Analysis techniques for illicit Bitcoin transactions

Adam Brian Turner*, Stephen McCombie, Allon J. Uhlmann

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    15 Citations (Scopus)
    761 Downloads (Pure)

    Abstract

    This comprehensive overview of analysis techniques for illicit Bitcoin transactions addresses both technical, machine learning approaches as well as a non-technical, legal, and governance considerations. We focus on the field of ransomware countermeasures to illustrate our points.
    Original languageEnglish
    Article number600596
    Pages (from-to)1-12
    Number of pages12
    JournalFrontiers in Computer Science
    Volume2
    DOIs
    Publication statusPublished - 30 Nov 2020

    Bibliographical note

    Copyright the Author(s) 2020. Version archived for private and non-commercial use with the permission of the author/s and according to publisher conditions. For further rights please contact the publisher.

    Keywords

    • bitcoin
    • machine learning
    • graph analysis
    • financial crime
    • ransomware
    • AML

    Fingerprint

    Dive into the research topics of 'Analysis techniques for illicit Bitcoin transactions'. Together they form a unique fingerprint.

    Cite this