共 14 条
[1]
[Anonymous], 2013, P 2013 ECRIME RES SU, DOI DOI 10.1109/ECRS.2013.6805780
[2]
[Anonymous], 2016, Communications of the ACM, DOI [10.1145/2504730.2504747, DOI 10.1145/2504730.2504747, DOI 10.1145/2896384, 10.1145/2896384]
[3]
[Anonymous], 2015, 2015 IEEE S VISUALIZ, DOI DOI 10.1109/VIZSEC.2015.7312773
[4]
[Anonymous], BITCOIN PEER TO PEER
[5]
Baumann Annika, 2014, 10th International Conference on Web Information Systems and Technologies (WEBIST 2014). Proceedings, P369
[6]
Deanonymisation of Clients in Bitcoin P2P Network
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:15-29
[7]
Card S. K., 1999, Readings in Information Visualization: Using Vision to Think
[8]
ForceAtlas2, a Continuous Graph Layout Algorithm for Handy Network Visualization Designed for the Gephi Software
[J].
PLOS ONE,
2014, 9 (06)
[10]
Miller A., Discovering Bitcoin's Public Topology and Influential Nodes