Analysis techniques for illicit Bitcoin transactions

Adam Brian Turner*, Stephen McCombie, Allon J. Uhlmann

*Corresponding author for this work

Research output: Contribution to journalArticle

8 Downloads (Pure)

Abstract

This comprehensive overview of analysis techniques for illicit Bitcoin transactions addresses both technical, machine learning approaches as well as a non-technical, legal, and governance considerations. We focus on the field of ransomware countermeasures to illustrate our points.
Original languageEnglish
Article number600596
Pages (from-to)1-12
Number of pages12
JournalFrontiers in Computer Science
Volume2
DOIs
Publication statusPublished - 30 Nov 2020

Bibliographical note

Copyright the Author(s) 2020. Version archived for private and non-commercial use with the permission of the author/s and according to publisher conditions. For further rights please contact the publisher.

Keywords

  • bitcoin
  • machine learning
  • graph analysis
  • financial crime
  • ransomware
  • AML

Fingerprint Dive into the research topics of 'Analysis techniques for illicit Bitcoin transactions'. Together they form a unique fingerprint.

Cite this