1 |
S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," Oct. 2008.
|
2 |
Androulaki, Elli, et al, "Evaluating user privacy in bitcoin," International Conference on Financial Cryptography and Data Security, pp. 34-51, Apr. 2013.
|
3 |
Meiklejohn, Sarah, et al, "A fistful of bitcoins: characterizing payments among men with no names," Proceedings of the 2013 conference on Internet measurement conference, ACM, pp. 127-140, Oct. 2013.
|
4 |
Fleder, Michael, Michael S. Kester, and Sudeep Pillai, "Bitcoin transaction graph analysis," arXiv preprint arXiv:1502.01657, Jan. 2015.
|
5 |
Goldfeder, Steven, et al, "When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies," arXiv preprint arXiv: 1708.04748, Aug. 2017.
|
6 |
Koshy, Philip, Diana Koshy, and Patrick McDaniel, "An analysis of anonymity in bitcoin using p2p network traffic," International Conference on Financial Cryptography and Data Security, pp. 469-485, Mar. 2014.
|
7 |
Maxwell, Greg, "CoinJoin: Bitcoin privacy for the real world," Post on Bitcoin forum, Aug. 2013.
|
8 |
Bonneau, Joseph, et al, "Mixcoin: Anonymity for Bitcoin with accountable mixes," International Conference on Financial Cryptography and Data Security, pp. 486-504, Mar. 2014.
|
9 |
Payette, James, Samuel Schwager, and Joseph Murphy, "Characterizing the ethereum address space," Dec. 2017.
|
10 |
Wood, Gavin, "Ethereum: A secure decentralised generalised transaction ledger," Ethereum project yellow paper 151, pp. 1-32, Aug. 2014.
|
11 |
Norvill, Robert, et al, "Automated labeling of unknown contracts in Ethereum," The 26th International Conference on Computer Communications and Networks, Jul. 2017.
|
12 |
Etherscan, "Etherscan," https://etherscan.io/, Sep. 2018.
|
13 |
Bartoletti, Massimo, and Livio Pompianu, "An empirical analysis of smart contracts: platforms, applications, and design patterns," International Conference on Financial Cryptography and Data Security, pp. 494-509, Apr. 2017.
|
14 |
Blei, David M., Andrew Y. Ng, and Michael I. Jordan, "Latent dirichlet allocation," Journal of machine Learning research, pp. 993-1022, Jan. 2003.
|
15 |
Liaw, Andy, and Matthew Wiener, "Classification and regression by random Forest," Rnews, vol 2, no. 3, pp. 18-22, Nov. 2001.
|
16 |
Namanya, Anitta Patience, et al, "Detection of malicious portable executables using evidence combinational theory with fuzzy hashing," 2016 IEEE 4th International Conference on Future Internet of Things and Cloud, pp. 91-98, Aug. 2016.
|