J Nicholls, A Kuppa, NA Le‐Khac - International Journal of …, 2024 - Wiley Online Library
Identifying illicit behavior in the Bitcoin network is a well‐explored topic. The methods proposed over time have generated great insights into the deanonymization of the Bitcoin …
Shortly after its official launch in 2009, Bitcoin has gained rapid popularity worldwide, which in return attracted a variety of people especially malicious attackers, who get the advantage …
The potential of Bitcoin for money laundering and terrorist financing represents a significant challenge in law enforcement. In recent years, the use of privacy-improving CoinJoin …
J Hirshman, Y Huang, S Macke - Technical report, Stanford …, 2013 - cs229.stanford.edu
Bitcoin is an electronic crypto-currency created in 2008 by Satoshi Nakamoto (pseudonym). At the time the original bitcoin client was written, the idea of a purely peer-to-peer (P2P) …
Soon after its inception in 2009, Bitcoin was used as a tool by malicious attackers who exploit its pseudo-anonymity to establish untraceable frauds. Recently, several Bitcoin users …
A Turner, ASM Irwin - Journal of Financial Crime, 2018 - emerald.com
Purpose The purpose of this paper is to determine if Bitcoin transactions could be de- anonymised by analysing the Bitcoin blockchain and transactions conducted through the …
As an emergent electronic payment system, Bitcoin has attracted attention for its desirable features such as disintermediation, decentralization, and tamper-proof recording of data …
ASM Irwin, AB Turner - Journal of money laundering control, 2018 - emerald.com
Purpose The purpose of this paper is to highlight the intelligence and investigatory challenges experienced by law enforcement agencies in discovering the identity of illicit …
Since its inception in 2009, Bitcoin has been mired in controversies for providing a haven for illegal activities. Several types of illicit users hide behind the blanket of anonymity …