{"id":"https://openalex.org/W6888044250","doi":"https://doi.org/10.18420/oid2022_10","title":"Adversary Tactics and Techniques specific to Cryptocurrency Scams","display_name":"Adversary Tactics and Techniques specific to Cryptocurrency Scams","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W6888044250","doi":"https://doi.org/10.18420/oid2022_10"},"language":"en","primary_location":{"id":"pmh:oai:null:publica/418583","is_oa":true,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/418583","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://publica.fraunhofer.de/handle/publica/418583","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Horch, Andrea","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Horch, Andrea","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Schunck, Christian H.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Schunck, Christian H.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Ruff, Christopher","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ruff, Christopher","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3031,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.69464035,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.2793999910354614,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.2793999910354614,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.12309999763965607,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.10760000348091125,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.9509000182151794},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7674999833106995},{"id":"https://openalex.org/keywords/market-capitalization","display_name":"Market capitalization","score":0.5812000036239624},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4690000116825104},{"id":"https://openalex.org/keywords/capitalization","display_name":"Capitalization","score":0.46309998631477356},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.4366999864578247},{"id":"https://openalex.org/keywords/fiat-money","display_name":"Fiat money","score":0.42260000109672546}],"concepts":[{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.9509000182151794},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7674999833106995},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6068999767303467},{"id":"https://openalex.org/C193445137","wikidata":"https://www.wikidata.org/wiki/Q471719","display_name":"Market capitalization","level":4,"score":0.5812000036239624},{"id":"https://openalex.org/C54750564","wikidata":"https://www.wikidata.org/wiki/Q26643","display_name":"Commerce","level":1,"score":0.5339000225067139},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5299000144004822},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4690000116825104},{"id":"https://openalex.org/C2779137862","wikidata":"https://www.wikidata.org/wiki/Q425951","display_name":"Capitalization","level":2,"score":0.46309998631477356},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.4366999864578247},{"id":"https://openalex.org/C2780589280","wikidata":"https://www.wikidata.org/wiki/Q240532","display_name":"Fiat money","level":3,"score":0.42260000109672546},{"id":"https://openalex.org/C122941539","wikidata":"https://www.wikidata.org/wiki/Q10836209","display_name":"Electronic money","level":3,"score":0.3887999951839447},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3686000108718872},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3407999873161316},{"id":"https://openalex.org/C156308498","wikidata":"https://www.wikidata.org/wiki/Q1347898","display_name":"Ping (video games)","level":2,"score":0.3336000144481659},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3224000036716461},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2833999991416931},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.26820001006126404},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.2565999925136566},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:null:publica/418583","is_oa":true,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/418583","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"},{"id":"doi:10.18420/oid2022_10","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2022_10","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:null:publica/418583","is_oa":true,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/418583","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6272702813148499}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"At":[0],"the":[1,4,13,62,75,89,119],"end":[2],"of":[3,12,20,59,121],"year":[5],"2020,":[6],"there":[7,47],"was":[8],"a":[9],"steep":[10],"uptrend":[11],"cryptocurrency":[14],"market.":[15],"The":[16,56],"global":[17],"market":[18,63],"capitalization":[19],"cryptocurrencies":[21,52,115],"climbed":[22],"from":[23],"350":[24],"billion":[25],"US$":[26,34,42],"in":[27,35,43],"October":[28],"2020":[29],"to":[30,84,114],"almost":[31],"2.5":[32],"trillion":[33,41],"May":[36],"2021":[37],"and":[38,70,92,101],"reached":[39],"3":[40],"November":[44],"2021.":[45],"Currently,":[46],"are":[48,105,118],"more":[49],"than":[50],"17,600":[51],"listed":[53],"on":[54],"CoinMarketCap.":[55],"ample":[57],"amount":[58],"money":[60],"within":[61],"attracts":[64],"investors":[65],"as":[66,68,96],"well":[67],"scammers":[69],"hackers.":[71],"Recent":[72],"incidents":[73],"like":[74],"BadgerDAO":[76],"hack":[77],"have":[78],"shown":[79],"how":[80],"easy":[81],"it":[82],"is":[83],"steal":[85],"cryptocurrencies.":[86],"While":[87],"all":[88],"standard":[90],"scamming":[91],"hacking":[93,104],"techniques":[94],"such":[95],"identity":[97],"theft,":[98],"social":[99],"engineering":[100],"web":[102],"application":[103],"successfully":[106],"employed":[107],"by":[108],"attackers,":[109],"new":[110],"scams":[111],"very":[112],"specific":[113],"emerged,":[116],"which":[117],"focus":[120],"this":[122],"paper.":[123]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
