{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T13:14:40Z","timestamp":1770297280668,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["FA8750-17-2-0188"],"award-info":[{"award-number":["FA8750-17-2-0188"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["#70NANB15H176"],"award-info":[{"award-number":["#70NANB15H176"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330763","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"1871-1880","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Adversarial Matching of Dark Net Market Vendor Accounts"],"prefix":"10.1145","author":[{"given":"Xiao Hui","family":"Tai","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Kyle","family":"Soska","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Nicolas","family":"Christin","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. ISOC NDSS.","author":"Agten P.","unstructured":"P. Agten , W. Joosen , F. Piessens , and N. Nikiforakis . 2015. Seven months' worth of mistakes: A longitudinal study of typosquatting abuse . In Proc. ISOC NDSS. P. Agten, W. Joosen, F. Piessens, and N. Nikiforakis. 2015. Seven months' worth of mistakes: A longitudinal study of typosquatting abuse. In Proc. ISOC NDSS."},{"key":"e_1_3_2_1_2_1","volume-title":"Accessed","author":"Aliens C.","year":"2017","unstructured":"C. Aliens . 2017 . The Darknet Search Engine ?Grams' is Shutting Down. https:\/\/web.archive.org\/web\/20180124070700\/https:\/\/www.deepdotweb.com\/2017\/12\/15\/darknet-search-engine-grams-shutting\/ . Accessed May 18, 2019. C. Aliens. 2017. The Darknet Search Engine ?Grams' is Shutting Down. https:\/\/web.archive.org\/web\/20180124070700\/https:\/\/www.deepdotweb.com\/2017\/12\/15\/darknet-search-engine-grams-shutting\/. Accessed May 18, 2019."},{"key":"e_1_3_2_1_3_1","volume-title":"Grams: Search the Darknet. Was at http:\/\/grams7enufi7jmdl.onion. Taken offline in December","author":"Anonymous","year":"2017","unstructured":"Anonymous . 2017 . Grams: Search the Darknet. Was at http:\/\/grams7enufi7jmdl.onion. Taken offline in December 2017. Anonymous. 2017. Grams: Search the Darknet. Was at http:\/\/grams7enufi7jmdl.onion. Taken offline in December 2017."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"J. Bien and R. Tibshirani. 2011. Hierarchical Clustering With Prototypes via Minimax Linkage. J. Am. Stat. Assoc. 106 495 (2011) 1075--1084.  J. Bien and R. Tibshirani. 2011. Hierarchical Clustering With Prototypes via Minimax Linkage. J. Am. Stat. Assoc. 106 495 (2011) 1075--1084.","DOI":"10.1198\/jasa.2011.tm10183"},{"key":"e_1_3_2_1_5_1","first-page":"7","article-title":"Studying illicit drug trafficking on Darknet markets: Structure and organisation from a Canadian perspective. Forensic Sci","volume":"264","author":"Bros\u00e9us J.","year":"2016","unstructured":"J. Bros\u00e9us , D. Rhumorbarbe , C. Mireault , V. Ouellette , F. Crispino , and D. D\u00e9cary- H\u00e9tu . 2016 . Studying illicit drug trafficking on Darknet markets: Structure and organisation from a Canadian perspective. Forensic Sci . Int. 264 (2016), 7 -- 14 . J. Bros\u00e9us, D. Rhumorbarbe, C. Mireault, V. Ouellette, F. Crispino, and D. D\u00e9cary- H\u00e9tu. 2016. Studying illicit drug trafficking on Darknet markets: Structure and organisation from a Canadian perspective. Forensic Sci. Int. 264 (2016), 7--14.","journal-title":"Int."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31164-2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"e_1_3_2_1_8_1","unstructured":"N. Christin. 2017. An EU-focused analysis of drug supply on the AlphaBay marketplace. EMCDDA report for contract CT.17.SAT.0063.1.0. Available at http:\/\/www.emcdda.europa.eu\/system\/files\/attachments\/6622\/AlphaBay-final-paper.pdf.  N. Christin. 2017. An EU-focused analysis of drug supply on the AlphaBay marketplace. EMCDDA report for contract CT.17.SAT.0063.1.0. Available at http:\/\/www.emcdda.europa.eu\/system\/files\/attachments\/6622\/AlphaBay-final-paper.pdf."},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"DHS","year":"2019","unstructured":"DHS S&T -- CSD. {n. d.}. Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) . Retrieved May 18, 2019 , from https:\/\/impactcybertrust.org. DHS S&T -- CSD. {n. d.}. Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT). Retrieved May 18, 2019, from https:\/\/impactcybertrust.org."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 13th USENIX Security Symposium.","author":"Dingledine R.","unstructured":"R. Dingledine , N. Mathewson , and P. Syverson . 2004. Tor: The Second-Generation Onion Router . In Proceedings of the 13th USENIX Security Symposium. R. Dingledine, N. Mathewson, and P. Syverson. 2004. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186094"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1969.10501049"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2017.05.052"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. USENIX Security.","author":"Kappos G.","unstructured":"G. Kappos , H. Yousaf , M. Maller , and S. Meiklejohn . 2018. An Empirical Analysis of Anonymity in Zcash . In Proc. USENIX Security. G. Kappos, H. Yousaf, M. Maller, and S. Meiklejohn. 2018. An Empirical Analysis of Anonymity in Zcash. In Proc. USENIX Security."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134002"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052677"},{"key":"e_1_3_2_1_18_1","volume-title":"Drugs on the dark net: How cryptomarkets are transforming the global trade in illicit drugs","author":"Martin J.","unstructured":"J. Martin . 2014. Drugs on the dark net: How cryptomarkets are transforming the global trade in illicit drugs . Springer . J. Martin. 2014. Drugs on the dark net: How cryptomarkets are transforming the global trade in illicit drugs. Springer."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_15"},{"key":"e_1_3_2_1_21_1","volume-title":"An Empirical Analysis of Traceability in the Monero Blockchain. In Proc. PETS","volume":"3","author":"M\u00f6ser M.","unstructured":"M. M\u00f6ser , K. Soska , E. Heilman , K. Lee , H. Heffan , S. Srivastava , K. Hogan , J. Hennessey , A. Miller , A. Narayanan , and N. Christin . 2018 . An Empirical Analysis of Traceability in the Monero Blockchain. In Proc. PETS , Vol. 3 . Barcelona, Spain. M. M\u00f6ser, K. Soska, E. Heilman, K. Lee, H. Heffan, S. Srivastava, K. Hogan, J. Hennessey, A. Miller, A. Narayanan, and N. Christin. 2018. An Empirical Analysis of Traceability in the Monero Blockchain. In Proc. PETS, Vol. 3. Barcelona, Spain."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2018.03.016"},{"key":"e_1_3_2_1_23_1","volume-title":"The tax sleuth who took down a drug lord. https:\/\/www.nytimes.com\/2015\/12\/27\/business\/dealbook\/the-unsung-tax-agent-who-put-a-face-on-the-silk-road.html. Last accessed","author":"Popper N.","year":"2019","unstructured":"N. Popper . 2015. The tax sleuth who took down a drug lord. https:\/\/www.nytimes.com\/2015\/12\/27\/business\/dealbook\/the-unsung-tax-agent-who-put-a-face-on-the-silk-road.html. Last accessed : May 18, 2019 .. N. Popper. 2015. The tax sleuth who took down a drug lord. https:\/\/www.nytimes.com\/2015\/12\/27\/business\/dealbook\/the-unsung-tax-agent-who-put-a-face-on-the-silk-road.html. Last accessed: May 18, 2019.."},{"key":"e_1_3_2_1_24_1","first-page":"1409","article-title":"A statistical method for evaluating systematic relationships","volume":"38","author":"Sokal R. R.","year":"1958","unstructured":"R. R. Sokal and C. D. Michener . 1958 . A statistical method for evaluating systematic relationships . University of Kansas Science Bulletin 38 (1958), 1409 -- 1438 . R. R. Sokal and C. D. Michener. 1958. A statistical method for evaluating systematic relationships. University of Kansas Science Bulletin 38 (1958), 1409--1438.","journal-title":"University of Kansas Science Bulletin"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. USENIX Security","author":"Soska K.","unstructured":"K. Soska and N. Christin . 2015. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem . In Proc. USENIX Security . Washington, DC, 33--48. K. Soska and N. Christin. 2015. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. In Proc. USENIX Security. Washington, DC, 33--48."},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. USENIX Security","author":"Szurdi J.","unstructured":"J. Szurdi , B. Kocso , G. Cseh , J. Spring , M. Felegyhazi , and C. Kanich . 2014. The Long ?Taile\" of Typosquatting Domain Names . In Proc. USENIX Security . San Diego, CA, 191--206. J. Szurdi, B. Kocso, G. Cseh, J. Spring, M. Felegyhazi, and C. Kanich. 2014. The Long ?Taile\" of Typosquatting Domain Names. In Proc. USENIX Security. San Diego, CA, 191--206."},{"key":"e_1_3_2_1_27_1","volume-title":"Retrieved","author":"Grugq The","year":"2017","unstructured":"The Grugq . 2017 . Operational Security and the RealWorld. https:\/\/medium.com\/@thegrugq\/operational-security-and-the-real-world-3c07e7eeb2e8 . Retrieved May 18, 2019. The Grugq. 2017. Operational Security and the RealWorld. https:\/\/medium.com\/@thegrugq\/operational-security-and-the-real-world-3c07e7eeb2e8. Retrieved May 18, 2019."},{"key":"e_1_3_2_1_28_1","volume-title":"Eastern District of California","author":"United States District Court","year":"2016","unstructured":"United States District Court , Eastern District of California . 2016 . Affidavit of Matthew Larsen . https:\/\/www.justice.gov\/usao-edca\/file\/836576\/download, accessed 2017-08--20. United States District Court, Eastern District of California. 2016. Affidavit of Matthew Larsen. https:\/\/www.justice.gov\/usao-edca\/file\/836576\/download, accessed 2017-08--20."},{"key":"e_1_3_2_1_29_1","volume-title":"Eastern District of New York","author":"United States District Court","year":"2016","unstructured":"United States District Court , Eastern District of New York . 2016 . Affidavit in Support of Removal to the Eastern District of California . https:\/\/regmedia.co.uk\/2016\/08\/12\/almashwali_arrest.pdf, accessed 2017-08--20. dark51. United States District Court, Eastern District of New York. 2016. Affidavit in Support of Removal to the Eastern District of California. https:\/\/regmedia.co.uk\/2016\/08\/12\/almashwali_arrest.pdf, accessed 2017-08--20. dark51."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. USENIX Security","author":"van Wegberg R.","year":"2018","unstructured":"R. van Wegberg , S. Tajalizadehkhoob , K. Soska , U. Akyazi , C. Hernandez Ganan , B. Klievink , N. Christin , and M. van Eeten . 2018 . Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets . In Proc. USENIX Security . Baltimore, MD. R. van Wegberg, S. Tajalizadehkhoob, K. Soska, U. Akyazi, C. Hernandez Ganan, B. Klievink, N. Christin, and M. van Eeten. 2018. Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets. In Proc. USENIX Security. Baltimore, MD."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2014.12.010"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2817946.2817964"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851226"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196529"}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Anchorage AK USA","acronym":"KDD '19","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330763","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330763","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:50Z","timestamp":1750208270000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330763"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":34,"alternative-id":["10.1145\/3292500.3330763","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330763","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}