iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/2046707.2046763
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:51:18Z","timestamp":1726361478980},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046763","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Cloak and dagger"],"prefix":"10.1145","author":[{"given":"David Y.","family":"Wang","sequence":"first","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Mary Vernon. Mapping Internet Sensors with Probe Response Attacks. In Proceedings of the 14th USENIX Security Symposium","author":"Bethencourt John","year":"2005"},{"key":"e_1_3_2_1_2_1","first-page":"21","volume-title":"Broder. On the Resemblance and Containment of Documents. In Proceedings of the Compression and Complexity of Sequences (SEQUENCES'97)","author":"Andrei","year":"1997"},{"key":"e_1_3_2_1_3_1","volume-title":"Pearson Education","author":"Caldwell Lee G.","year":"2002"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the SIGIR Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Chellapilla Kumar","year":"2006"},{"key":"e_1_3_2_1_5_1","volume-title":"Marc Dacier. An Analysis of Rogue AV Campaigns. In Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID)","author":"Cova Marco","year":"2010"},{"key":"e_1_3_2_1_6_1","volume-title":"February 24, 2011.","author":"Efrati Amir"},{"key":"e_1_3_2_1_7_1","unstructured":"Google Safe Browsing API. http:\/\/code.google.com\/apis\/safebrowsing\/. Google Safe Browsing API. http:\/\/code.google.com\/apis\/safebrowsing\/."},{"key":"e_1_3_2_1_8_1","volume-title":"Martin Abadi. deSEO: Combating Search-Result Poisoning. In Proceedings of the 20th USENIX Security Symposium","author":"John John P.","year":"2011"},{"key":"e_1_3_2_1_9_1","unstructured":"Brian Krebs. Huge Decline in Fake AV Following Credit Card Processing Shakeup. http:\/\/krebsonsecurity.com\/2011\/08\/huge-decline- in-fake-av-following-credit-card-processing- shakeup\/ August 2011. Brian Krebs. Huge Decline in Fake AV Following Credit Card Processing Shakeup. http:\/\/krebsonsecurity.com\/2011\/08\/huge-decline- in-fake-av-following-credit-card-processing- shakeup\/ August 2011."},{"key":"e_1_3_2_1_10_1","volume-title":"Nicolas Christin. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade. In Proceedings of the 20th USENIX Security Symposium","author":"Leontiadis Nektarios","year":"2011"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.09.056"},{"key":"e_1_3_2_1_13_1","volume-title":"Issued","author":"Najork Marc A.","year":"2005"},{"key":"e_1_3_2_1_14_1","volume-title":"Francis Hsu. A Quantitative Study of Forum Spamming Using Contextbased Analysis. In Proceedings of 15th Network and Distributed System Security (NDSS) Symposium","author":"Niu Yuan","year":"2007"},{"key":"e_1_3_2_1_15_1","volume-title":"Xin Zhao. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. In Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10)","author":"Rajab Moheeb Abu","year":"2010"},{"key":"e_1_3_2_1_16_1","unstructured":"Search Engine Marketing Professional Organization (SEMPO). State of Search Engine Marketing Report Says Industry to Grow from $14.6 Billion in 2009 to $16.6 Billion in 2010. http:\/\/www.sempo.org\/news\/03--25--10 March 2010. Search Engine Marketing Professional Organization (SEMPO). State of Search Engine Marketing Report Says Industry to Grow from $14.6 Billion in 2009 to $16.6 Billion in 2010. http:\/\/www.sempo.org\/news\/03--25--10 March 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/331403.331405"},{"key":"e_1_3_2_1_18_1","unstructured":"Julien Sobrier. Tricks to easily detect malware and scams in search results. http:\/\/research.zscaler.com\/2010\/06\/tricks-to-easily-detect-malware-and.html June 3 2010. Julien Sobrier. Tricks to easily detect malware and scams in search results. http:\/\/research.zscaler.com\/2010\/06\/tricks-to-easily-detect-malware-and.html June 3 2010."},{"key":"e_1_3_2_1_19_1","unstructured":"Danny Sullivan. Search Engine Optimization Firm Sold For $95 Million. http:\/\/searchenginewatch.com\/ 2163001 September 2000. Search Engine Watch. Danny Sullivan. Search Engine Optimization Firm Sold For $95 Million. http:\/\/searchenginewatch.com\/ 2163001 September 2000. Search Engine Watch."},{"key":"e_1_3_2_1_20_1","unstructured":"Jason Tabeling. Keyword Phrase Value: Click-Throughs vs. Conversions. http:\/\/searchenginewatch.com\/ 3641985 March 8 2011. Jason Tabeling. Keyword Phrase Value: Click-Throughs vs. Conversions. http:\/\/searchenginewatch.com\/ 3641985 March 8 2011."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242612"},{"key":"e_1_3_2_1_23_1","unstructured":"Wordtracker. Five Reasons Why Wordtracker Blows Other Keywords Tools Away. http:\/\/www.wordtracker.com\/find-the-best-keywords.html. Wordtracker. Five Reasons Why Wordtracker Blows Other Keywords Tools Away. http:\/\/www.wordtracker.com\/find-the-best-keywords.html."},{"key":"e_1_3_2_1_24_1","volume-title":"Wu and Brian D. Davison. Cloaking and Redirection: A Preliminary Study. In Proceedings of the SIGIR Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Baoning","year":"2005"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135901"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T23:50:00Z","timestamp":1673308200000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046763"}},"subtitle":["dynamics of web search cloaking"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":24,"alternative-id":["10.1145\/2046707.2046763","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046763","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}