{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T16:40:31Z","timestamp":1756572031125,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":13,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461482666"},{"type":"electronic","value":"9781461482659"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-1-4614-8265-9_465","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T12:41:17Z","timestamp":1544100077000},"page":"4677-4681","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Web Spam Detection"],"prefix":"10.1007","author":[{"given":"Marc","family":"Najork","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"465_CR23276","unstructured":"Becchetti L, Castillo C, Donato D, Leonardi S, Baeza-Yates R. Using rank propagation and probabilistic counting for link-based spam detection. In: Proceedings of the KDD Workshop on Web Mining and Web Usage Analysis; 2006."},{"issue":"2","key":"465_CR23277","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1189702.1189703","volume":"40","author":"C Castillo","year":"2006","unstructured":"Castillo C, Donato D, Becchetti L, Boldi P, Leonardi S, Santini M, Vigna S. A reference collection for Web spam. ACM SIGIR Forum. 2006;40(2):11\u201324.","journal-title":"ACM SIGIR Forum"},{"key":"465_CR23278","unstructured":"Daswani N, Stoppelman M, and the Google Click Quality and Security Teams. The anatomy of clickbot.A. In: Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets; 2007."},{"key":"465_CR23279","unstructured":"Davison BD. Recognizing nepotistic links on the web. In: Proceedings of the AAAI Workshop on Artificial Intelligence for Web Search; 2000."},{"key":"465_CR23280","doi-asserted-by":"crossref","unstructured":"Fetterly D, Manasse M, Najork M. Spam, damn spam and statistics. In: Proceedings of the 7th Internaitonal Workshop on the Web and Databases; 2004. p. 1\u20136.","DOI":"10.1145\/1017074.1017077"},{"issue":"10","key":"465_CR23281","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MC.2005.352","volume":"38","author":"Z Gy\u00f6ngyi","year":"2005","unstructured":"Gy\u00f6ngyi Z, Garcia-Molina H. Spam: its not just for inboxes anymore. IEEE Comput. 2005;38(10):28\u201334.","journal-title":"IEEE Comput"},{"key":"465_CR23282","unstructured":"Gy\u00f6ngyi Z, Garcia-Molina H. Web Spam Taxonomy. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web; 2005. p. 39\u201347."},{"key":"465_CR23283","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/B978-012088469-8.50052-8","volume-title":"Proceedings 2004 VLDB Conference","author":"Zolt\u00e1n Gy\u00f6ngyi","year":"2004","unstructured":"Gy\u00f6ngyi Z, Garcia-Molina H, Pedersen J. Combating Web spam with TrustRank. In: Proceedings of the 30th International Conference on Very Large Data Bases; 2004. p. 576\u201387."},{"issue":"2","key":"465_CR23284","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/792550.792553","volume":"36","author":"M Henzinger","year":"2002","unstructured":"Henzinger M, Motwani R, Silverstein C. Challenges in web search engines. ACM SIGIR Forum. 2002;36(2):11\u201322.","journal-title":"ACM SIGIR Forum"},{"key":"465_CR23285","unstructured":"Mishne G, Carmel D, Lempel R. Blocking blog spam with language model disagreement. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web; 2005. p. 1\u20136."},{"key":"465_CR23286","doi-asserted-by":"crossref","unstructured":"Ntoulas A, Najork M, Manasse M, Fetterly D. Detecting spam web pages through content analysis. In: Proceedings of the 15th International World Wide Web Conference; 2006. p. 83\u201392.","DOI":"10.1145\/1135777.1135794"},{"key":"465_CR23287","doi-asserted-by":"crossref","unstructured":"Wang YM, Ma M, Niu Y, Chen H. Spam double-funnel: connecting Web spammers with advertisers. In: Proceedings of the 16th International World Wide Web Conference; 2007. p. 291\u2013300.","DOI":"10.1145\/1242572.1242612"},{"key":"465_CR23288","doi-asserted-by":"crossref","unstructured":"Wu B, Davison B. Detecting semantic cloaking on the web. In: Proceedings of the 15th International World Wide Web Conference; 2006. p. 819\u201328.","DOI":"10.1145\/1135777.1135901"}],"container-title":["Encyclopedia of Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-8265-9_465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T22:38:50Z","timestamp":1591051130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-8265-9_465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9781461482666","9781461482659"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-8265-9_465","relation":{},"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}