{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:29:12Z","timestamp":1750746552701,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030884178"},{"type":"electronic","value":"9783030884185"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88418-5_13","type":"book-chapter","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T21:04:30Z","timestamp":1632949470000},"page":"263-284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO"],"prefix":"10.1007","author":[{"given":"Hao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Kun","family":"Du","sequence":"additional","affiliation":[]},{"given":"Yubao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shuai","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Haixin","family":"Duan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"key":"13_CR1","unstructured":"Beautiful soup documentation - beautiful soup 4.9.0 documentation (2020). https:\/\/www.crummy.com\/software\/BeautifulSoup\/bs4\/doc\/"},{"key":"13_CR2","unstructured":"Github - fxsjy\/jieba. https:\/\/github.com\/fxsjy\/jieba (2020)"},{"key":"13_CR3","unstructured":"Keras: the Python deep learning API (2020). https:\/\/keras.io\/"},{"key":"13_CR4","unstructured":"SeleniumHQ Browser Automation (2020). https:\/\/www.selenium.dev\/"},{"key":"13_CR5","unstructured":"Textcnn - pytorch and keras \u2014 kaggle (2020). https:\/\/www.kaggle.com\/mlwhiz\/textcnn-pytorch-and-keras"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Chung, Y.j., Toyoda, M., Kitsuregawa, M.: A study of link farm distribution and evolution using a time series of web snapshots. In: International Workshop on Adversarial Information Retrieval on the Web (2009)","DOI":"10.1145\/1531914.1531917"},{"issue":"4","key":"13_CR7","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1561\/1500000006","volume":"1","author":"GV Cormack","year":"2007","unstructured":"Cormack, G.V.: Email spam filtering: a systematic review. Found. Trends Inf. Retr. 1(4), 335\u2013455 (2007)","journal-title":"Found. Trends Inf. Retr."},{"key":"13_CR8","unstructured":"Du, K., Yang, H., Li, Z., Duan, H., Zhang, K.: The ever-changing labyrinth: a large-scale analysis of wildcard DNS powered blackhat SEO. In: USENIX Security (2016)"},{"key":"13_CR9","unstructured":"Enge, E., Spencer, S., Fishkin, R., Stricchiola, J.: The Art of SEO. O\u2019Reilly Media, Inc. (2012)"},{"key":"13_CR10","unstructured":"Farsight (2020). https:\/\/www.farsightsecurity.com\/"},{"key":"13_CR11","unstructured":"Fishkin, R.: Indexation for SEO: Real Numbers in 5 Easy Steps (2010). https:\/\/moz.com\/blog\/indexation-for-seo-real-numbers-in-5-easy-steps"},{"key":"13_CR12","unstructured":"Google: Search Engine Optimization Starter Guide (2008). http:\/\/static.googleusercontent.com\/media\/www.google.com\/en\/\/webmasters\/docs\/search-engine-optimization-starter-guide.pdf"},{"key":"13_CR13","unstructured":"Google: Search Engine Optimization (SEO) Starter Guide (2020). https:\/\/support.google.com\/webmasters\/answer\/7451184?hl=en"},{"key":"13_CR14","unstructured":"ICANN: Data Protection\/Privacy Issues (2018). https:\/\/www.icann.org\/dataprotectionprivacy"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Invernizzi, L., Thomas, K., Kapravelos, A., Comanescu, O., Picod, J.M., Bursztein, E.: Cloak of visibility: detecting when machines browse a different web. In: IEEE S&P (2016)","DOI":"10.1109\/SP.2016.50"},{"key":"13_CR16","unstructured":"John, J.P., Yu, F., Xie, Y., Krishnamurthy, A., Abadi, M.: deSEO: combating search-result poisoning. In: USENIX Security (2011)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Leontiadis, N., Moore, T., Christin, N.: A nearly four-year longitudinal study of search-engine poisoning. In: ACM CCS (2014)","DOI":"10.1145\/2660267.2660332"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Liao, X., Liu, C., McCoy, D., Shi, E., Hao, S., Beyah, R.A.: Characterizing Long-tail SEO Spam on Cloud Web Hosting Services. In: WWW (2016)","DOI":"10.1145\/2872427.2883008"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Liao, X., et al.: Seeking nonsense, looking for trouble: efficient promotional-infection detection through semantic inconsistency search. In: IEEE S&P (2016)","DOI":"10.1109\/SP.2016.48"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Lu, L., Perdisci, R., Lee, W.: Surf: detecting and measuring search poisoning. In: ACM CCS (2011)","DOI":"10.1145\/2046707.2046762"},{"key":"13_CR21","unstructured":"MaxMind (2020). https:\/\/www.maxmind.com\/en\/home"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Motoyama, M., McCoy, D., Levchenko, K., Savage, S., Voelker, G.M.: An analysis of underground forums. In: ACM IMC (2011)","DOI":"10.1145\/2068816.2068824"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Nilizadeh, S., et al.: Poised: spotting twitter spam off the beaten paths. In: ACM CCS (2017)","DOI":"10.1145\/3133956.3134055"},{"key":"13_CR24","unstructured":"SEOmoz: Google Algorithm Change History (2016). https:\/\/moz.com\/google-algorithm-change"},{"key":"13_CR25","unstructured":"Tu, H., Doup\u00e9, A., Zhao, Z., Ahn, G.J.: Users really do answer telephone scams. In: USENIX Security (2019)"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Wang, D.Y., Der, M., Karami, M., Saul, L., McCoy, D., Savage, S., Voelker, G.M.: Search+seizure: the effectiveness of interventions on SEO campaigns. In: ACM IMC (2014)","DOI":"10.1145\/2663716.2663738"},{"key":"13_CR27","unstructured":"Wang, D.Y., Savage, S., Voelker, G.M.: Juice: a Longitudinal Study of an SEO Botnet. In: NDSS (2013)"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Yang, H., et al.: How to learn klingon without a dictionary: detection and measurement of black keywords used by the underground economy. In: IEEE S&P (2017)","DOI":"10.1109\/SP.2017.11"},{"key":"13_CR29","unstructured":"Yuan, K., Lu, H., Liao, X., Wang, X.: Reading thieves\u2019 cant: automatically identifying and understanding Dark Jargons from cybercrime marketplaces. In: USENIX Security (2018)"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Wang, D.Y., Voelker, G.M.: DSpin: detecting automatically spun content on the web. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23004"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88418-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T21:13:44Z","timestamp":1632950024000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88418-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030884178","9783030884185"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88418-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2021.athene-center.de\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"351","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.07","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.06","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}