{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T12:30:18Z","timestamp":1776861018949,"version":"3.51.2"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030046477","type":"print"},{"value":"9783030046484","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04648-4_21","type":"book-chapter","created":{"date-parts":[[2018,11,17]],"date-time":"2018-11-17T00:53:52Z","timestamp":1542416032000},"page":"247-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Gaming Bot Detection: A Systematic Literature Review"],"prefix":"10.1007","author":[{"given":"Denis","family":"Kotkov","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Pandey","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Semenov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,18]]},"reference":[{"key":"21_CR1","unstructured":"Ways to Make Money Playing Video Games. https:\/\/ivetriedthat.com\/7-ways-to-make-money-playing-video-games\/ . Accessed 14 Sept 2018"},{"key":"21_CR2","unstructured":"G2G Corporate|Gaming For A Living. https:\/\/corp.g2g.com\/ . Accessed 14 Sept 2018"},{"key":"21_CR3","unstructured":"Global Games Market Revenues 2018|Per Region & Segment|Newzoo. https:\/\/newzoo.com\/insights\/articles\/global-games-market-reaches-137-9-billion-in-2018-mobile-games-take-half\/ . Accessed 14 Sept 2018"},{"key":"21_CR4","unstructured":"I will game: anatomy of MMO addiction. https:\/\/www.cnet.com\/news\/i-will-game-anatomy-of-mmo-addiction\/ . Accessed 14 Sept 2018"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Ahmad, M.A., Keegan, B., Srivastava, J., Williams, D., Contractor, N.: Mining for gold farmers: automatic detection of deviant players in MMOGs. In: 2009 International Conference on Computational Science and Engineering, pp. 340\u2013345. IEEE (2009)","DOI":"10.1109\/CSE.2009.307"},{"key":"21_CR6","doi-asserted-by":"publisher","unstructured":"Ahmad, M.A., Srivastava, J.: Behavioral data mining and network analysis in massive online games. In: Proceedings of the 7th ACM International Conference on Web Search and Data Mining, WSDM 2014, pp. 673\u2013674. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2556195.2556196","DOI":"10.1145\/2556195.2556196"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Alayed, H., Frangoudes, F., Neuman, C.: Behavioral-based cheating detection in online first person shooters using machine learning techniques. In: 2013 IEEE Conference on Computational Intelligence in Games (CIG), pp. 1\u20138. Citeseer (2013)","DOI":"10.1109\/CIG.2013.6633617"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Bernardi, M.L., Cimitile, M., Martinelli, F., Mercaldo, F.: A time series classification approach to game bot detection. In: Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics, p. 6. ACM (2017)","DOI":"10.1145\/3102254.3102263"},{"issue":"6374","key":"21_CR9","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1126\/science.aao1733","volume":"359","author":"Noam Brown","year":"2017","unstructured":"Brown, N., Sandholm, T.: Superhuman AI for heads-up no-limit poker: libratus beats top professionals. Science (2017). https:\/\/doi.org\/10.1126\/science.aao1733 . http:\/\/science.sciencemag.org\/content\/early\/2017\/12\/15\/science.aao1733","journal-title":"Science"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Chen, C.L., Ku, C.C., Deng, Y.Y., Tsaur, W.J.: Automatic detection for online Games Bot with APP. In: 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), pp. 289\u2013294. IEEE (2018)","DOI":"10.1109\/FMEC.2018.8364081"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-540-89222-9_11","volume-title":"Entertainment Computing - ICEC 2008","author":"K-T Chen","year":"2008","unstructured":"Chen, K.-T., Liao, A., Pao, H.-K.K., Chu, H.-H.: Game Bot detection based on avatar trajectory. In: Stevens, S.M., Saldamarco, S.J. (eds.) ICEC 2008. LNCS, vol. 5309, pp. 94\u2013105. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89222-9_11"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Chun, S., Choi, D., Han, J., Kim, H.K., Kwon, T.: Unveiling a socio-economic system in a virtual world: a case study of an MMORPG. In: Proceedings of the 2018 World Wide Web Conference on World Wide Web, pp. 1929\u20131938. International World Wide Web Conferences Steering Committee (2018)","DOI":"10.1145\/3178876.3186173"},{"issue":"6","key":"21_CR13","doi-asserted-by":"publisher","first-page":"1058","DOI":"10.4218\/etrij.13.2013.0049","volume":"35","author":"Y Chung","year":"2013","unstructured":"Chung, Y., et al.: Game Bot detection approach based on behavior analysis and consideration of various play styles. ETRI J. 35(6), 1058\u20131067 (2013)","journal-title":"ETRI J."},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Gianvecchio, S., Wu, Z., Xie, M., Wang, H.: Battle of Botcraft: fighting bots in online games with human observational proofs. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 256\u2013268. ACM (2009)","DOI":"10.1145\/1653662.1653694"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Gurajala, S., White, J.S., Hudson, B., Matthews, J.N.: Fake Twitter accounts: profile characteristics obtained using an activity-based pattern retection approach. In: Proceedings of the 2015 International Conference on Social Media & Society, p. 9. ACM (2015)","DOI":"10.1145\/2789187.2789206"},{"issue":"1","key":"21_CR16","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1186\/s40064-016-2122-8","volume":"5","author":"AR Kang","year":"2016","unstructured":"Kang, A.R., Jeong, S.H., Mohaisen, A., Kim, H.K.: Multimodal game bot detection using user behavioral characteristics. SpringerPlus 5(1), 523 (2016)","journal-title":"SpringerPlus"},{"issue":"11","key":"21_CR17","first-page":"2866","volume":"6","author":"AR Kang","year":"2012","unstructured":"Kang, A.R., Kim, H.K., Woo, J.: Chatting pattern based game BOT detection: do they talk like us? KSII Trans. Internet Inf. Syst. 6(11), 2866\u20132879 (2012)","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"9","key":"21_CR18","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1016\/j.camwa.2012.01.034","volume":"65","author":"AR Kang","year":"2013","unstructured":"Kang, A.R., Woo, J., Park, J., Kim, H.K.: Online game bot detection based on party-play log analysis. Comput. Math. Appl. 65(9), 1384\u20131395 (2013)","journal-title":"Comput. Math. Appl."},{"issue":"3","key":"21_CR19","first-page":"544","volume":"12","author":"H Kwon","year":"2017","unstructured":"Kwon, H., Mohaisen, A., Woo, J., Kim, Y., Lee, E., Kim, H.K.: Crime scene reconstruction: online gold farming network analysis. IEEE Trans. Inf. Forensics Secur. 12(3), 544\u2013556 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Laurens, P., Paige, R.F., Brooke, P.J., Chivers, H.: A novel approach to the detection of cheating in multiplayer online games. IEEE (2007)","DOI":"10.1109\/ICECCS.2007.11"},{"key":"21_CR21","doi-asserted-by":"publisher","first-page":"181","DOI":"10.28945\/479","volume":"9","author":"Yair Levy","year":"2006","unstructured":"Levy, Y., Ellis, T.J.: A systems approach to conduct an effective literature review in support of information systems research. Inf. Sci. 9 (2006)","journal-title":"Informing Science: The International Journal of an Emerging Transdiscipline"},{"issue":"3","key":"21_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSP.2009.78","volume":"7","author":"Stefan Mitterhofer","year":"2009","unstructured":"Mitterhofer, S., Kr\u00fcgel, C., Kirda, E., Platzer, C.: Server-side bot detection in massively multiplayer online games. IEEE Secur. Priv. 7 (2009)","journal-title":"IEEE Security & Privacy Magazine"},{"issue":"4","key":"21_CR23","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1109\/TCIAIG.2013.2286295","volume":"5","author":"S Ontan","year":"2013","unstructured":"Ontan, S., Synnaeve, G., Uriarte, A., Richoux, F., Churchill, D., Preuss, M.: A survey of real-time strategy game AI research and competition in starcraft. IEEE Trans. Comput. Intell. AI Games 5(4), 293\u2013311 (2013). https:\/\/doi.org\/10.1109\/TCIAIG.2013.2286295","journal-title":"IEEE Trans. Comput. Intell. AI Games"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Prasetya, K., Wu, Z.D.: Artificial neural network for bot detection system in MMOGs. In: Proceedings of the 9th Annual Workshop on Network and Systems Support for Games, p. 16. IEEE Press (2010)","DOI":"10.1109\/NETGAMES.2010.5679655"},{"key":"21_CR25","first-page":"72","volume":"2008","author":"JB Rocha","year":"2008","unstructured":"Rocha, J.B., Mascarenhas, S., Prada, R.: Game mechanics for cooperative games. ZON Digital Games 2008, 72\u201380 (2008)","journal-title":"ZON Digital Games"},{"issue":"3","key":"21_CR26","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357\u2013374 (2012)","journal-title":"Comput. Secur."},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Tao, J., Xu, J., Gong, L., Li, Y., Fan, C., Zhao, Z.: NGUARD: A Game Bot Detection Framework for NetEase MMORPGs (2018)","DOI":"10.1145\/3219819.3219925"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Thawonmas, R., Kashifuji, Y., Chen, K.T.: Detection of MMORPG bots based on behavior analysis. In: Proceedings of the 2008 International Conference on Advances in Computer Entertainment Technology, pp. 91\u201394. ACM (2008)","DOI":"10.1145\/1501750.1501770"}],"container-title":["Lecture Notes in Computer Science","Computational Data and Social Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04648-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T01:51:57Z","timestamp":1572745917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04648-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030046477","9783030046484"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04648-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CSoNet","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Social Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csonet2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/optnetsci.cise.ufl.edu\/CSoNet\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"106","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"44","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}