Author of the publication

Detecting artificial behaviours in the Bitcoin users graph.

, , and . Online Social Networks and Media, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain Based Access Control., , and . DAIS, volume 10320 of Lecture Notes in Computer Science, page 206-220. Springer, (2017)A blockchain based approach for the definition of auditable Access Control systems., , and . Computers & Security, (2019)Data-driven analysis of Bitcoin properties: exploiting the users graph., , and . Int. J. Data Sci. Anal., 6 (1): 63-80 (2018)The bow tie structure of the Bitcoin users graph., , and . Applied Network Science, 4 (1): 56:1-56:22 (2019)Detecting artificial behaviours in the Bitcoin users graph., , and . Online Social Networks and Media, (2017)Distributed Access Control Through Blockchain Technology., , and . ERCIM News, (2017)Uncovering the Bitcoin Blockchain: An Analysis of the Full Users Graph., , and . DSAA, page 537-546. IEEE, (2016)The Graph Structure of Bitcoin., , and . COMPLEX NETWORKS (2), volume 813 of Studies in Computational Intelligence, page 547-558. Springer, (2018)An analysis of the Bitcoin users graph: inferring unusual behaviours., , and . COMPLEX NETWORKS, volume 693 of Studies in Computational Intelligence, page 749-760. Springer, (2016)Blockchain Based Access Control Services., , and . iThings/GreenCom/CPSCom/SmartData, page 1379-1386. IEEE, (2018)