{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:13:23Z","timestamp":1743088403545,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319082349"},{"type":"electronic","value":"9783319082349"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-08234-9_237-1","type":"book-chapter","created":{"date-parts":[[2018,9,11]],"date-time":"2018-09-11T21:52:47Z","timestamp":1536702767000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Game Bot Detection on Massive Multiplayer Online Role-Playing Games (MMORPGs) Systems"],"prefix":"10.1007","author":[{"given":"Andrea","family":"Lanzi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,17]]},"reference":[{"key":"237-1_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad, M.A., Keegan, B., Srivastava, J., Williams, D., Contractor, N.: Mining for Gold Farmers: automatic detection of deviant players in MMOGS. In: Computational science and engineering international conference, vol. 4, pp. 340\u2013345 (2009)","DOI":"10.1109\/CSE.2009.307"},{"key":"237-1_CR2","unstructured":"Bethea, D., Cochran, R.A., Reiter, M.K.: Server-side verification of client behavior in online games. In: Proceedings of the 17th network and distributed system security symposium (2010)"},{"key":"237-1_CR3","unstructured":"Castronova: Effects of botting on world of warcraft. http:\/\/virtuallyblind.com\/files\/mdy\/blizzardmsjexhibit7.pdf (2007)"},{"key":"237-1_CR4","doi-asserted-by":"crossref","unstructured":"Chen, K.-T., Liao, A., Pao, H.-K.K., Chu, H.-H.: Game bot detection based on Avatar Trajectory. In: Entertainment computing ICEC 2008, vol. 5309, pp. 94\u2013105 (2009). [7]","DOI":"10.1007\/978-3-540-89222-9_11"},{"issue":"6","key":"237-1_CR5","doi-asserted-by":"publisher","first-page":"1058","DOI":"10.4218\/etrij.13.2013.0049","volume":"35","author":"Y Chung","year":"2013","unstructured":"Chung, Y., yong Park, C., ri Kim, N., Cho, H., Yoon, T., Lee, H., Lee, J.-H.: Game bot detection approach based on behavior analysis and consideration of various play styles. J ETRI. 35(6), 1058\u20131067 (2013)","journal-title":"J ETRI"},{"issue":"6","key":"237-1_CR6","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/90.650143","volume":"5","author":"ME Crovella","year":"1997","unstructured":"Crovella, M.E., Bestavros, A.: Self-similarity in world wide web traffic: evidence and possible causes. IEEE\/ACM Trans Networking. 5(6), 835\u2013846 (1997)","journal-title":"IEEE\/ACM Trans Networking"},{"key":"237-1_CR7","doi-asserted-by":"crossref","unstructured":"Kang, A.R., Kim, H.K., Woo, J.: Chatting pattern based game bot detection: do they talk like us. In: KSII transactions on internet and information systems, vol. 6, no. 11, pp. 2866\u20132879 (2012)","DOI":"10.3837\/tiis.2012.11.007"},{"key":"237-1_CR8","doi-asserted-by":"crossref","unstructured":"Kang, A.R., Woo, J., Park, J., Kim, H.K.: Online game bot detection based on party-play log analysis. In: Computers and mathematics with applications, vol. 65, no. 9, pp. 1384\u20131395 (2013)","DOI":"10.1016\/j.camwa.2012.01.034"},{"key":"237-1_CR9","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-20042-7_36","volume-title":"Intelligent information and database systems","author":"H Kwon","year":"2011","unstructured":"Kwon, H., Kim, T., Yu, S.J., Kim, H.K.: Self-similarity based lightweight intrusion detection method for cloud computing. In: Intelligent information and database systems, pp. 353\u2013362. Springer, Berlin\/Heidelberg (2011)"},{"key":"237-1_CR10","doi-asserted-by":"crossref","unstructured":"Lee, E. et al.: You are a game bot! Uncovering game bots in MMORPGs via self-similarity in the wild. Published in Network and distributed system security symposium (NDSS) (2016)","DOI":"10.14722\/ndss.2016.23436"},{"issue":"3","key":"237-1_CR11","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSP.2009.78","volume":"7","author":"S Mitterhofer","year":"2009","unstructured":"Mitterhofer, S., Kruegel, C., Kirda, E., Platzer, C.: Server-side bot detection in massively multiplayer online games. Secur Priv IEEE. 7(3), 29\u201336 (2009)","journal-title":"Secur Priv IEEE"},{"key":"237-1_CR12","doi-asserted-by":"crossref","unstructured":"Thawonmas, R., Kashifuji, Y., Chen K.-T.: Detection of MMORPG bots based on behavior analysis. In: Advances in computer entertainment technology conference, pp. 91\u201394 (2008)","DOI":"10.1145\/1501750.1501770"},{"key":"237-1_CR13","unstructured":"van Kesteren, M., Langevoort, J., Grootjen, F.: A step in the right detecting: bot detection in MMORPGs using movement analysis. In: The 21st Benelux conference on artificial intelligence (2009)"}],"container-title":["Encyclopedia of Computer Graphics and Games"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08234-9_237-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T08:57:27Z","timestamp":1680685047000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08234-9_237-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319082349","9783319082349"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08234-9_237-1","relation":{},"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"19 June 2018, 00:00:00","order":1,"name":"received","label":"Received","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"24 June 2018, 00:00:00","order":2,"name":"accepted","label":"Accepted","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"17 July 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}