
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Detecting anomalous cryptocurrency transactions: An AML/CFT application of machine learning-based forensics
Nadia Pocher, Mirko Zichichi, Fabio Merizzi, et al.
Electronic Markets (2023) Vol. 33, Iss. 1
Open Access | Times Cited: 34
Nadia Pocher, Mirko Zichichi, Fabio Merizzi, et al.
Electronic Markets (2023) Vol. 33, Iss. 1
Open Access | Times Cited: 34
Showing 1-25 of 34 citing articles:
Risk Management in DeFi: Analyses of the Innovative Tools and Platforms for Tracking DeFi Transactions
Bogdan Adamyk, Vladlena Benson, Bogdan Adamyk, et al.
Journal of risk and financial management (2025) Vol. 18, Iss. 1, pp. 38-38
Open Access | Times Cited: 4
Bogdan Adamyk, Vladlena Benson, Bogdan Adamyk, et al.
Journal of risk and financial management (2025) Vol. 18, Iss. 1, pp. 38-38
Open Access | Times Cited: 4
The future of fintech — Towards ubiquitous financial services
Rainer Alt, Gilbert Fridgen, Younghoon Chang
Electronic Markets (2024) Vol. 34, Iss. 1
Open Access | Times Cited: 12
Rainer Alt, Gilbert Fridgen, Younghoon Chang
Electronic Markets (2024) Vol. 34, Iss. 1
Open Access | Times Cited: 12
ForensicTransMonitor: A Comprehensive Blockchain Approach to Reinvent Digital Forensics and Evidence Management
Saad Said Alqahtany, Toqeer Ali Syed
Information (2024) Vol. 15, Iss. 2, pp. 109-109
Open Access | Times Cited: 12
Saad Said Alqahtany, Toqeer Ali Syed
Information (2024) Vol. 15, Iss. 2, pp. 109-109
Open Access | Times Cited: 12
Machine Learning for Blockchain Data Analysis: Progress and Opportunities
Poupak Azad, Cüneyt Gürcan Akçora, Arijit Khan
Deleted Journal (2025)
Closed Access | Times Cited: 1
Poupak Azad, Cüneyt Gürcan Akçora, Arijit Khan
Deleted Journal (2025)
Closed Access | Times Cited: 1
Harnessing Machine Learning Intelligence Against Cyber Threats
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4
Bhupinder Singh, Christian Kaunert, Ritu Gautam
Advances in business strategy and competitive advantage book series (2024), pp. 319-352
Closed Access | Times Cited: 4
The role of artificial intelligence algorithms in information systems research: a conceptual overview and avenues for research
David Bendig, Antonio Bräunche
Management Review Quarterly (2024)
Open Access | Times Cited: 3
David Bendig, Antonio Bräunche
Management Review Quarterly (2024)
Open Access | Times Cited: 3
Leveraging K-Means Clustering and Z-Score for Anomaly Detection in Bitcoin Transactions
J. R. Patel, Joseph Reiner, Brenden Stilwell, et al.
Informatics (2025) Vol. 12, Iss. 2, pp. 43-43
Open Access
J. R. Patel, Joseph Reiner, Brenden Stilwell, et al.
Informatics (2025) Vol. 12, Iss. 2, pp. 43-43
Open Access
Central Bank Digital Currencies (CBDCs): a countermeasure to Anti-Money Laundering (AML) challenges posed by cryptocurrencies?
Albina Gaisina, Matthias Finger
Digital Finance (2025)
Closed Access
Albina Gaisina, Matthias Finger
Digital Finance (2025)
Closed Access
Anti-Money Laundering in Cryptocurrencies Through Graph Neural Networks: A Comparative Study
Simone Marasi, Stefano Ferretti
(2024), pp. 272-277
Closed Access | Times Cited: 2
Simone Marasi, Stefano Ferretti
(2024), pp. 272-277
Closed Access | Times Cited: 2
Integrating Machine Learning in Anti-Money Laundering through Crypto: A Comprehensive Performance Review
A. O Japinye
European Journal of Accounting Auditing and Finance Research (2024) Vol. 12, Iss. 4, pp. 54-80
Open Access | Times Cited: 2
A. O Japinye
European Journal of Accounting Auditing and Finance Research (2024) Vol. 12, Iss. 4, pp. 54-80
Open Access | Times Cited: 2
Compliance Design Options for Offline CBDCs: Balancing Privacy and AML/CFT
Panagiotis Michalopoulos, Odunayo Olowookere, Nadia Pocher, et al.
SSRN Electronic Journal (2024)
Open Access | Times Cited: 2
Panagiotis Michalopoulos, Odunayo Olowookere, Nadia Pocher, et al.
SSRN Electronic Journal (2024)
Open Access | Times Cited: 2
Fraud Detection in Fintech Leveraging Machine Learning and Behavioral Analytics
Hari Prasad Josyula
Research Square (Research Square) (2023)
Open Access | Times Cited: 6
Hari Prasad Josyula
Research Square (Research Square) (2023)
Open Access | Times Cited: 6
The current state of cryptocurrency forensics
Sahil Dudani, Ibrahim Baggili, David Raymond, et al.
Forensic Science International Digital Investigation (2023) Vol. 46, pp. 301576-301576
Closed Access | Times Cited: 4
Sahil Dudani, Ibrahim Baggili, David Raymond, et al.
Forensic Science International Digital Investigation (2023) Vol. 46, pp. 301576-301576
Closed Access | Times Cited: 4
Integrating blockchain and machine learning for enhanced anti-money laundering system
Khandakar Md Shafin, Saha Reno
International Journal of Information Technology (2024)
Closed Access | Times Cited: 1
Khandakar Md Shafin, Saha Reno
International Journal of Information Technology (2024)
Closed Access | Times Cited: 1
Compliance Design Options for Offline CBDCs: Balancing Privacy and AML/CFT
Panagiotis Michalopoulos, Odunayo Olowookere, Nadia Pocher, et al.
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (2024), pp. 307-315
Open Access | Times Cited: 1
Panagiotis Michalopoulos, Odunayo Olowookere, Nadia Pocher, et al.
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (2024), pp. 307-315
Open Access | Times Cited: 1
A systematic review of anti-money laundering systems literature: Exploring the efficacy of machine learning and deep learning integration
Nadia Husnaningtyas, Ghalizha Failazufah Hanin, Totok Dewayanto, et al.
JEMA Jurnal Ilmiah Bidang Akuntansi dan Manajemen (2023) Vol. 20, Iss. 1, pp. 91-116
Open Access | Times Cited: 3
Nadia Husnaningtyas, Ghalizha Failazufah Hanin, Totok Dewayanto, et al.
JEMA Jurnal Ilmiah Bidang Akuntansi dan Manajemen (2023) Vol. 20, Iss. 1, pp. 91-116
Open Access | Times Cited: 3
Cryptocurrency Investigations in Digital Forensics: Contemporary Challenges and Methodological Advances
Syed Atir Raza, Mehwish Shaikh, Khadija Tahira
Information Dynamics and Applications (2023) Vol. 2, Iss. 3, pp. 126-134
Open Access | Times Cited: 2
Syed Atir Raza, Mehwish Shaikh, Khadija Tahira
Information Dynamics and Applications (2023) Vol. 2, Iss. 3, pp. 126-134
Open Access | Times Cited: 2
Money laundering in global trade and the role of financial technology: The structured reviews
Nur Liyana Mohamed Yousop, Nazrul Hisyam Ab Razak, Bany Ariffin Amin Noordin
International Journal of Asian Social Science (2024) Vol. 14, Iss. 1, pp. 1-14
Open Access
Nur Liyana Mohamed Yousop, Nazrul Hisyam Ab Razak, Bany Ariffin Amin Noordin
International Journal of Asian Social Science (2024) Vol. 14, Iss. 1, pp. 1-14
Open Access
Recovery CAT: A Digital Forensics Tool for Cryptocurrency Investigations
Lilita Infante, Roger A. Hallman, J. Ray Hays, et al.
(2024), pp. 1-5
Closed Access
Lilita Infante, Roger A. Hallman, J. Ray Hays, et al.
(2024), pp. 1-5
Closed Access
The Role of Law Enforcement in the Regulation of Cryptomarkets (and the Limited Role of Deterrence)
Vincent Harinam, Barak Ariel
(2024), pp. 49-83
Closed Access
Vincent Harinam, Barak Ariel
(2024), pp. 49-83
Closed Access
A Iterative Method to Analyze Misbehavior in Blockchain by Transaction Graph Matrix
Jian Liu, Shaohua Zhang, Wei Lai, et al.
(2024), pp. 6-10
Closed Access
Jian Liu, Shaohua Zhang, Wei Lai, et al.
(2024), pp. 6-10
Closed Access
On the Use of Heterogeneous Graph Neural Networks for Detecting Malicious Activities: a Case Study with Cryptocurrencies
Stefano Ferretti, Gabriele D’Angelo, Vittorio Ghini
(2024), pp. 33-40
Closed Access
Stefano Ferretti, Gabriele D’Angelo, Vittorio Ghini
(2024), pp. 33-40
Closed Access
Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 363-398
Closed Access
Deep Learning Based Algorithm for Efficient Information Retrieval in Blockchain Transactions
Kayalvizhi Subrmanian, Gunasekar Thangarasu, Yanyan Zhao, et al.
(2024) Vol. 11, pp. 264-269
Closed Access
Kayalvizhi Subrmanian, Gunasekar Thangarasu, Yanyan Zhao, et al.
(2024) Vol. 11, pp. 264-269
Closed Access
Identification of Suspicious Addresses in Public Blockchains: a Survey
Д.А. Зенюк
Cifrovaâ èkonomika. (2024), Iss. 3(29), pp. 45-53
Closed Access
Д.А. Зенюк
Cifrovaâ èkonomika. (2024), Iss. 3(29), pp. 45-53
Closed Access