{"id":"https://openalex.org/W4408861351","doi":"https://doi.org/10.1109/icca62237.2024.10927796","title":"Machine Learning Techniques for Detecting Abnormal Behaviors in Blockchain Technologies: A Methodological Review","display_name":"Machine Learning Techniques for Detecting Abnormal Behaviors in Blockchain Technologies: A Methodological Review","publication_year":2024,"publication_date":"2024-12-17","ids":{"openalex":"https://openalex.org/W4408861351","doi":"https://doi.org/10.1109/icca62237.2024.10927796"},"language":"en","primary_location":{"id":"doi:10.1109/icca62237.2024.10927796","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icca62237.2024.10927796","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Computer and Applications (ICCA)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075497478","display_name":"Mohamed A. Fouly","orcid":null},"institutions":[{"id":"https://openalex.org/I91041137","display_name":"Assiut University","ror":"https://ror.org/01jaj8n65","country_code":"EG","type":"education","lineage":["https://openalex.org/I91041137"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Mohamed A. Fouly","raw_affiliation_strings":["Assiut University,Information Systems Dept.,Assiut,Egypt"],"affiliations":[{"raw_affiliation_string":"Assiut University,Information Systems Dept.,Assiut,Egypt","institution_ids":["https://openalex.org/I91041137"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109244101","display_name":"Taysir Hassan A. Soliman","orcid":"https://orcid.org/0000-0002-7635-4089"},"institutions":[{"id":"https://openalex.org/I91041137","display_name":"Assiut University","ror":"https://ror.org/01jaj8n65","country_code":"EG","type":"education","lineage":["https://openalex.org/I91041137"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Taysir Hassan A. Soliman","raw_affiliation_strings":["Assiut University,Information Systems Dept.,Assiut,Egypt"],"affiliations":[{"raw_affiliation_string":"Assiut University,Information Systems Dept.,Assiut,Egypt","institution_ids":["https://openalex.org/I91041137"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075264815","display_name":"Ahmed I. Taloba","orcid":"https://orcid.org/0000-0003-3558-423X"},"institutions":[{"id":"https://openalex.org/I91041137","display_name":"Assiut University","ror":"https://ror.org/01jaj8n65","country_code":"EG","type":"education","lineage":["https://openalex.org/I91041137"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Ahmed I. Taloba","raw_affiliation_strings":["Assiut University,Information Systems Dept.,Assiut,Egypt"],"affiliations":[{"raw_affiliation_string":"Assiut University,Information Systems Dept.,Assiut,Egypt","institution_ids":["https://openalex.org/I91041137"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075497478"],"corresponding_institution_ids":["https://openalex.org/I91041137"],"apc_list":null,"apc_paid":null,"fwci":1.5646,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.89043591,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.8930000066757202,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.8930000066757202,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.8389000296592712,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8203999996185303,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9380297660827637},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6917334794998169},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.43290606141090393},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35895851254463196},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27926766872406006}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9380297660827637},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6917334794998169},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.43290606141090393},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35895851254463196},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27926766872406006}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icca62237.2024.10927796","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icca62237.2024.10927796","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Computer and Applications (ICCA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W3093496714","https://openalex.org/W3117672440","https://openalex.org/W3133945430","https://openalex.org/W3159818932","https://openalex.org/W3216826992","https://openalex.org/W4210975713","https://openalex.org/W4220811039","https://openalex.org/W4281726005","https://openalex.org/W4281772117","https://openalex.org/W4291927129","https://openalex.org/W4296312219","https://openalex.org/W4308935283","https://openalex.org/W4309288251","https://openalex.org/W4310072454","https://openalex.org/W4321510719","https://openalex.org/W4361987581","https://openalex.org/W4366415087","https://openalex.org/W4382789594","https://openalex.org/W4386536273","https://openalex.org/W4387426021","https://openalex.org/W4390637043","https://openalex.org/W4390722487","https://openalex.org/W4390732526","https://openalex.org/W4392560476","https://openalex.org/W4393124404","https://openalex.org/W4394801079","https://openalex.org/W4395957317","https://openalex.org/W4399728055","https://openalex.org/W4401210828","https://openalex.org/W6842612356"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047"],"abstract_inverted_index":{"A":[0,88],"blockchain":[1,21],"is":[2],"made":[3],"up":[4],"of":[5,9,48,54,144,169],"an":[6,142],"ordered":[7],"list":[8],"nodes":[10,18],"connected":[11],"by":[12,50],"links":[13],"known":[14],"as":[15,57,106,157],"chains.":[16],"The":[17,28],"in":[19,109,132,136,154],"the":[20,52,111,133,145,170],"store":[22],"data":[23,56],"and":[24,30,39,45,73,83,130,160],"are":[25,78,103],"stored":[26],"together.":[27],"distributed":[29],"decentralized":[31],"ledger":[32],"technology,":[33],"blockchain,":[34,155],"empowers":[35],"cryptocurrencies":[36],"like":[37],"Bitcoin":[38],"Ethereum.":[40],"It":[41],"makes":[42],"a":[43,58,167],"safe":[44],"open":[46],"record":[47],"transactions":[49],"permitting":[51],"distribution":[53],"digital":[55],"\u201cblock\u201d":[59],"but":[60],"prohibiting":[61],"its":[62],"duplication.":[63],"Furthermore,":[64],"blockchain-based":[65],"anomaly":[66,122,173],"detection":[67,123],"tools,":[68],"which":[69],"always":[70],"automatically":[71],"detect":[72],"weed":[74],"out":[75,129],"abnormal":[76,152],"behaviors,":[77],"essential":[79],"for":[80,150,172],"protecting":[81],"networks":[82],"systems":[84],"from":[85],"unforeseen":[86],"intrusions.":[87],"smart":[89,112],"contract":[90,113],"could":[91],"monitor":[92],"real-time":[93],"transaction":[94],"volumes,":[95],"access":[96],"patterns,":[97],"or":[98,117],"resource":[99],"usage.":[100],"If":[101],"anomalies":[102],"detected,":[104],"such":[105,156],"unusual":[107],"spikes":[108],"activity,":[110],"can":[114],"trigger":[115],"alerts":[116],"take":[118],"predefined":[119],"actions.":[120],"Numerous":[121],"analysis":[124],"techniques":[125,149],"have":[126],"been":[127],"put":[128],"used":[131],"scientific":[134],"literature":[135],"various":[137],"fields.":[138],"This":[139],"paper":[140],"provides":[141],"overview":[143],"latest":[146],"machine":[147],"learning":[148],"identifying":[151],"behaviors":[153,174],"supervised,":[158],"unsupervised,":[159],"deep":[161],"learning.":[162],"We":[163],"also":[164],"go":[165],"over":[166],"few":[168],"applications":[171],"detection.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
