{"id":"https://openalex.org/W3197269617","doi":"https://doi.org/10.1109/lcn52139.2021.9524878","title":"Graph Based Visualisation Techniques for Analysis of Blockchain Transactions","display_name":"Graph Based Visualisation Techniques for Analysis of Blockchain Transactions","publication_year":2021,"publication_date":"2021-09-07","ids":{"openalex":"https://openalex.org/W3197269617","doi":"https://doi.org/10.1109/lcn52139.2021.9524878","mag":"3197269617"},"language":"en","primary_location":{"id":"doi:10.1109/lcn52139.2021.9524878","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn52139.2021.9524878","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 46th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/10072/411862","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033680033","display_name":"Jeyakumar Samantha Tharani","orcid":"https://orcid.org/0000-0002-3187-6131"},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Jeyakumar Samantha Tharani","raw_affiliation_strings":["Griffith University,School of Information and Communication Technology","School of Information and Communication Technology, Griffith University"],"affiliations":[{"raw_affiliation_string":"Griffith University,School of Information and Communication Technology","institution_ids":["https://openalex.org/I11701301"]},{"raw_affiliation_string":"School of Information and Communication Technology, Griffith University","institution_ids":["https://openalex.org/I11701301"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046725771","display_name":"E.Y.A. Charles","orcid":"https://orcid.org/0000-0002-0678-3486"},"institutions":[{"id":"https://openalex.org/I198412587","display_name":"University of Jaffna","ror":"https://ror.org/02fwjgw17","country_code":"LK","type":"education","lineage":["https://openalex.org/I198412587"]}],"countries":["LK"],"is_corresponding":false,"raw_author_name":"Eugene Yougarajah Andrew Charles","raw_affiliation_strings":["University of Jaffna,Department of Computer Science"],"affiliations":[{"raw_affiliation_string":"University of Jaffna,Department of Computer Science","institution_ids":["https://openalex.org/I198412587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055734272","display_name":"Zh\u00e9 H\u00f3u","orcid":"https://orcid.org/0000-0001-7164-0580"},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zh\u00e9 H\u00f3u","raw_affiliation_strings":["Griffith University,School of Information and Communication Technology","School of Information and Communication Technology, Griffith University"],"affiliations":[{"raw_affiliation_string":"Griffith University,School of Information and Communication Technology","institution_ids":["https://openalex.org/I11701301"]},{"raw_affiliation_string":"School of Information and Communication Technology, Griffith University","institution_ids":["https://openalex.org/I11701301"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080554686","display_name":"Marimuthu Palaniswami","orcid":"https://orcid.org/0000-0002-3635-4252"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Marimuthu Palaniswami","raw_affiliation_strings":["University of Melbourne,Department of Electrical and Electronic Engineering"],"affiliations":[{"raw_affiliation_string":"University of Melbourne,Department of Electrical and Electronic Engineering","institution_ids":["https://openalex.org/I165779595"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016915945","display_name":"Vallipuram Muthukkumarasamy","orcid":"https://orcid.org/0000-0002-6787-6379"},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Vallipuram Muthukkumarasamy","raw_affiliation_strings":["Griffith University,School of Information and Communication Technology","School of Information and Communication Technology, Griffith University"],"affiliations":[{"raw_affiliation_string":"Griffith University,School of Information and Communication Technology","institution_ids":["https://openalex.org/I11701301"]},{"raw_affiliation_string":"School of Information and Communication Technology, Griffith University","institution_ids":["https://openalex.org/I11701301"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5033680033"],"corresponding_institution_ids":["https://openalex.org/I11701301"],"apc_list":null,"apc_paid":null,"fwci":5.9549,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.9630429,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"427","last_page":"430"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8289319276809692},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7796167135238647},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.7407190799713135},{"id":"https://openalex.org/keywords/immutability","display_name":"Immutability","score":0.6889306902885437},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.6125704050064087},{"id":"https://openalex.org/keywords/money-laundering","display_name":"Money laundering","score":0.560156524181366},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.543142557144165},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5255026817321777},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.5234274864196777},{"id":"https://openalex.org/keywords/serialization","display_name":"Serialization","score":0.4676152467727661},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.42969974875450134},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.26483437418937683},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.24206998944282532},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.20475387573242188},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1690894067287445}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8289319276809692},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7796167135238647},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.7407190799713135},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.6889306902885437},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.6125704050064087},{"id":"https://openalex.org/C2780005421","wikidata":"https://www.wikidata.org/wiki/Q151900","display_name":"Money laundering","level":2,"score":0.560156524181366},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.543142557144165},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5255026817321777},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.5234274864196777},{"id":"https://openalex.org/C52723943","wikidata":"https://www.wikidata.org/wiki/Q1127410","display_name":"Serialization","level":2,"score":0.4676152467727661},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.42969974875450134},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.26483437418937683},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.24206998944282532},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.20475387573242188},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1690894067287445},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/lcn52139.2021.9524878","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn52139.2021.9524878","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 46th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-repository.griffith.edu.au:10072/411862","is_oa":true,"landing_page_url":"http://hdl.handle.net/10072/411862","pdf_url":null,"source":{"id":"https://openalex.org/S4306402548","display_name":"Griffith Research Online (Griffith University, Queensland, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11701301","host_organization_name":"Griffith University","host_organization_lineage":["https://openalex.org/I11701301"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference output"}],"best_oa_location":{"id":"pmh:oai:research-repository.griffith.edu.au:10072/411862","is_oa":true,"landing_page_url":"http://hdl.handle.net/10072/411862","pdf_url":null,"source":{"id":"https://openalex.org/S4306402548","display_name":"Griffith Research Online (Griffith University, Queensland, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11701301","host_organization_name":"Griffith University","host_organization_lineage":["https://openalex.org/I11701301"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference output"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.800000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1988699025","https://openalex.org/W2283695185","https://openalex.org/W2762598207","https://openalex.org/W3022662270","https://openalex.org/W3110705828","https://openalex.org/W3117672440","https://openalex.org/W3123868249","https://openalex.org/W3172306995","https://openalex.org/W4288276219","https://openalex.org/W6766612752","https://openalex.org/W6785563557"],"related_works":["https://openalex.org/W1517747134","https://openalex.org/W2802479602","https://openalex.org/W4386576376","https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W1570380538","https://openalex.org/W3130746757","https://openalex.org/W4380683080"],"abstract_inverted_index":{"Blockchain":[0,19],"is":[1,61],"a":[2,28],"digital":[3],"technology":[4],"built":[5],"on":[6],"three":[7],"pillars:":[8],"decentralization,":[9],"transparency":[10],"and":[11,14,31,42,57,79,103,106,125],"immutability.":[12],"Bitcoin":[13,102],"Ethereum":[15,104],"are":[16,24],"two":[17],"prevalent":[18],"platforms,":[20],"where":[21],"the":[22,43,48,96,101,109,114,123],"participants":[23,46],"globally":[25],"connected":[26],"in":[27],"peer-to-peer":[29],"manner":[30],"anonymously":[32],"perform":[33],"trade":[34],"electronically.":[35],"The":[36],"vast":[37],"number":[38],"of":[39,45,87,119,127],"decentralized":[40],"transactions":[41],"pseudo-anonymity":[44],"open":[47],"door":[49],"for":[50,81],"scams,":[51],"cyber":[52],"frauds,":[53],"hacks,":[54],"money":[55],"laundering":[56],"fraudulent":[58,66,128],"transactions.":[59],"It":[60],"challenging":[62],"to":[63,84,94,107],"detect":[64],"such":[65],"activities":[67],"using":[68],"traditional":[69],"auditing":[70],"techniques,":[71],"since":[72],"they":[73],"need":[74],"more":[75],"processing":[76],"power,":[77],"time":[78],"memory":[80],"complex":[82],"queries":[83],"join":[85],"combinations":[86],"tables.":[88],"This":[89],"paper":[90,115],"proposes":[91],"several":[92],"algorithms":[93],"extract":[95],"transaction-":[97],"related":[98],"features":[99,110],"from":[100],"networks":[105],"represent":[108],"as":[111],"graphs.":[112],"Moreover,":[113],"discusses":[116],"how":[117],"visualisation":[118],"graphs":[120],"can":[121],"reflect":[122],"anomalies":[124],"patterns":[126],"activities.":[129]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":15}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2021-09-13T00:00:00"}
