{"id":"https://openalex.org/W2921393711","doi":"https://doi.org/10.1109/malware.2018.8659357","title":"Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions","display_name":"Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2921393711","doi":"https://doi.org/10.1109/malware.2018.8659357","mag":"2921393711"},"language":"en","primary_location":{"id":"doi:10.1109/malware.2018.8659357","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2018.8659357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 13th International Conference on Malicious and Unwanted Software (MALWARE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001793112","display_name":"Jonathan Oakley","orcid":"https://orcid.org/0000-0002-8140-428X"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jonathan Oakley","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047900056","display_name":"Carl Worley","orcid":null},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Carl Worley","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103257491","display_name":"Lu Yu","orcid":"https://orcid.org/0000-0002-7235-9640"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lu Yu","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016131855","display_name":"Richard R. Brooks","orcid":"https://orcid.org/0000-0002-4240-4762"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Richard Brooks","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026440046","display_name":"Anthony Skjellum","orcid":"https://orcid.org/0000-0001-5252-6600"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anthony Skjellum","raw_affiliation_strings":["Cyber Security Research Center, Auburn University, Auburn, AL, USA"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Center, Auburn University, Auburn, AL, USA","institution_ids":["https://openalex.org/I82497590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5001793112"],"corresponding_institution_ids":["https://openalex.org/I8078737"],"apc_list":null,"apc_paid":null,"fwci":0.1651,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.49930385,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"43","issue":null,"first_page":"161","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7866851091384888},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6993151903152466},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.588520348072052},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5710152387619019},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.5624299645423889},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5371727347373962},{"id":"https://openalex.org/keywords/money-laundering","display_name":"Money laundering","score":0.5197531580924988},{"id":"https://openalex.org/keywords/currency","display_name":"Currency","score":0.4555964469909668},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.22312501072883606},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1613519787788391},{"id":"https://openalex.org/keywords/monetary-economics","display_name":"Monetary economics","score":0.10151296854019165},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.09329041838645935},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.06947961449623108}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7866851091384888},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6993151903152466},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.588520348072052},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5710152387619019},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.5624299645423889},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5371727347373962},{"id":"https://openalex.org/C2780005421","wikidata":"https://www.wikidata.org/wiki/Q151900","display_name":"Money laundering","level":2,"score":0.5197531580924988},{"id":"https://openalex.org/C141121606","wikidata":"https://www.wikidata.org/wiki/Q8142","display_name":"Currency","level":2,"score":0.4555964469909668},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.22312501072883606},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1613519787788391},{"id":"https://openalex.org/C556758197","wikidata":"https://www.wikidata.org/wiki/Q580018","display_name":"Monetary economics","level":1,"score":0.10151296854019165},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.09329041838645935},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.06947961449623108}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/malware.2018.8659357","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2018.8659357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 13th International Conference on Malicious and Unwanted Software (MALWARE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8399999737739563,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W69553326","https://openalex.org/W1454642304","https://openalex.org/W2008449714","https://openalex.org/W2072266282","https://openalex.org/W2105862475","https://openalex.org/W2125838338","https://openalex.org/W2132450919","https://openalex.org/W2159675343","https://openalex.org/W2214897964","https://openalex.org/W2288411737","https://openalex.org/W2588126298","https://openalex.org/W2602867466","https://openalex.org/W2734611358","https://openalex.org/W4248175462","https://openalex.org/W6602830902"],"related_works":["https://openalex.org/W2911012805","https://openalex.org/W2990982421","https://openalex.org/W3096536232","https://openalex.org/W4226470295","https://openalex.org/W2996468513","https://openalex.org/W4226450231","https://openalex.org/W4367354713","https://openalex.org/W3198151675","https://openalex.org/W2949388988","https://openalex.org/W2790327798"],"abstract_inverted_index":{"With":[0],"the":[1,12,64,85],"rise":[2],"of":[3,25,47],"cryptographic":[4],"ransomware,":[5],"Bitcoin":[6,18,86],"has":[7,32],"found":[8],"a":[9,28,45,78],"niche":[10,31],"as":[11],"standard":[13],"currency":[14],"for":[15],"ransoms.":[16],"While":[17],"is":[19],"pseudonymous,":[20],"it":[21],"provides":[22],"no":[23],"guarantee":[24],"untraceability.":[26],"As":[27],"result,":[29],"another":[30],"arisen-Bitcoin":[33],"money":[34],"laundering.":[35],"Hidden":[36],"Markov":[37],"Models":[38],"(HMMs)":[39],"have":[40],"previously":[41],"been":[42],"used":[43],"in":[44,63,67],"number":[46],"applications":[48],"where":[49],"traditional":[50],"pattern":[51],"recognition":[52],"falls":[53],"short.":[54],"In":[55],"this":[56],"paper,":[57],"HMMs":[58,83],"are":[59],"inferred":[60],"from":[61,84],"transactions":[62],"public":[65],"blockchain":[66],"an":[68],"attempt":[69],"to":[70,81],"link":[71],"users,":[72],"events,":[73],"and":[74],"enterprises.":[75],"We":[76],"introduce":[77],"proof-of-concept":[79],"algorithm":[80],"infer":[82],"blockchain.":[87]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
