{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T19:53:03Z","timestamp":1773258783447,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icbc48266.2020.9169433","type":"proceedings-article","created":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T22:39:45Z","timestamp":1597703985000},"page":"1-8","source":"Crossref","is-referenced-by-count":44,"title":["Tracing Cryptocurrency Scams: Clustering Replicated Advance-Fee and Phishing Websites"],"prefix":"10.1109","author":[{"given":"Ross","family":"Phillips","sequence":"first","affiliation":[]},{"given":"Heidi","family":"Wilder","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1606","article-title":"The anatomy of a cryptocurrency pump-and-dump scheme","author":"xu","year":"2019","journal-title":"Proceedings of the 28th USENIX Security Symposium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003370"},{"key":"ref12","article-title":"The ICO gold rush: It's a scam, it's a bubble, it's a super challenge for regulators","volume":"63","author":"zetzsche","year":"2019","journal-title":"21 Harvard International Law Journal"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.014"},{"key":"ref14","first-page":"1591","article-title":"The art of the scam: Demystifying honeypots in Ethereum smart contracts","author":"torres","year":"2019","journal-title":"Proceedings of the 28th USENIX Security Symposium"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376207"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355466"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2010.1070"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58820-8_8"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_21"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00047"},{"key":"ref6","article-title":"Measuring the changing cost of cybercrime","author":"anderson","year":"2019","journal-title":"The 18th Annual Workshop on the Economics of Information Security"},{"key":"ref5","article-title":"Don't @ me: Hunting Twitter bots at scale","author":"wright","year":"2018","journal-title":"Blackhat USA 2018"},{"key":"ref8","article-title":"Anti-money laundering in Bitcoin: Experimenting with graph convolutional networks for financial forensics","author":"weber","year":"2019","journal-title":"SIGKDD Conference on Knowledge Discovery and Data Mining"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39498-0_12"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03251-7_27"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1108\/13590790810841716"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3306125"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504753"},{"key":"ref21","article-title":"Bitcoin laundering: An analysis of illicit flows into digital currency services","author":"fanusie","year":"2018","journal-title":"Center on Sanctions and Illicit Finance Elliptic"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/31\/1\/012012"},{"key":"ref23","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"1996","journal-title":"Proceedings of the Second International Conference on Knowledge Discovery and Data Mining"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186089"},{"key":"ref25","first-page":"133","article-title":"Using TF-IDF to determine word relevance in document queries","volume":"242","author":"ramos","year":"2003","journal-title":"Proceedings of the First Instructional Conference on Machine Learning"}],"event":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Toronto, ON, Canada","start":{"date-parts":[[2020,5,2]]},"end":{"date-parts":[[2020,5,6]]}},"container-title":["2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9165689\/9169389\/09169433.pdf?arnumber=9169433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:07:13Z","timestamp":1656374833000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9169433\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icbc48266.2020.9169433","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}