{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:39:21Z","timestamp":1762609161580,"version":"build-2065373602"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T00:00:00Z","timestamp":1665619200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T00:00:00Z","timestamp":1665619200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,13]]},"DOI":"10.1109\/dsaa54385.2022.10032398","type":"proceedings-article","created":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T18:54:03Z","timestamp":1675882443000},"page":"1-10","source":"Crossref","is-referenced-by-count":8,"title":["Disentangling the Growth of Blockchain-based Networks by Graph Evolution Rule Mining"],"prefix":"10.1109","author":[{"given":"Alessia","family":"Galdeman","sequence":"first","affiliation":[{"name":"University of Milan,Department of Computer Science,Milan,IT"}]},{"given":"Matteo","family":"Zignani","sequence":"additional","affiliation":[{"name":"University of Milan,Department of Computer Science,Milan,IT"}]},{"given":"Sabrina","family":"Gaito","sequence":"additional","affiliation":[{"name":"University of Milan,Department of Computer Science,Milan,IT"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1209\/epl\/i2001-00260-6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.90.042806"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nature11459"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.057"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313662"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72150-7_40"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3038550"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v15i1.18062"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3411170.3411248"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3920002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2020.101131"},{"article-title":"A puff of steem: Security analysis of decentralized content curation","year":"2019","author":"Kiayias","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3129410"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/su11010167"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2020.3042745"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3038550"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0267612"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3462203.3475913"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3501247.3531597"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-00053-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-05146-6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2021.100038"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3487553.3524642"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4042901"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04180-8_25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871468"},{"key":"ref27","article-title":"Mining interesting patterns and rules in a time-evolving graph","volume":"2188","author":"Yuuki","year":"2011","journal-title":"Lecture Notes in Engineering and Computer Science"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68125-0_84"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2002.1184038"},{"key":"ref30","first-page":"51","article-title":"A versatile algorithm for predictive graph rule mining","author":"Vacul\u00edk","year":"2015","journal-title":"ITAT"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0158"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59065-9_14"},{"key":"ref33","first-page":"5","article-title":"Discovering inter-dimensional rules in dynamic graphs","volume-title":"Proceedings of the 1st International Conference on Dynamic Networks and Knowledge Discovery-Volume 655","author":"Nguyen"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/e19020047"}],"event":{"name":"2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA)","start":{"date-parts":[[2022,10,13]]},"location":"Shenzhen, China","end":{"date-parts":[[2022,10,16]]}},"container-title":["2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10032305\/10032324\/10032398.pdf?arnumber=10032398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T12:20:44Z","timestamp":1707826844000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10032398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,13]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/dsaa54385.2022.10032398","relation":{},"subject":[],"published":{"date-parts":[[2022,10,13]]}}}