References contributed by 2736406_3418615612411960
- Agarwal S, Vasek M. Investigating the concentration of high yield investment programs in the united kingdom. In: 2022 IEEE European Symposium on Security and Privacy Workshops (EUROS&PW) IEEE; 2022: 105-116.
Paper not yet in RePEc: Add citation now
- Agarwal U, Rishiwal V, Tanwar S, et al. Blockchain technology for secure supply chain management: a comprehensive review. IEEE Access. 2022; 10: 85493-85517.
Paper not yet in RePEc: Add citation now
- Akter O, Akther A, Uddin MA, Islam MM. Cloud forensics: Challenges and blockchain based solutions. Int J Wirel Microw Technol. 2020; 10(5): 1-12.
Paper not yet in RePEc: Add citation now
- Al-Dhaqm A, Abd Razak S, Dampier DA, et al. Categorization and organization of database forensic investigation processes. IEEE Access. 2020; 8: 112846-112858.
Paper not yet in RePEc: Add citation now
- Al-Hashedi KG, Magalingam P, Maarop N, Samy GN, Manaf AA. A conceptual model to identify illegal activities on the bitcoin system. In: Advances in Cyber Security: Third International Conference, ACES 2021 Springer; 2022: 18-34.
Paper not yet in RePEc: Add citation now
- Alfieri C. Cryptocurrency and national security. Int J Crim. 2022; 9(1): 21-48. https://www.criminologyjournal.org/uploads/1/3/6/5/136597491/cryptocurrency_and_national_security.pdf.
Paper not yet in RePEc: Add citation now
- an S. The ico economic crime model based on bp neural network. In: International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2022), Vol. 12330 SPIE; 2022: 437-442.
Paper not yet in RePEc: Add citation now
- Aquilina SJ, Casino F, Vella M, Ellul J, Patsakis C. Etherclue: digital investigation of attacks on ethereum smart contracts. Blockchain: Res Appl. 2021; 2(4):100028.
Paper not yet in RePEc: Add citation now
- Astrakhantseva I, Astrakhantsev R, Los A. Cryptocurrency fraud schemes analysis. In: SHS Web of Conferences, Vol. 106 EDP Sciences; 2021:2001.
Paper not yet in RePEc: Add citation now
- Aziz RM, Baluch MF, Patel S, Ganie AH. LGBM: a machine learning approach for ethereum fraud detection. Int J Inform Technol. 2022; 14(7): 3321-3331.
Paper not yet in RePEc: Add citation now
- Bartoletti M, Lande S, Loddo A, Pompianu L, Serusi S. Cryptocurrency scams: analysis and perspectives. IEEE Access. 2021; 9: 148353-148373.
Paper not yet in RePEc: Add citation now
- Basu S, Garimella A, Han W, Dennis A. Human decision making in ai augmented systems: evidence from the initial coin offering market; 2021.
Paper not yet in RePEc: Add citation now
- Bhavin M, Tanwar S, Sharma N, Tyagi S, Kumar N. Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications. J Inform Secur Appl. 2021; 56:102673.
Paper not yet in RePEc: Add citation now
- Blockchain forensics: The intersection of technology and investigations. https://indiaforensic.com/blockchain-forensics-intersection-technology-investigations/. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- Bodkhe U, Tanwar S, Bhattacharya P, Kumar N. Blockchain for precision irrigation: opportunities and challenges. Trans Emerg Telecommun Technol. 2022; 33(10):e4059.
Paper not yet in RePEc: Add citation now
- Buchanan T, Whitty MT. The online dating romance scam: causes and consequences of victimhood. Psychol Crime Law. 2014; 20(3): 261-283.
Paper not yet in RePEc: Add citation now
- Chadalapaka V, Chang K, Mahajan G, Vasil A. Crypto pump and dump via deep learning techniques. 2022. arXiv preprint arXiv:220504646.
Paper not yet in RePEc: Add citation now
- Chen W, Li X, Sui Y, et al. Sadponzi: detecting and characterizing ponzi schemes in ethereum smart contracts. Proc ACM Measure Anal Comput Syst. 2021; 5(2): 1-30.
Paper not yet in RePEc: Add citation now
- Chen W, Zheng Z, Cui J, Ngai E, Zheng P, Zhou Y. Detecting ponzi schemes on ethereum: towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference; 2018: 1409-1418.
Paper not yet in RePEc: Add citation now
- Chen W, Zheng Z, Ngai EC-H, Zheng P, Zhou Y. Exploiting blockchain data to detect smart ponzi schemes on ethereum. IEEE Access. 2019; 7: 37575-37586.
Paper not yet in RePEc: Add citation now
- Chiu T, Chiu V, Wang T, Wang Y. Using textual analysis to detect initial coin offering frauds. J Forensic Account Res. 2022; 7(1): 165-183.
Paper not yet in RePEc: Add citation now
- Concepts of cloud forensics. https://indiaforensic.com/cloud-forensic-lab-systems-venkatesan/ Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- Cross C, Dragiewicz M, Richards K. Understanding romance fraud: insights from domestic violence research. British J Crim. 2018; 58(6): 1303-1322.
Paper not yet in RePEc: Add citation now
- Crypto phishing attacks 101. https://limechain.tech/blog/crypto-phishing-attacks-101/?cn-reloaded%3D1. Accessed: 2023-04-08.
Paper not yet in RePEc: Add citation now
- Deceptive healthcare practices targeting consumers. https://www.justia.com/consumer/deceptive-practices-and-fraud/deceptive-health-care-practices/. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- Detecting cryptocurrency fraud with neo4j. https://neo4j.com/blog/detecting-cryptocurrency-fraud-with-neo4j/. Accessed: 2023-04-08.
Paper not yet in RePEc: Add citation now
- Fan S, Fu S, Xu H, Cheng X. AL-SPSD: anti-leakage smart ponzi schemes detection in blockchain. Inform Process Manag. 2021; 58(4):102587.
Paper not yet in RePEc: Add citation now
Foley S, Karlsen JR, Putniņš TJ. Sex, drugs, and bitcoin: how much illegal activity is financed through cryptocurrencies? Rev Financ Stud. 2019; 32(5): 1798-1853.
- Former chesapeake ob/gyn sentenced to 59 years in prison. https://www.justice.gov/usao-edva/pr/former-chesapeake-obgyn-sentenced-59-years-prison. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- Hamrick JT, Rouhi F, Mukherjee A, et al. An examination of the cryptocurrency pump-and-dump ecosystem. Inform Process Manag. 2021; 58(4):102506.
Paper not yet in RePEc: Add citation now
- He X, Gong Q, Chen Y, Zhang Y, Wang X, Fu X. Datingsec: detecting malicious accounts in dating apps using a content-based attention network. IEEE Trans Depend Secure Comput. 2021; 18(5): 2193-2208.
Paper not yet in RePEc: Add citation now
- He X, Yang T, Chen L. CTRF: Ethereum-based ponzi contract identification. Secur Commun Netw. 2022; 2022: 1-10.
Paper not yet in RePEc: Add citation now
Hornuf L, Kück T, Schwienbacher A. Initial coin offerings, information disclosure, and fraud. Small Business Econ. 2022; 58(4): 1741-1759.
- Ilker KARA, Aydos M. Cyber fraud: detection and analysis of the crypto-ransomware. In: 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) IEEE; 2020: 764-0769.
Paper not yet in RePEc: Add citation now
- Is tether a scam? think twice before using usdt. https://coingeek.com/is-tether-a-scam-think-twice-before-using-usdt. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- Jin J, Zhou J, Jin C, Yu S, Zheng Z, Xuan Q. Dual-channel early warning framework for ethereum ponzi schemes. In: Big Data and Social Computing: 7th China National Conference, BDSC 2022 Springer; 2022: 260-274.
Paper not yet in RePEc: Add citation now
- Karimov B, Wójcik P. Identification of scams in initial coin offerings with machine learning. Front Artif Intell. 2021; 4:718450.
Paper not yet in RePEc: Add citation now
- Kethineni S, Cao Y, Dodge C. Use of bitcoin in darknet markets: examining facilitative factors on bitcoin-related crimes. Am J Crim Justice. 2018; 43: 141-157.
Paper not yet in RePEc: Add citation now
- Khan AG, Zahid AH, Hussain M, Riaz U. Security of cryptocurrency using hardware wallet and qr code. In: 2019 International Conference on Innovative Computing (ICIC) IEEE; 2019: 1-10.
Paper not yet in RePEc: Add citation now
- Koerhuis W, Kechadi T, Le-Khac N-A. Forensic analysis of privacy-oriented cryptocurrencies. Forensic Sci Int: Digital Invest. 2020; 33:200891.
Paper not yet in RePEc: Add citation now
- Kumar N, Singh A, Handa A, Shukla SK. Detecting malicious accounts on the ethereum blockchain with supervised learning. In: Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020 Springer; 2020: 94-109.
Paper not yet in RePEc: Add citation now
- Lee C, Maharjan S, Ko K, Hong JW-K. Toward detecting illegal transactions on bitcoin using machine-learning methods. In: Blockchain and Trustworthy Systems: First International Conference, Blocksys 2019 Springer; 2020: 520-533.
Paper not yet in RePEc: Add citation now
- Lee C, Maharjan S, Ko K, Hong JW‐K. Toward detecting illegal transactions on bitcoin using machine‐learning methods. In: Blockchain and Trustworthy Systems: First International Conference, Blocksys 2019 Springer; 2020:520‐533.
Paper not yet in RePEc: Add citation now
- Lee S, Yoon C, Kang H, et al. Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web. In: 26th Annual Network and Distributed System Security Symposium (NDSS 2019) Internet Society; 2019: 1-15.
Paper not yet in RePEc: Add citation now
- Li T, Shin D, Wang B. Cryptocurrency pump-and-dump schemes. Available at SSRN 3267041; 2021.
Paper not yet in RePEc: Add citation now
- Li Z, Zheng Y, Li Q, Wu M, Peng K. Dragnet: a method for tagging bitcoin addresses of exchanges; 2020.
Paper not yet in RePEc: Add citation now
- Lorenz J, Silva MI, Aparício D, Ascensão JT, Bizarro P. Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity. In: Proceedings of the First ACM International Conference on Ai in Finance; 2020: 1-8.
Paper not yet in RePEc: Add citation now
- Markets $7 million lost in coindash ico hack. https://www.coindesk.com/markets/2017/07/17/7-million-lost-in-coindash-ico-hack/. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- Mas'ud MZ, Hassan A, Shah WM, et al. A review of digital forensics framework for blockchain in cryptocurrency technology. In: 2021 3rd International Cyber Resilience Conference (CRC) IEEE; 2021: 1-6.
Paper not yet in RePEc: Add citation now
- Mashatan A, Sangari MS, Dehghani M. How perceptions of information privacy and security impact consumer trust in crypto-payment: an empirical study. IEEE Access. 2022; 10: 69441-69454.
Paper not yet in RePEc: Add citation now
Mazorra B, Adan V, Daza V. Do not rug on me: leveraging machine learning techniques for automated scam detection. Mathematics. 2022; 10(6):949.
- Meiklejohn S, Pomarole M, Jordan G, et al. A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference; 2013: 127-140.
Paper not yet in RePEc: Add citation now
- Mun H, Lee Y. BITSQL: a SQL-based bitcoin analysis system. In: 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) IEEE; 2022: 1-8.
Paper not yet in RePEc: Add citation now
- Mun H, Lee Y. BITSQL: a SQL‐based bitcoin analysis system. In: 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) IEEE; 2022:1‐8.
Paper not yet in RePEc: Add citation now
- Neilson D, Hara S, Mitchell I. Bitcoin forensics: a tutorial. In: Global Security, Safety and Sustainability-the Security Challenges of the Connected World: 11Th International Conference, ICGS3 2017 Springer; 2016: 12-26.
Paper not yet in RePEc: Add citation now
- Neisius J, Clayton R. Orchestrated crime: the high yield investment fraud ecosystem. In: 2014 APWG Symposium on Electronic Crime Research (ECRIME) IEEE; 2014: 48-58.
Paper not yet in RePEc: Add citation now
- Network analytics for fraud detection in banking and finance. https://www.cylynx.io/blog/network-analytics-for-fraud-detection-in-banking-and-finance/. Accessed: 2023-04-08.
Paper not yet in RePEc: Add citation now
- Nghiem H, Muric G, Morstatter F, Ferrara E. Detecting cryptocurrency pump-and-dump frauds using market and social signals. Expert Syst Appl. 2021; 182:115284.
Paper not yet in RePEc: Add citation now
- Nikkel B. Fintech forensics: criminal investigation and digital evidence in financial technologies. Forensic Sci Int: Digital Invest. 2020; 33:200908.
Paper not yet in RePEc: Add citation now
- Nikolova B. Cryptocurrencies–the future of payment systems or a modern way to fraud. VUZF Rev. 2019; 2: 33.
Paper not yet in RePEc: Add citation now
- Nizzoli L, Tardelli S, Avvenuti M, Cresci S, Tesconi M, Ferrara E. Charting the landscape of online cryptocurrency manipulation. IEEE Access. 2020; 8: 113230-113245.
Paper not yet in RePEc: Add citation now
- Ohio cardiologist found guilty of medicare fraud. https://medicalmalpracticelawyers.com/ohio-cardiologist-found-guilty-of-medicare-fraud/. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- Phetsouvanh S, Oggier F, Datta A. Egret: extortion graph exploration techniques in the bitcoin network. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW) IEEE; 2018: 244-251.
Paper not yet in RePEc: Add citation now
- Rahman RU, Tomar DS. A new web forensic framework for bot crime investigation. Forensic Sci Int: Digital Invest. 2020; 33:300943.
Paper not yet in RePEc: Add citation now
- Rege A. What's love got to do with it? exploring online dating scams and identity fraud. Int J Cyber Crim. 2009; 3(2): 494-512.
Paper not yet in RePEc: Add citation now
- Ripple, binance impersonators target xrp holders via fake staking program. https://cointelegraph.com/news/ripple-binance-impersonators-target-xrp-holders-via-fake-staking-program/. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- Sanz-Bas D, del Rosal C, Náñez Alonso SL, Echarte Fernández MA. Cryptocurrencies and fraudulent transactions: risks, practices, and legislation for their prevention in europe and spain. Laws. 2021; 10(3): 57. Dyntu V, Dykyi O. Cryptocurrency in the system of money laundering. Baltic J Econ Stud. 2018; 4(5): 75-81.
Paper not yet in RePEc: Add citation now
- Sec charges ripple and two executives with conducting $1.3 billion unregistered securities offering. https://www.sec.gov/news/press-release/2020-338/. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- Song H, Fink GA, Jeschke S. Lightweight crypto and security. In: Security and Privacy in Cyber-Physical Systems: Foundations, Principles, and Applications. IEEE; 2017: 243-261. 2022 healthcare data breach report. https://www.hipaajournal.com/2022-healthcare-data-breach-report/. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- Song L, Kong X. A study on characteristics and identification of smart ponzi schemes. IEEE Access. 2022; 10: 57299-57308.
Paper not yet in RePEc: Add citation now
- Soni A, Maheshwari S. A survey of attacks on the bitcoin system. In: 2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS) IEEE; 2018: 1-5.
Paper not yet in RePEc: Add citation now
- Sonnekus MH. A comparison of open source and proprietary digital forensic software. Ph.D. Thesis: Rhodes University; 2014.
Paper not yet in RePEc: Add citation now
- Srivasthav DP, Maddali LP, Vigneswaran R. Study of blockchain forensics and analytics tools. In: 2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) IEEE; 2021: 39-40.
Paper not yet in RePEc: Add citation now
- Suarez-Tangil G, Edwards M, Peersman C, Stringhini G, Rashid A, Whitty M. Automatically dismantling online dating fraud. IEEE Trans Inform Forensics Secur. 2019; 15: 1128-1137.
Paper not yet in RePEc: Add citation now
- Supply chain attack: Preventing ransomware attacks on the supply chain. https://online.maryville.edu/blog/supply-chain-attack/. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- Swartz L. Theorizing the 2017 blockchain ico bubble as a network scam. New Med Soc. 2022; 24(7): 1695-1713.
Paper not yet in RePEc: Add citation now
- Taneska M, Dobreva J, Dimitrova V. Forensics investigation comparison of privacy-oriented cryptocurrencies. Secur Future. 2022; 6(1): 35-38.
Paper not yet in RePEc: Add citation now
- Tayal A, Solanki A, Kondal R, Nayyar A, Tanwar S, Kumar N. Blockchain-based efficient communication for food supply chain industry: transparency and traceability analysis for sustainable business. Int J Commun Syst. 2021; 34(4):e4696.
Paper not yet in RePEc: Add citation now
- Taylor SK, M. Omar MS, Noorashid N, Ariffin A, Ariffin KAZ, Abdullah SNHS. People, process and technology for cryptocurrencies forensics: a malaysia case study. In: Advances in Cyber Security: Second International Conference, ACES 2020 Springer; 2021: 297-312.
Paper not yet in RePEc: Add citation now
- Tether, a startup that works with bitcoin exchanges, claims a hacker stole $31m. https://techcrunch.com/2017/11/20/tether-claims-a-hacker-stole-31m/. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- The chainalysis 2022 crypto crime report. https://go.chainalysis.com/2022-Crypto-Crime-Report.html. Accessed: 2023-04-04.
Paper not yet in RePEc: Add citation now
- The chainalysis 2023 crypto crime report. https://go.chainalysis.com/2023-crypto-crime-report.html. Accessed: 2023-09-07.
Paper not yet in RePEc: Add citation now
- The challenge of health care fraud. https://www.nhcaa.org/tools-insights/about-health-care-fraud/the-challenge-of-health-care-fraud/. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- The rise of counterfeit medical devices. https://www.u-nica.com/blog/rise-of-counterfeit-medical-devices Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- The rise of counterfeit medical devices. https://www.u-nica.com/blog/rise-of-counterfeit-medical-devices Accessed: 2023‐04‐05.
Paper not yet in RePEc: Add citation now
- Toyoda K, Mathiopoulos PT, Ohtsuki T. A novel methodology for hyip operators' bitcoin addresses identification. IEEE Access. 2019; 7: 74835-74848.
Paper not yet in RePEc: Add citation now
- Toyoda K, Ohtsuki T, Mathiopoulos PT. Identification of high yielding investment programs in bitcoin via transactions pattern analysis. In: GLOBECOM 2017-2017 IEEE Global Communications Conference IEEE; 2017: 1-6.
Paper not yet in RePEc: Add citation now
- Using bitcoin or other cryptocurrency to commit crimes? Law enforcement is onto you. https://www.forbes.com/. Accessed: 2023-04-08.
Paper not yet in RePEc: Add citation now
- Using bitcoin or other cryptocurrency to commit crimes? Law enforcement is onto you. https://www.forbes.com/. Accessed: 2023‐04‐08.
Paper not yet in RePEc: Add citation now
- Using network graphs to visualize potential fraud on ethereum blockchain. https://developer.nvidia.com/blog/using-network-graphs-to-visualize-potential-fraud-on-ethereum-blockchain/. Accessed: 2023-04-07.
Paper not yet in RePEc: Add citation now
- Value of cryptocurrency theft worldwide from 2016 to 2020. https://www.statista.com/statistics/960226/theft-of-cryptocurrency-value. Accessed: 2023-04-05.
Paper not yet in RePEc: Add citation now
- Van Der Horst L, Choo K-KR, Le-Khac N-A. Process memory investigation of the bitcoin clients electrum and bitcoin core. IEEE Access. 2017; 5: 22385-22398.
Paper not yet in RePEc: Add citation now
- Vasek M, Thornton M, Moore T. Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. In: Financial Cryptography and Data Security: FC 2014 Workshops, Bitcoin and WAHC 2014 Springer; 2014: 57-71.
Paper not yet in RePEc: Add citation now
- Verma A, Bhattacharya P, Zuhair M, Tanwar S, Kumar N. Vacochain: Blockchain-based 5g-assisted uav vaccine distribution scheme for future pandemics. IEEE J Biomed Health Inform. 2022; 26(5): 1997-2007.
Paper not yet in RePEc: Add citation now
- Verma A, Taneja A, Arora A. Fraud detection and frequent pattern matching in insurance claims using data mining techniques. In: 2017 Tenth International Conference on Contemporary Computing (IC3) IEEE; 2017: 1-7.
Paper not yet in RePEc: Add citation now
- Volety T, Saini S, McGhin T, Liu CZ, Choo K-KR. Cracking bitcoin wallets: I want what you have in the wallets. Future Gen Comput Syst. 2019; 91: 136-143.
Paper not yet in RePEc: Add citation now
- Wang B, Liu H, Liu C, et al. Blockeye: hunting for defi attacks on blockchain. In: 2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) IEEE; 2021: 17-20.
Paper not yet in RePEc: Add citation now
- Wang L, Cheng H, Zheng Z, Yang A, Zhu X. Ponzi scheme detection via oversampling-based long short-term memory for smart contracts. Knowl-Based Syst. 2021; 228:107312.
Paper not yet in RePEc: Add citation now
- What are digital forensics tools? https://www.bluevoyant.com/knowledge-center/get-started-with-these-9-open-source-tools. Accessed: 2023-04-04.
Paper not yet in RePEc: Add citation now
- Whitty MT, Buchanan T. The online dating romance scam: the psychological impact on victims–both financial and non-financial. Crim Criminal Justice. 2016; 16(2): 176-194.
Paper not yet in RePEc: Add citation now
- Wronka C. Money laundering through cryptocurrencies-analysis of the phenomenon and appropriate prevention measures. J Money Laund Control. 2022; 25(1): 79-94.
Paper not yet in RePEc: Add citation now
- Yu S, Jin J, Xie Y, Shen J, Xuan Q. Ponzi scheme detection in ethereum transaction network. In: Blockchain and Trustworthy Systems: Third International Conference, Blocksys 2021 Springer; 2021: 175-186.
Paper not yet in RePEc: Add citation now
Zarpala L, Casino F. A blockchain-based forensic model for financial crime investigation: the embezzlement scenario. Digital Fin. 2021; 3: 301-332.
- Zhang Y, Wang J, Luo J. Heuristic-based address clustering in bitcoin. IEEE Access. 2020; 8: 210582-210591.
Paper not yet in RePEc: Add citation now
- Zheng B, Zhu L, Shen M, Du X, Guizani M. Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering. Sci China Inform Sci. 2020; 63: 1-15.
Paper not yet in RePEc: Add citation now
- Zheng Y, Wang M. Imbalanced problem in initial coin offering fraud detection. In: Data Science: 8th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2022 Springer; 2022: 448-464.
Paper not yet in RePEc: Add citation now
- Zollner S, Choo K-KR, Le-Khac N-A. An automated live forensic and postmortem analysis tool for bitcoin on windows systems. IEEE Access. 2019; 7: 158250-158263.
Paper not yet in RePEc: Add citation now