LORIA,Nancy,France,F-54000"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2106"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_32"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"ref11","article-title":"An open measurement dataset on the Bitcoin P2P Network","author":"eisenbarth","year":"2021","journal-title":"2021 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)"},{"key":"ref12","author":"eisenbarth","year":"2020","journal-title":"Bitcoin p2p network study dataset overview"},{"key":"ref13","year":"0","journal-title":"Github Bitcoin"},{"key":"ref14","year":"0","journal-title":"Satoshi Client Node Discovery"},{"key":"ref15","year":"0","journal-title":"Github btcsuitelbtcd"},{"key":"ref16","year":"0","journal-title":"Github bitcoinjlbitcoinj"},{"key":"ref17","year":"0","journal-title":"Github bcoin-orglbcoin"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.542"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_24"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT45670.2019.8944507"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751297"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref3","author":"miller","year":"2015","journal-title":"Discovering bitcoin's public topology and influential nodes"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/978-3-662-44774-1_6","article-title":"Game- Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools","volume":"8438","author":"johnson","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"key":"ref29","year":"0","journal-title":"Reduce fingerprinting through timestamps in &#x2018;addr&#x2019; messages bitcoinlbitcoin 9c27379"},{"key":"ref5","first-page":"436","article-title":"Majority Is Not Enough: Bitcoin Mining Is Vulnerable","volume":"8437","author":"eyal","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"ref7","first-page":"129","article-title":"Eclipse attacks on bitcoin's peer-to-peer network","author":"heilman","year":"2015","journal-title":"Proceedings of the 24th USENIX Conference on Security Symposium ser SEC'15"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1109\/SP.2017.29","article-title":"Hijacking Bitcoin: Routing attacks on cryptocurrencies","author":"apostolaki","year":"2017","journal-title":"2017 IEEE Symposium on Security and Privacy (SP)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/PEMWN.2018.8548904"},{"key":"ref22","author":"eisenbarth","year":"0","journal-title":"Github jpeisenbarthlbitnodes forked from aye-owchlbitnodes"},{"key":"ref21","year":"0","journal-title":"Cache responses to GETADDR to prevent topology leaks by naumenkogs Pull Request #18991 bitcoin\/bitcoin"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-018-0159-3"},{"key":"ref23","year":"2018","journal-title":"Recom-mendations on Anonymization Processes for Source IP Addresses Submitted for Future Analysis"},{"key":"ref26","year":"0","journal-title":"NVD - CVSS v3 Calculator"},{"key":"ref25","year":"0","journal-title":"Releases of bitcoinlbitcoin"}],"event":{"name":"2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","location":"Paris, France","start":{"date-parts":[[2021,9,27]]},"end":{"date-parts":[[2021,9,30]]}},"container-title":["2021 3rd Conference on Blockchain Research &amp; Applications for Innovative Networks and Services (BRAINS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9568781\/9569777\/09569782.pdf?arnumber=9569782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,11]],"date-time":"2023-11-11T18:46:04Z","timestamp":1699728364000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9569782\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,27]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/brains52497.2021.9569782","relation":{},"subject":[],"published":{"date-parts":[[2021,9,27]]}}}