{"id":"https://openalex.org/W6888467785","doi":"https://doi.org/10.21227/y4dz-7y71","title":"LN Snapshots","display_name":"LN Snapshots","publication_year":2022,"publication_date":"2022-03-23","ids":{"openalex":"https://openalex.org/W6888467785","doi":"https://doi.org/10.21227/y4dz-7y71"},"language":"en","primary_location":{"id":"doi:10.21227/y4dz-7y71","is_oa":true,"landing_page_url":"https://doi.org/10.21227/y4dz-7y71","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/y4dz-7y71","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Rohrer, Elias","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rohrer, Elias","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Oleas-Chavez, Luis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Oleas-Chavez, Luis","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.8978999853134155},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.6431000232696533},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.6208999752998352},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5924000144004822},{"id":"https://openalex.org/keywords/closeness","display_name":"Closeness","score":0.5787000060081482},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5683000087738037},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5170999765396118},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.48260000348091125},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4771000146865845}],"concepts":[{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.8978999853134155},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7250000238418579},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.6431000232696533},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.6208999752998352},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5924000144004822},{"id":"https://openalex.org/C2779545769","wikidata":"https://www.wikidata.org/wiki/Q5135364","display_name":"Closeness","level":2,"score":0.5787000060081482},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5683000087738037},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5170999765396118},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.48260000348091125},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4771000146865845},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4505000114440918},{"id":"https://openalex.org/C32946077","wikidata":"https://www.wikidata.org/wiki/Q618079","display_name":"Network analysis","level":2,"score":0.3935000002384186},{"id":"https://openalex.org/C157497606","wikidata":"https://www.wikidata.org/wiki/Q603227","display_name":"traceroute","level":3,"score":0.3652999997138977},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.3628000020980835},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.35740000009536743},{"id":"https://openalex.org/C137753397","wikidata":"https://www.wikidata.org/wiki/Q2434424","display_name":"Network science","level":3,"score":0.3384999930858612},{"id":"https://openalex.org/C91682802","wikidata":"https://www.wikidata.org/wiki/Q620538","display_name":"Multidimensional scaling","level":2,"score":0.3375000059604645},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3319999873638153},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.31139999628067017},{"id":"https://openalex.org/C11804174","wikidata":"https://www.wikidata.org/wiki/Q1192971","display_name":"Network theory","level":2,"score":0.3077999949455261},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3046000003814697},{"id":"https://openalex.org/C117045392","wikidata":"https://www.wikidata.org/wiki/Q4899215","display_name":"Betweenness centrality","level":3,"score":0.29159998893737793},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2824999988079071},{"id":"https://openalex.org/C114713312","wikidata":"https://www.wikidata.org/wiki/Q7551269","display_name":"Social network analysis","level":3,"score":0.28200000524520874},{"id":"https://openalex.org/C62354387","wikidata":"https://www.wikidata.org/wiki/Q875399","display_name":"Boundary (topology)","level":2,"score":0.2736999988555908},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/y4dz-7y71","is_oa":true,"landing_page_url":"https://doi.org/10.21227/y4dz-7y71","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/y4dz-7y71","is_oa":true,"landing_page_url":"https://doi.org/10.21227/y4dz-7y71","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,53,136],"Bitcoin":[1,21],"Lightning":[2],"Network":[3],"(LN)":[4],"disrupts":[5],"the":[6,20,25,29,32,56,61,78,90,100,106,116,123,128,144,150,158,161,164,177,201,213,218],"scenario":[7],"as":[8,95,118,132],"a":[9,119],"fast":[10],"and":[11,50,74,77,93,186,193],"scalable":[12],"method":[13],"to":[14,42,63,105,171],"make":[15],"payment":[16],"transactions":[17],"off-chain,":[18],"alongside":[19],"network,":[22],"thereby":[23],"reducing":[24],"on-chain":[26],"burden.":[27],"Understanding":[28],"topology":[30,54,86],"of":[31,55,80,102,108,122,125,130,138,152,212,220],"LN":[33,57,85],"is":[34,40],"crucial,":[35],"not":[36,114],"only":[37,127],"because":[38,121],"it":[39],"key":[41],"performance,":[43],"but":[44],"also":[45],"for":[46,156],"ensuring":[47],"its":[48,69,133],"security":[49],"privacy":[51,79],"guarantees.":[52],"affects,":[58],"among":[59],"others,":[60],"ability":[62],"successfully":[64],"route":[65],"payments":[66],"between":[67],"nodes,":[68],"resilience":[70],"(against":[71],"both":[72],"attacks":[73],"random":[75],"failures),":[76],"payments.":[81],"Existing":[82],"research":[83],"on":[84,88,200],"focuses":[87],"studying":[89],"degree,":[91],"betweenness,":[92],"closeness":[94],"metrics":[96,155,170,181],"that":[97,215],"better":[98],"describe":[99],"centrality":[101,154,159,219],"nodes.":[103],"However,":[104],"best":[107,216],"our":[109],"knowledge,":[110],"previous":[111],"studies":[112],"do":[113],"encompass":[115],"network":[117,187,222],"whole":[120],"limitation":[124],"using":[126,204],"capacity":[129],"channels":[131],"principal":[134],"property.":[135],"contributions":[137],"this":[139,147,221],"study":[140],"are":[141],"two-fold.":[142],"On":[143,163],"one":[145],"hand,":[146,166],"paper":[148],"discusses":[149],"application":[151],"classic":[153],"evaluating":[157],"in":[160],"LN.":[162],"other":[165],"we":[167,207],"provide":[168,208],"alternative":[169],"evaluate":[172],"centrality.":[173],"Our":[174],"approach":[175],"extends":[176],"analysis":[178,211],"by":[179],"adding":[180],"(strength,":[182],"Opsahl,":[183],"current-flow":[184],"betweenness)":[185],"properties":[188],"(capacity,":[189],"fee,":[190],"balance,":[191],"channel,":[192],"pending":[194],"Hashed":[195],"Timelock":[196],"Contracts":[197],"(HTLCs)).":[198],"Based":[199],"results":[202],"obtained":[203],"these":[205],"metrics,":[206],"an":[209],"in-depth":[210],"metric":[214],"defines":[217]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
