{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T07:49:16Z","timestamp":1724485756805},"reference-count":8,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2022,4,1]]},"DOI":"10.1587\/transinf.2021edl8092","type":"journal-article","created":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T22:28:22Z","timestamp":1648765702000},"page":"824-827","source":"Crossref","is-referenced-by-count":3,"title":["Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method"],"prefix":"10.1587","volume":"E105.D","author":[{"given":"Jinho","family":"CHOI","sequence":"first","affiliation":[{"name":"Korea Advanced Institute of Science and Technology"}]},{"given":"Taehwa","family":"LEE","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology"}]},{"given":"Kwanwoo","family":"KIM","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology"}]},{"given":"Minjae","family":"SEO","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology"}]},{"given":"Jian","family":"CUI","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology"}]},{"given":"Seungwon","family":"SHIN","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] S. Nakamoto, \u201cBitcoin: A peer-to-peer electronic cash system,\u201d Decentralized Business Review, 21260, 2008."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] M. Paquet-Clouston, M. Romiti, B. Haslhofer, and T. Charvat, \u201cSpams meet cryptocurrencies: Sextortion in the bitcoin ecosystem,\u201d Proc. 1st ACM Conference on Advances in Financial Technologies, pp.76-88, Oct. 2019. 10.1145\/3318041.3355466","DOI":"10.1145\/3318041.3355466"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] S. Kethineni, Y. Cao, and C. Dodge, \u201cUse of bitcoin in darknet markets: Examining facilitative factors on bitcoin-related crimes,\u201d American Journal of Criminal Justice vol.43, no.2, pp.141-157, 2018. 10.1007\/s12103-017-9394-6","DOI":"10.1007\/s12103-017-9394-6"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] S. Lee, C. Yoon, H. Kang, Y. Kim, Y. Kim, D. Han, S. Son, and S. Shin, \u201cCybercriminal minds: an investigative study of cryptocurrency abuses in the dark web,\u201d Network &amp; Distributed System Security Symposium, Internet Society, 2019. 10.14722\/NDSS.2019.23055","DOI":"10.14722\/ndss.2019.23055"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] F. Oggier, A. Datta, and S. Phetsouvanh, \u201cAn ego network analysis of sextortionists,\u201d Social Network Analysis and Mining, vol.10, pp.1-14, 2020. 10.1007\/s13278-020-00650-x","DOI":"10.1007\/s13278-020-00650-x"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] P. Xia, H. Wang, X. Luo, L. Wu, Y. Zhou, G. Bai, G. Xu, G. Huang, and X. Liu, \u201cDon&apos;t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams,\u201d arXiv preprint arXiv:2007.13639, 2020.","DOI":"10.1109\/eCrime51433.2020.9493255"},{"key":"7","unstructured":"[7] M. Wang, H. Ichijo, and B. Xiao, \u201cCryptocurrency address clustering and labeling,\u201d arXiv preprint arXiv:2003.13399 (2020)."},{"key":"8","unstructured":"[8] T.B. Team, \u201cBitcoin abuse database,\u201d https:\/\/www.bitcoinabuse.com\/, 2020."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/4\/E105.D_2021EDL8092\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T05:03:32Z","timestamp":1648875812000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/4\/E105.D_2021EDL8092\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,1]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2021edl8092","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,1]]},"article-number":"2021EDL8092"}}