Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun. 2013. Evaluating User Privacy in Bitcoin. In Proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC) (Lecture Notes in Computer Science, Vol. 7859). Springer, 34-51.
Rémy Cazabet, Rym Baccour, and Matthieu Latapy. 2017. Tracking Bitcoin Users Activity Using Community Detection on a Network of Weak Signals. In Proceedings of the 6th International Conference on Complex Networks and Their Applications (Complex Networks) (Studies in Computational Intelligence, Vol. 689). Springer, 166-177.
Chainalysis. 2022. Chainalysis: The Blockchain Data Platform. https://www. ch ainalysis. com/.
Mauro Conti, Sandeep Kumar E, Chhagan Lal, and Sushmita Ruj. 2018. A Survey on Security and Privacy Issues of Bitcoin. IEEE Communications Surveys & Tutorials 20, 4 (2018), 3416-3452.
Jesse Dunietz. 2017. The Imperfect Crime: How the WannaCry Hackers Could Get Nabbed. https://www. scientificamerican. com/article/the-imperfect-crimehow-the-wannacry-hackers-could-get-nabbed.
Dmitry Ermilov, Maxim Panov, and Yury Yanovich. 2017. Automatic Bitcoin Address Clustering. In Proceedings of 16th International Conference on Machine Learning and Applications (ICMLA). IEEE, 461-466.
Steven Goldfeder, Harry A. Kalodner, Dillon Reisman, and Arvind Narayanan. 2018. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies. Proceedings on Privacy Enhancing Technologies 2018, 4 (2018), 179-199.
Yanan Gong, Kam-Pui Chow, Hing-Fung Ting, and Siu-Ming Yiu. 2022. Analyzing the Error Rates of Bitcoin Clustering Heuristics. In Proceedings of the 2022 International Conference on Advances in Digital Forensics (IFIP) (IFIP Advances in Information and Communication Technology, Vol. 653). Springer, 187-205.
Andy Greenberg. 2021. Prosecutors Trace $13. 4M in Bitcoins From the Silk Road to Ulbricht's Laptop. https://www. wired. com/2015/01/prosecutors-trace-13-4-million-bitcoins-silk-road-ulbrichts-laptop.
Rowel Gündlach, Martijn Gijsbers, David T. Koops, and Jacques Resing. 2021. Predicting confirmation times of Bitcoin transactions. ACM SIGMETRICS Performance Evaluation Review 48, 4 (2021), 16-19.
David A. Harding and Peter Todd. 2015. Opt-in Full Replace-by-Fee Signaling. https://github. com/bitcoin/bips/blob/master/bip-0125. mediawiki.
Martin Harrigan and Christoph Fretter. 2016. The Unreasonable Effectiveness of Address Clustering. In Proceedings of the 2016 International Conference on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). IEEE, 368-373.
Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, and Damon McCoy. 2018. Tracking Ransomware End-to-end. In Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P). IEEE, 618-631.
Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, and Kirill Levchenko. 2014. Botcoin: Monetizing Stolen Cycles. In Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS). The Internet Society.
Blockchain. com Inc. 2022. The world's most popular way to buy, sell, and trade crypto. https://www. blockchain. com/.
Harshal Shridhar Kallurkar and B. R. Chandavarkar. 2022. Unconfirmed Transactions in Cryptocurrency: Reasons, Statistics, and Mitigation. In Proceedings of 2022 International Conference on Public Key Infrastructure and its Applications (PKIA). IEEE, 1-7.
Harry A. Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, and Arvind Narayanan. 2020. BlockSci: Design and applications of a blockchain analysis platform. In Proceedings of the 29th USENIX Security Symposium (USENIX Security). USENIX Association, 2721-2738.
George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, and Sarah Meiklejohn. 2022. How to Peel a Million: Validating and Expanding Bitcoin Clusters. In Proceedings of the 31th USENIX Security Symposium (USENIX security). USENIX Association, 2207-2223.
Dae-Yong Kim, Meryam Essaid, and Hongtaek Ju. 2020. Examining Bitcoin mempools Resemblance Using Jaccard Similarity Index. In Proceedings of the 21st Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 287-290.
Kyungchan Ko, Taeyeol Jeong, Sajan Maharjan, Chaehyeon Lee, and James Won-Ki Hong. 2019. Prediction of Bitcoin Transactions Included in the Next Block. In Proceedings of the 1st International Conference on Blockchain and Trustworthy Systems (BlockSys) (Communications in Computer and Information Science, Vol. 1156). Springer, 591-597.
Yang Li, Zilu Liu, and Zibin Zheng. 2019. Quantitative Analysis of Bitcoin Transferred in Bitcoin Exchange. In Proceedings of the 1st International Conference on Blockchain and Trustworthy Systems (BlockSys) (Communications in Computer and Information Science, Vol. 1156). Springer, 549-562.
Kevin Liao, Ziming Zhao, Adam Doupé, and Gail-Joon Ahn. 2016. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin. In Proceedings of the 2016 APWG Symposium on Electronic Crime Research (eCrime). IEEE, 1-13.
Feng Liu, Zhihan Li, Kun Jia, Panwei Xiang, Aimin Zhou, Jiayin Qi, and Zhibin Li. 2023. Bitcoin Address Clustering Based on Change Address Improvement. IEEE Transactions on Computational Social Systems (2023), 1-12.
Eric Lombrozo, Johnson Lau, and Pieter Wuille. 2015. Segregated Witness (Consensus layer). https://github. com/bitcoin/bips/blob/master/bip-0141. mediawiki.
Greg Maxwell. 2013. CoinJoin: Bitcoin privacy for the real world. https://bitcoi ntalk. org/index. php?topic=279249.
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. 2013. A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 Internet Measurement Conference (IMC). ACM, 127-140.
Malte Möser and Arvind Narayanan. 2022. Resurrecting Address Clustering in Bitcoin. In Proceedings of the 26th International Conference on Financial Cryptography and Data Security (FC) (Lecture Notes in Computer Science, Vol. 13411). Springer, 386-403.
Satoshi Nakamoto. 2009. Bitcoin: A peer-to-peer electronic cash system. https://bitcoin. org/bitcoin. pdf
Jonas David Nick. 2015. Data-Driven De-Anonymization in Bitcoin. In Master's thesis. ETH Zürich.
United States Department of Justice. 2020. Global Disruption of Three Terror Finance Cyber-Enabled Campaigns. https://www. justice. gov/opa/pr/globaldisruption-three-terror-finance-cyber-enabled-campaigns.
Masarah Paquet-Clouston, Bernhard Haslhofer, and Benoit Dupont. 2019. Ransomware payments in the Bitcoin ecosystem. Journal of Cybersecurity 5, 1 (2019), tyz003.
Masarah Paquet-Clouston, Matteo Romiti, Bernhard Haslhofer, and Thomas Charvat. 2019. Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies (AFT). ACM, 76-88.
Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, and Damon McCoy. 2017. Backpage and Bitcoin: Uncovering Human Traffickers. In Proceedings of the 23rd International Conference on Knowledge Discovery and Data Mining (SIGKDD). ACM, 1595-1604.
Fergal Reid and Martin Harrigan. 2011. An Analysis of Anonymity in the Bitcoin System. In Proceedings of the 2nd International Conference on Privacy, Security, Risk and Trust (PASSAT). IEEE, 1318-1326.
Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Joongheon Kim, DaeHun Nyang, and Aziz Mohaisen. 2019. Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems. In Proceedings of the 2019 International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 285-292.
Muhammad Saad, My T. Thai, and Aziz Mohaisen. 2018. POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (AsiaCCS). ACM, 809-811.
Michele Spagnuolo, Federico Maggi, and Stefano Zanero. 2014. BitIodine: Extracting Intelligence from the Bitcoin Network. In Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC) (Lecture Notes in Computer Science, Vol. 8437). Springer, 457-468.
Ivo Stoepker, Rowel Gündlach, and Stella Kapodistria. 2021. Robustness analysis of Bitcoin confirmation times. ACM SIGMETRICS Performance Evaluation Review 48, 4 (2021), 20-23.
Kai Wang, Jun Pang, Dingjie Chen, Yu Zhao, Dapeng Huang, Chen Chen, and Weili Han. 2022. A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin. ACM Transactions on the Web 16, 2 (2022), 7: 1-7: 29.
Qin Wang and Guangsheng Yu. 2023. Understanding BRC-20: Hope or Hype. (2023).
Yunpeng Wang, Jin Yang, Tao Li, Fangdong Zhu, and Xiaojun Zhou. 2018. Antidust: A method for identifying and preventing Blockchain's dust attacks. In Proceedings of the 2018 International Conference on Information Systems and Computer Aided Education (ICISCAE). IEEE, 274-280.
Pieter Wuille, Jonas Nick, and Anthony Towns. 2020. Taproot: SegWit version 1 spending rules. https://github. com/bitcoin/bips/blob/master/bip-0341. mediawik i.
Haaroon Yousaf, George Kappos, and Sarah Meiklejohn. 2019. Tracing Transactions Across Cryptocurrency Ledgers. In Proceedings of the 28th USENIX Security Symposium (USENIX Security). USENIX Association, 837-850.
Limeng Zhang, Rui Zhou, Qing Liu, Jiajie Xu, and Chengfei Liu. 2021. Transaction Confirmation Time Estimation in the Bitcoin Blockchain. In Proceedings of the 22nd International Conference on Web Information Systems Engineering (WISE) (Lecture Notes in Computer Science, Vol. 13080). Springer, 30-45.
Limeng Zhang, Rui Zhou, Qing Liu, Jiajie Xu, and Chengfei Liu. 2022. Bitcoin Transaction Confirmation Time Prediction: A Classification View. In Proceedings of the 23rd International Conference on Web Information Systems Engineering (WISE) (Lecture Notes in Computer Science, Vol. 13724). Springer, 155-169.
Baokun Zheng, Liehuang Zhu, Meng Shen, Xiaojiang Du, and Mohsen Guizani. 2020. Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering. Science China Information Sciences 63, 3 (2020), 1-15.