{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T02:52:52Z","timestamp":1777949572701,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3594556.3594624","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T21:34:46Z","timestamp":1694554486000},"page":"44-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A Framework for User-Centric Visualisation of Blockchain Transactions in Critical Infrastructure"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3187-6131","authenticated-orcid":false,"given":"Samantha Tharani","family":"Jeyakumar","sequence":"first","affiliation":[{"name":"School of ICT, Griffith University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0804-1176","authenticated-orcid":false,"given":"Ryan","family":"Ko","sequence":"additional","affiliation":[{"name":"The University of Queensland, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6787-6379","authenticated-orcid":false,"given":"Vallipuram","family":"Muthukkumarasamy","sequence":"additional","affiliation":[{"name":"School of ICT, Griffith University, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain. arXiv preprint [Web Link]","author":"Akcora Cuneyt\u00a0Gurcan","year":"2019","unstructured":"Cuneyt\u00a0Gurcan Akcora , Yitao Li , Yulia\u00a0 R Gel , and Murat Kantarcioglu . 2019. BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain. arXiv preprint [Web Link] ( 2019 ). Cuneyt\u00a0Gurcan Akcora, Yitao Li, Yulia\u00a0R Gel, and Murat Kantarcioglu. 2019. BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain. arXiv preprint [Web Link] (2019)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560672"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098972"},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/info.elliptic.co\/hubfs\/big-bang\/bigbang-v1.html. [Online","year":"2023","unstructured":"bitbigbang 2023. BitcoinBigBang. https:\/\/info.elliptic.co\/hubfs\/big-bang\/bigbang-v1.html. [Online ; accessed April- 2023 ]. bitbigbang 2023. BitcoinBigBang. https:\/\/info.elliptic.co\/hubfs\/big-bang\/bigbang-v1.html. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/bitcoincity.info\/. [Online","year":"2023","unstructured":"bitcoincity 2023. BitcoinCity. http:\/\/bitcoincity.info\/. [Online ; accessed April- 2023 ]. bitcoincity 2023. BitcoinCity. http:\/\/bitcoincity.info\/. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_6_1","volume-title":"Ponzi dataset. https:\/\/github.com\/seanconeys\/Bitcoin_Ponzi_ml\/tree\/master\/datasets. [Online","year":"2023","unstructured":"bitcoinponzi 2019. Ponzi dataset. https:\/\/github.com\/seanconeys\/Bitcoin_Ponzi_ml\/tree\/master\/datasets. [Online ; accessed April- 2023 ]. bitcoinponzi 2019. Ponzi dataset. https:\/\/github.com\/seanconeys\/Bitcoin_Ponzi_ml\/tree\/master\/datasets. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/www.bitlisten.com\/. [Online","year":"2023","unstructured":"bitlisten 2023. BitListen. https:\/\/www.bitlisten.com\/. [Online ; accessed April- 2023 ]. bitlisten 2023. BitListen. https:\/\/www.bitlisten.com\/. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/blockchain3d.info\/assets\/webgl\/index.html. [Online","year":"2023","unstructured":"block3d 2023. Blockchain3DExplorer. https:\/\/blockchain3d.info\/assets\/webgl\/index.html. [Online ; accessed 2023 ]. block3d 2023. Blockchain3DExplorer. https:\/\/blockchain3d.info\/assets\/webgl\/index.html. [Online; accessed 2023]."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/www.blockchain.com\/explorer. [Online","author":"Explorer Blockchain","year":"2023","unstructured":"blockexp 2023. Blockchain Explorer . https:\/\/www.blockchain.com\/explorer. [Online ; accessed April- 2023 ]. blockexp 2023. Blockchain Explorer. https:\/\/www.blockchain.com\/explorer. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/bitinfocharts.com\/. [Online","author":"Charts BitInfo","year":"2023","unstructured":"btcinfochart 2023. BitInfo Charts . https:\/\/bitinfocharts.com\/. [Online ; accessed April- 2023 ]. btcinfochart 2023. BitInfo Charts. https:\/\/bitinfocharts.com\/. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/www.chainalysis.com\/company\/. [Online","year":"2023","unstructured":"chainanalysis 2023. Chainanalysis. https:\/\/www.chainalysis.com\/company\/. [Online ; accessed April- 2023 ]. chainanalysis 2023. Chainanalysis. https:\/\/www.chainalysis.com\/company\/. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/dailyblockchain.github.io\/. [Online","year":"2023","unstructured":"dailyblock 2023. DailyBlockchain. https:\/\/dailyblockchain.github.io\/. [Online ; accessed April- 2023 ]. dailyblock 2023. DailyBlockchain. https:\/\/dailyblockchain.github.io\/. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/etherscan.io\/. [Online","year":"2023","unstructured":"etherscan 2023. EtherScan. https:\/\/etherscan.io\/. [Online ; accessed April- 2023 ]. etherscan 2023. EtherScan. https:\/\/etherscan.io\/. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_14_1","volume-title":"http:\/\/www.ethviewer.live\/. [Online","year":"2023","unstructured":"etherview 2023. Ethviewer. http:\/\/www.ethviewer.live\/. [Online ; accessed April- 2023 ]. etherview 2023. Ethviewer. http:\/\/www.ethviewer.live\/. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/ethplorer.io\/. [Online","year":"2023","unstructured":"ethplorer 2023. Ethplorer. https:\/\/ethplorer.io\/. [Online ; accessed April- 2023 ]. ethplorer 2023. Ethplorer. https:\/\/ethplorer.io\/. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3190487"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3526195"},{"key":"e_1_3_2_1_18_1","volume-title":"Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE)","author":"Garae Jeffery","unstructured":"Jeffery Garae , Ryan\u00a0 KL Ko , and Mark Apperley . 2018. A full-scale security visualization effectiveness measurement and presentation approach. In 2018 17th IEEE International Conference On Trust , Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE) . IEEE , 639\u2013650. Jeffery Garae, Ryan\u00a0KL Ko, and Mark Apperley. 2018. A full-scale security visualization effectiveness measurement and presentation approach. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE, 639\u2013650."},{"key":"e_1_3_2_1_19_1","volume-title":"UVisP: User-centric visualization of data provenance with gestalt principles. In 2016 Ieee Trustcom\/Bigdatase\/Ispa","author":"Garae Jeffery","year":"1923","unstructured":"Jeffery Garae , Ryan\u00a0 KL Ko , and Sivadon Chaisiri . 2016. UVisP: User-centric visualization of data provenance with gestalt principles. In 2016 Ieee Trustcom\/Bigdatase\/Ispa . IEEE , 1923 \u20131930. Jeffery Garae, Ryan\u00a0KL Ko, and Sivadon Chaisiri. 2016. UVisP: User-centric visualization of data provenance with gestalt principles. In 2016 Ieee Trustcom\/Bigdatase\/Ispa. IEEE, 1923\u20131930."},{"key":"e_1_3_2_1_20_1","first-page":"100067","article-title":"A survey on blockchain technology and its security. Blockchain","volume":"3","author":"Guo Huaqun","year":"2022","unstructured":"Huaqun Guo and Xingjie Yu . 2022 . A survey on blockchain technology and its security. Blockchain : Research and Applications 3 , 2 (2022), 100067 . https:\/\/doi.org\/10.1016\/j.bcra.2022.100067 10.1016\/j.bcra.2022.100067 Huaqun Guo and Xingjie Yu. 2022. A survey on blockchain technology and its security. Blockchain: Research and Applications 3, 2 (2022), 100067. https:\/\/doi.org\/10.1016\/j.bcra.2022.100067","journal-title":"Research and Applications"},{"key":"e_1_3_2_1_21_1","volume-title":"Visualizing Blockchain Transaction Behavioural Pattern: A Graph-based Approach. (3","author":"Jeyakumar Samantha","year":"2023","unstructured":"Samantha Jeyakumar , Zh\u00e9 H\u00f3u , Andrew\u00a0Charles Eugene\u00a0Yugarajah , MARIMUTHU PALANISWAMI, and Vallipuram Muthukkumarasamy . 2023. Visualizing Blockchain Transaction Behavioural Pattern: A Graph-based Approach. (3 2023 ). https:\/\/doi.org\/10.36227\/techrxiv.22329889.v1 10.36227\/techrxiv.22329889.v1 Samantha Jeyakumar, Zh\u00e9 H\u00f3u, Andrew\u00a0Charles Eugene\u00a0Yugarajah, MARIMUTHU PALANISWAMI, and Vallipuram Muthukkumarasamy. 2023. Visualizing Blockchain Transaction Behavioural Pattern: A Graph-based Approach. (3 2023). https:\/\/doi.org\/10.36227\/techrxiv.22329889.v1"},{"key":"e_1_3_2_1_22_1","unstructured":"kirin 2019. Kirin: An Interactive Visualization for Decentralized Finance Applications in Ethereum Blockchain. https:\/\/saiyuelyu.github.io\/projects\/project_kirin\/  kirin 2019. Kirin: An Interactive Visualization for Decentralized Finance Applications in Ethereum Blockchain. https:\/\/saiyuelyu.github.io\/projects\/project_kirin\/"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00009"},{"key":"e_1_3_2_1_24_1","volume-title":"Visualizing dynamic bitcoin transaction patterns. Big data 4, 2","author":"McGinn Dan","year":"2016","unstructured":"Dan McGinn , David Birch , David Akroyd , Miguel Molina-Solana , Yike Guo , and William\u00a0 J Knottenbelt . 2016. Visualizing dynamic bitcoin transaction patterns. Big data 4, 2 ( 2016 ), 109\u2013119. Dan McGinn, David Birch, David Akroyd, Miguel Molina-Solana, Yike Guo, and William\u00a0J Knottenbelt. 2016. Visualizing dynamic bitcoin transaction patterns. Big data 4, 2 (2016), 109\u2013119."},{"key":"e_1_3_2_1_25_1","volume-title":"hOCBS: A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design. Information processing & management 58, 3","author":"Miyachi Ken","year":"2021","unstructured":"Ken Miyachi and Tim\u00a0 K Mackey . 2021. hOCBS: A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design. Information processing & management 58, 3 ( 2021 ), 102535. Ken Miyachi and Tim\u00a0K Mackey. 2021. hOCBS: A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design. Information processing & management 58, 3 (2021), 102535."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00210"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3088056"},{"key":"e_1_3_2_1_28_1","volume-title":"https:\/\/oxt.me\/requester. [Online","author":"Landscapes Land","year":"2023","unstructured":"oxt Land 2023. OXT Landscapes . https:\/\/oxt.me\/requester. [Online ; accessed April- 2023 ]. oxtLand 2023. OXT Landscapes. https:\/\/oxt.me\/requester. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS54816.2022.00062"},{"key":"e_1_3_2_1_30_1","volume-title":"Ponzi Smart Contract. https:\/\/www.kaggle.com\/datasets\/xblock\/smart-ponzi-scheme-labels. [Online","year":"2023","unstructured":"ponzismartcontract 2021. Ponzi Smart Contract. https:\/\/www.kaggle.com\/datasets\/xblock\/smart-ponzi-scheme-labels. [Online ; accessed April- 2023 ]. ponzismartcontract 2021. Ponzi Smart Contract. https:\/\/www.kaggle.com\/datasets\/xblock\/smart-ponzi-scheme-labels. [Online; accessed April-2023]."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2020.110208"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN52139.2021.9524878"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3016821"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449880"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3025916"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900661"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3213353"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST50239.2020.00014"}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594556.3594624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:07Z","timestamp":1750183747000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594624"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":38,"alternative-id":["10.1145\/3594556.3594624","10.1145\/3594556"],"URL":"https:\/\/doi.org\/10.1145\/3594556.3594624","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}