{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T05:36:26Z","timestamp":1738215386356,"version":"3.34.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,4]]},"DOI":"10.1109\/csnet64211.2024.10851749","type":"proceedings-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:35:01Z","timestamp":1738089301000},"page":"100-107","source":"Crossref","is-referenced-by-count":0,"title":["Ransomwise: A Transaction-Based Dataset for Ransomware Bitcoin Wallet Detection"],"prefix":"10.1109","author":[{"given":"Ioannis","family":"Arakas","sequence":"first","affiliation":[{"name":"DiSCS ICS-FORTH,Heraklion,Greece"}]},{"given":"Nikolaos","family":"Myrtakis","sequence":"additional","affiliation":[{"name":"University of Crete &#x0026; ENSEA,Department of Computer Science,Paris,France"}]},{"given":"Thomas","family":"Marchioro","sequence":"additional","affiliation":[{"name":"University of Padova,Department of Information Engineering,Padova,Italy"}]},{"given":"Evangelos","family":"Markatos","sequence":"additional","affiliation":[{"name":"DiSCS ICS-FORTH,Heraklion,Greece"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Typing a terrorist attack: Using tools from the war on terror to fight the war on ransomware","author":"Porath","year":"2023","journal-title":"Pepp. L. Rev."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3494557"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599817"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00047"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2021.111201"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3582489"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623094"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ecrime57793.2022.10142119"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz003"},{"volume-title":"Chainabuse","year":"2024","key":"ref10"},{"journal-title":"Ransomwhere: A Crowdsourced Ransomware Payment Dataset","year":"2022","author":"Cable","key":"ref11"},{"volume-title":"Alienvault","year":"2024","key":"ref12"},{"volume-title":"Ransomlook","year":"2024","key":"ref13"},{"volume-title":"Bitcoin heist ransomware address dataset","year":"2024","key":"ref14"},{"volume-title":"Security boulevard","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/612"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2874539"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3418981.3418984"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73951-9_5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/6274260"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101925"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939780"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/e24101487"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.04.013"}],"event":{"name":"2024 8th Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2024,12,4]]},"location":"Paris, France","end":{"date-parts":[[2024,12,6]]}},"container-title":["2024 8th Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10851715\/10851472\/10851749.pdf?arnumber=10851749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T06:45:24Z","timestamp":1738133124000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10851749\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/csnet64211.2024.10851749","relation":{},"subject":[],"published":{"date-parts":[[2024,12,4]]}}}