TY - JOUR AU - Abdallah, A. AU - Maarof, M. AU - Zainal, A. PY - 2016 DA - 2016// TI - Fraud detection system: a survey JO - J Netw Comput Appl VL - 68 UR - https://doi.org/10.1016/j.jnca.2016.04.007 DO - 10.1016/j.jnca.2016.04.007 ID - Abdallah2016 ER - TY - STD TI - Allinvain Theft (2020). https://bitcointalk.org/index.php?topic=83794.0#post_toc_20. Accessed 01/06/2020 UR - https://bitcointalk.org/index.php?topic=83794.0#post_toc_20 ID - ref2 ER - TY - JOUR AU - Alstott, J. AU - Bullmore, E. AU - Plenz, D. PY - 2014 DA - 2014// TI - Powerlaw: a python package for analysis of heavy-tailed distributions JO - PLoS ONE VL - 9 UR - https://doi.org/10.1371/journal.pone.0085777 DO - 10.1371/journal.pone.0085777 ID - Alstott2014 ER - TY - JOUR AU - Aspembitova, A. AU - Feng, L. AU - Melnikov, V. AU - Chew, L. PY - 2019 DA - 2019// TI - Fitness preferential attachment as a driving mechanism in bitcoin transaction network JO - PLoS ONE VL - 14 UR - https://doi.org/10.1371/journal.pone.0219346 DO - 10.1371/journal.pone.0219346 ID - Aspembitova2019 ER - TY - STD TI - Atzei N, Bartoletti M, Cimoli T (2017) A survey of attacks on ethereum smart contracts SoK. In: Proceedings of the 6th international conference on principles of security and trust. Springer, Berlin, pp 164–186. https://doi.org/10.1007/978-3-662-54455-6_8 ID - ref5 ER - TY - STD TI - Bartoletti M, Pes B, Serusi S (2018) Data mining for detecting bitcoin ponzi schemes. In: Crypto valley conference on blockchain technology, Zug, pp 75–84. https://doi.org/10.1109/CVCBT.2018.00014 ID - ref6 ER - TY - STD TI - Bitfly Gmbh (2020) Etherchain—the Ethereum blockchain explorer. https://www.etherchain.org/. Accessed 01/06/2020 UR - https://www.etherchain.org/ ID - ref7 ER - TY - STD TI - Bryk A (2018) Blockchain attack vectors: vulnerabilities of the most secure technology. https://www.apriorit.com/dev-blog/578-blockchain-attack-vectors. Accessed 13 Dec 2019 UR - https://www.apriorit.com/dev-blog/578-blockchain-attack-vectors ID - ref8 ER - TY - STD TI - Buterin V (2013) Ethereum: a next-generation smartcontract and decentralized application platform. https://ethereum.org/whitepaper/ UR - https://ethereum.org/whitepaper/ ID - ref9 ER - TY - STD TI - Buterin V (2020) Transaction spam attack: next steps. https://blog.ethereum.org/2016/09/22/transaction-spam-attack-next-steps/. Accessed 01/06/2020 UR - https://blog.ethereum.org/2016/09/22/transaction-spam-attack-next-steps/ ID - ref10 ER - TY - STD TI - Chainalysis (2019) 2019 crypto crime report: decoding hacks, darknet markets, and scams. https://go.chainalysis.com/2019-Crypto-Crime-Report.html. Accessed 30 Mar 2020 UR - https://go.chainalysis.com/2019-Crypto-Crime-Report.html ID - ref11 ER - TY - STD TI - Chen T, Zhu Y, Li Z, Chen J, Li X, Luo X, Lin X, Zhang X (2018a) Understanding Ethereum via graph analysis. In: IEEE INFOCOM 2018. IEEE, Honolulu, pp 1484–1492. https://doi.org/10.1109/INFOCOM.2018.8486401 ID - ref12 ER - TY - STD TI - Chen W, Zheng Z, Cui J, Ngai E, Zheng P, Zhou Y (2018b) Detecting Ponzi schemes on Ethereum: towards healthier blockchain technology. In: World Wide Web conference, Lyon, pp 1409–1418. https://doi.org/10.1145/3178876.3186046 ID - ref13 ER - TY - JOUR AU - Chen, H. AU - Pendleton, M. AU - Njilla, L. AU - Xu, S. PY - 2020 DA - 2020// TI - A survey on ethereum systems security: vulnerabilities, attacks and defenses JO - ACM Comput Surv VL - 53 UR - https://doi.org/10.1145/3391195 DO - 10.1145/3391195 ID - Chen2020 ER - TY - STD TI - Cheng Z, Hou X, Li R, Zhou Y, Luo X, Li J, Ren K (2019) Towards a first step to understand the cryptocurrency stealing attack on Ethereum. In: 22nd international symposium on research in attacks, intrusions and defenses. USENIX, Beijing, pp 47–60. https://www.usenix.org/conference/raid2019/presentation/cheng UR - https://www.usenix.org/conference/raid2019/presentation/cheng ID - ref15 ER - TY - STD TI - Christ M, Kempa-Liehr A, Feindt M (2016) Distributed and parallel time series feature extraction for industrial big data applications. arXiv:1610.07717 UR - http://arxiv.org/abs/1610.07717 ID - ref16 ER - TY - JOUR AU - Christ, M. AU - Braun, N. AU - Neuffer, J. AU - Kempa-Liehr, A. PY - 2018 DA - 2018// TI - Time series feature extraction on basis of scalable hypothesis tests (tsfresh—A python package) JO - Neurocomputing VL - 307 UR - https://doi.org/10.1016/j.neucom.2018.03.067 DO - 10.1016/j.neucom.2018.03.067 ID - Christ2018 ER - TY - STD TI - Etherscan (2020a) Ethereum developer APIs. https://etherscan.io/apis. Accessed 01/06/2020 UR - https://etherscan.io/apis ID - ref18 ER - TY - STD TI - Etherscan (2020b) Label Word Cloud. Accessed 01/06/2020. https://etherscan.io/labelcloud/ UR - https://etherscan.io/labelcloud/ ID - ref19 ER - TY - JOUR AU - Fagiolo, G. PY - 2007 DA - 2007// TI - Clustering in complex directed networks JO - Phys Rev E VL - 76 UR - https://doi.org/10.1103/PhysRevE.76.026107 DO - 10.1103/PhysRevE.76.026107 ID - Fagiolo2007 ER - TY - JOUR AU - Goldsmith, D. AU - Grauer, K. AU - Shmalo, Y. PY - 2020 DA - 2020// TI - Analyzing hack subnetworks in the bitcoin transaction graph JO - Appl Netw Sci UR - https://doi.org/10.1007/s41109-020-00261-7 DO - 10.1007/s41109-020-00261-7 ID - Goldsmith2020 ER - TY - STD TI - Jung E, Tilly M, Gehani A, Ge Y (2019) Data mining-based Ethereum fraud detection. In: 2nd international conference on blockchain. IEEE, Atlanta, pp 266–273. https://doi.org/10.1109/Blockchain.2019.00042 ID - ref22 ER - TY - JOUR AU - Karsai, M. AU - Kaski, K. AU - Barabási, A. AU - Kertész, J. PY - 2012 DA - 2012// TI - Universal features of correlated bursty behaviour JO - Sci Rep VL - 2 UR - https://doi.org/10.1038/srep00397 DO - 10.1038/srep00397 ID - Karsai2012 ER - TY - STD TI - Kumar N, Singh A, Handa A, Shukla S (2020) Detecting malicious accounts on the Ethereum blockchain with supervised learning. In: 4th international symposium on cyber security cryptology and machine learning (CSCML 2020). Springer, Be’er Sheva, Israel ID - ref24 ER - TY - STD TI - Monamo P, Marivate V, Twala B (2016) Unsupervised learning for robust bitcoin fraud detection. In: Information security for South Africa (ISSA). IEEE, Johannesburg, pp 129–134. https://doi.org/10.1109/ISSA.2016.7802939 ID - ref25 ER - TY - STD TI - MyCrypto Inc. (2019) CryptoScamDB. https://cryptoscamdb.org/. Accessed 07/12/2019 UR - https://cryptoscamdb.org/ ID - ref26 ER - TY - STD TI - Olson R, Bartley N, Urbanowicz R, Moore J (2016) Evaluation of a tree-based pipeline optimization tool for automating data science. In: Genetic and evolutionary computation conference. ACM, Denver, pp 485–492. https://doi.org/10.1145/2908812.2908918 ID - ref27 ER - TY - STD TI - O’Neal S (2020) Bitpoint hack shows that regulators’ scrutiny does not equal safety. https://cointelegraph.com/news/bitpoint-hack-shows-that-regulators-scrutiny-does-not-equal-safety. Accessed 01/06/2020 UR - https://cointelegraph.com/news/bitpoint-hack-shows-that-regulators-scrutiny-does-not-equal-safety ID - ref28 ER - TY - CHAP AU - Ostapowicz, M. AU - Zbikowski, K. ED - Cheng, R. ED - Mamoulis, N. ED - Sun, Y. ED - Huang, X. PY - 2019 DA - 2019// TI - Detecting fraudulent accounts on blockchain: a supervised approach BT - Web information systems engineering PB - Springer CY - Hong Kong UR - https://doi.org/10.1007/978-3-030-34223-4_2 DO - 10.1007/978-3-030-34223-4_2 ID - Ostapowicz2019 ER - TY - STD TI - Palladino S (2020) The parity wallet hack explained. https://blog.openzeppelin.com/on-the-parity-wallet-multisig-hack-405a8c12e8f7/. Accessed 01/06/2020 UR - https://blog.openzeppelin.com/on-the-parity-wallet-multisig-hack-405a8c12e8f7/ ID - ref30 ER - TY - STD TI - Pham T, Lee S (2016) Anomaly detection in bitcoin network using unsupervised learning methods. arXiv:1611.03941 UR - http://arxiv.org/abs/1611.03941 ID - ref31 ER - TY - STD TI - Pham T, Lee S (2017) Anomaly detection in the bitcoin system a network perspective. arXiv:1611.03942 UR - http://arxiv.org/abs/1611.03942 ID - ref32 ER - TY - STD TI - Singh A (2019) Anomaly detection in the Ethereum network. Technical report, Indian Institute of Technology, Kanpur ID - ref33 ER - TY - STD TI - Spagnuolo M, Maggi F, Zanero S (2014) BitIodine: extracting intelligence from the bitcoin network. In: Christin N, Safavi-Naini R (eds) Proceedings of 18th financial cryptography and data security. Springer, Christ Church, Barbados, pp 457–468. https://doi.org/10.1007/978-3-662-45472-5_29 ID - ref34 ER - TY - JOUR AU - Watts, D. J. AU - Strogatz, S. H. PY - 1998 DA - 1998// TI - Collective dynamics of ‘small-world’ networks JO - Nature VL - 393 UR - https://doi.org/10.1038/30918 DO - 10.1038/30918 ID - Watts1998 ER - TY - STD TI - Zola F, Eguimendia M, Bruse J, Urrutia R (2019) Cascading machine learning to attack bitcoin anonymity. In: 2nd international conference on blockchain. IEEE, Atlanta, pp 10–17. https://doi.org/10.1109/Blockchain.2019.00011 ID - ref36 ER -