{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:23:36Z","timestamp":1763202216543,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/ictc.2018.8539456","type":"proceedings-article","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T22:51:33Z","timestamp":1544223093000},"page":"1090-1095","source":"Crossref","is-referenced-by-count":10,"title":["Design of RPC-based Blockchain Monitoring Agent"],"prefix":"10.1109","author":[{"given":"Kyungchan","family":"Ko","sequence":"first","affiliation":[]},{"given":"Chaehyeon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Taeyeol","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"James Won-Ki","family":"Hong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945049"},{"journal-title":"Anomaly detection in bitcoin network using unsupervised learning methods","year":"2016","author":"pham","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/978-3-662-54455-6_8","article-title":"A survey of attacks on ethereum smart contracts (sok)","author":"atzei","year":"2017","journal-title":"Principles of Security and Trust"},{"year":"0","key":"ref13","article-title":"Bitcoin core"},{"year":"0","key":"ref14","article-title":"Go-ethereum"},{"year":"0","key":"ref15","article-title":"Bitcoin core json apis"},{"year":"0","key":"ref16","article-title":"Go-ethereum json apis"},{"journal-title":"Primecoin Cryptocurrency with Prime Number Proof-of-work","year":"2013","author":"king","key":"ref4"},{"journal-title":"Bitcoin and Cryptocurrency Technologies A Comprehensive Introduction","year":"2016","author":"narayanan","key":"ref3"},{"key":"ref6","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"journal-title":"Initial coin offerings","year":"2018","author":"momtaz","key":"ref5"},{"key":"ref8","first-page":"16","article-title":"A blockchain-based architecture for collaborative ddos mitigation with smart contracts","author":"rodrigues","year":"2017","journal-title":"IFIP International Conference on Autonomous Infrastructure Management and Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700041"},{"journal-title":"Blockchain Blueprint for a New Economy","year":"2015","author":"swan","key":"ref2"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2008","author":"nakamoto","key":"ref1"},{"key":"ref9","first-page":"457","article-title":"Bitiodine: Extracting intelligence from the bitcoin network","author":"spagnuolo","year":"2014","journal-title":"International Conference on Financial Cryptography and Data Security"}],"event":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2018,10,17]]},"location":"Jeju","end":{"date-parts":[[2018,10,19]]}},"container-title":["2018 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8509497\/8539346\/08539456.pdf?arnumber=8539456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T01:54:38Z","timestamp":1598234078000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8539456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ictc.2018.8539456","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}