{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:44:00Z","timestamp":1775018640658,"version":"3.50.1"},"reference-count":12,"publisher":"Pleiades Publishing Ltd","issue":"S2","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1134\/s0361768824700488","type":"journal-article","created":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T16:16:55Z","timestamp":1736871415000},"page":"S104-S112","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bitcoin Transaction Analysis System"],"prefix":"10.1134","volume":"50","author":[{"given":"E. A.","family":"Basynya","sequence":"first","affiliation":[]},{"given":"N.","family":"Karapetyants","sequence":"additional","affiliation":[]},{"given":"M.","family":"Karapetyants","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2025,1,14]]},"reference":[{"key":"3909_CR1","unstructured":"Chainalysis. The 2023 Crypto Crime Report, Chainalysis. https:\/\/go.chainalysis.com\/2023-crypto-crime-report.html. Cited June 2, 2023."},{"key":"3909_CR2","doi-asserted-by":"publisher","unstructured":"Mezquita, Y., Plaza-Hern\u00e1ndez, M., Abbasi, M., and Prieto, J., Cryptocurrencies, systematic literature review on their current context and challenges, International Congress on Blockchain and Applications, 2023, vol 595, pp. 162-172. https:\/\/doi.org\/10.1007\/978-3-031-21229-1_16","DOI":"10.1007\/978-3-031-21229-1_16"},{"key":"3909_CR3","doi-asserted-by":"publisher","first-page":"493","DOI":"10.17587\/prin.14.492-501","volume":"14","author":"E.A. Basynya","year":"2023","unstructured":"Basynya, E.A., Karapetyants, N., and Karapetyants, M., A study of existing approaches to transaction analysis in the Bitcoin network, Programmnaya Ingeneria, 2023, vol. 14, no. 10, pp. 493\u2013501. https:\/\/doi.org\/10.17587\/prin.14.492-501","journal-title":"Programmnaya Ingeneria"},{"key":"3909_CR4","doi-asserted-by":"publisher","unstructured":"Tironsakkul, T., Maarek, M., Eross, A., and Just, M., Context matters: methods for bitcoin tracking, Forensic Science International: Digital Investigation, 2022, vol.\u00a042\u201343. https:\/\/doi.org\/10.1016\/j.fsidi.2022.301475","DOI":"10.1016\/j.fsidi.2022.301475"},{"key":"3909_CR5","doi-asserted-by":"publisher","first-page":"3217","DOI":"10.1016\/j.procs.2022.09.379","volume":"207","author":"C.-Y. Lin","year":"2022","unstructured":"Lin, C.-Y., Liao, H.-K., and Tsai, F.-C., A systematic review of detecting illicit bitcoin transactions, Procedia Computer Science, 2022, vol. 207, pp. 3217\u20133225. https:\/\/doi.org\/10.1016\/j.procs.2022.09.379","journal-title":"Procedia Computer Science"},{"key":"3909_CR6","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1049\/blc2.12014","volume":"2","author":"X. He","year":"2022","unstructured":"He, X., He, K., Lin, S., et al., Bitcoin address clustering method based on multiple heuristic conditions, IET Blockchain, 2022, vol. 2, no. 2, pp. 44\u201356. https:\/\/doi.org\/10.1049\/blc2.12014","journal-title":"IET Blockchain"},{"key":"3909_CR7","doi-asserted-by":"publisher","unstructured":"Mun, H. and Lee, Y., BitSQL: a SQL-based Bitcoin analysis system, 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Shanghai, China, 2022, pp. 1\u20138, https:\/\/doi.org\/10.1109\/ICBC54727.2022.9805551","DOI":"10.1109\/ICBC54727.2022.9805551"},{"key":"3909_CR8","doi-asserted-by":"publisher","first-page":"210582","DOI":"10.1109\/ACCESS.2020.3039570","volume":"8","author":"Y. Zhang","year":"2020","unstructured":"Zhang, Y., Wang, J., and Luo, J., Heuristic-based address clustering in Bitcoin, IEEE Access, 2020, vol. 8, pp. 210582\u2013210591. https:\/\/doi.org\/10.1109\/ACCESS.2020.3039570","journal-title":"IEEE Access"},{"key":"3909_CR9","doi-asserted-by":"publisher","unstructured":"Gong, Y., Chow, K.-P., Ting, H.-F., and Yiu, S.-M., Analyzing the error rates of bitcoin clustering heuristics, Advances in Digital Forensics XVIII: 18th IFIP WG 11.9 International Conference, Virtual Event, January 3\u20134, \n               2022, Revised Selected Papers, 2022, vol. 653, pp. 187\u2013205. https:\/\/doi.org\/10.1007\/978-3-031-10078-9_11","DOI":"10.1007\/978-3-031-10078-9_11"},{"key":"3909_CR10","doi-asserted-by":"publisher","unstructured":"Zheng, B., Zhu, L., Shen, M., et al., Identifying the vulnerabilities of Bitcoin anonymous mechanism based on address clustering, Science China Information Sciences, 2020, vol. 63, 132101. https:\/\/doi.org\/10.1007\/s11432-019-9900-9","DOI":"10.1007\/s11432-019-9900-9"},{"key":"3909_CR11","doi-asserted-by":"publisher","unstructured":"Jeyasheela Rakkini, M. J. and Geetha, K. Detection of Bitcoin miners by clustering crypto address with Google BigQuery open dataset, Soft Computing: Theories and Applications: Proceedings of SoCTA 2021, Singapore: Springer, 2022, vol. 465, pp.\u00a025\u201332. https:\/\/doi.org\/10.1007\/978-981-19-0707-4_3","DOI":"10.1007\/978-981-19-0707-4_3"},{"key":"3909_CR12","doi-asserted-by":"publisher","unstructured":"Kulkarni, R.N. and Srinivasa, C.K., Abstraction of activity diagram from sequence diagram, Data Engineering and Intelligent Computing, Bhateja, V., Khin Wee, L., Lin, J.CW., Satapathy, S.C., and Rajesh, T.M., Eds., Lecture Notes in Networks and Systems, vol 446, Singapore: Springer, 2022. \nhttps:\/\/doi.org\/10.1007\/978-981-19-1559-8_15","DOI":"10.1007\/978-981-19-1559-8_15"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768824700488.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768824700488","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768824700488.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:54:35Z","timestamp":1775012075000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768824700488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":12,"journal-issue":{"issue":"S2","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["3909"],"URL":"https:\/\/doi.org\/10.1134\/s0361768824700488","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"18 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}