{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T17:49:45Z","timestamp":1763747385037,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319155081"},{"type":"electronic","value":"9783319155098"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15509-8_21","type":"book-chapter","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T07:09:05Z","timestamp":1425366545000},"page":"277-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["TrackAdvisor: Taking Back Browsing Privacy from Third-Party Trackers"],"prefix":"10.1007","author":[{"given":"Tai-Ching","family":"Li","sequence":"first","affiliation":[]},{"given":"Huy","family":"Hang","sequence":"additional","affiliation":[]},{"given":"Michalis","family":"Faloutsos","sequence":"additional","affiliation":[]},{"given":"Petros","family":"Efstathopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"key":"21_CR1","unstructured":"AdBlock Plus. https:\/\/adblockplus.org"},{"key":"21_CR2","unstructured":"Alexa, the Web Information Company. http:\/\/www.alexa.com"},{"key":"21_CR3","unstructured":"Collusion, browser extension. https:\/\/chrome.google.com\/webstore\/detail\/collusion-for-chrome\/ganlifbpkcplnldliibcbegplfmcfigp"},{"key":"21_CR4","unstructured":"FourthParty Firefox Extension. http:\/\/fourthparty.info"},{"key":"21_CR5","unstructured":"Ghostery. https:\/\/www.ghostery.com\/"},{"key":"21_CR6","unstructured":"HTTP ETags. http:\/\/en.wikipedia.org\/wiki\/HTTP_ETag"},{"key":"21_CR7","unstructured":"Microsoft\u2019s Tracking Protection Lists. http:\/\/ie.microsoft.com\/testdrive\/Browser\/p3p\/Default.html"},{"key":"21_CR8","unstructured":"Privacy Badger. http:\/\/www.theregister.co.uk\/2014\/05\/02\/eff_privacy_badger\/"},{"key":"21_CR9","unstructured":"Selenium, Web Browser Automation. http:\/\/docs.seleniumhq.org\/"},{"key":"21_CR10","unstructured":"Third-party iFrames can no longer read their own cookies when \u201cBlock third-party cookies and site data\u201d is enabled. urlhttps:\/\/code.google.com\/p\/chromium\/issues\/detail?id=113401"},{"key":"21_CR11","unstructured":"Yahoo declines to honor \u201cDo not track\u201d. http:\/\/yahoopolicy.tumblr.com\/post\/84363620568\/yahoos-default-a-personalized-experience"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Ayenson, M., Wambach, D., Soltani, A., Good, N., Hoofnagle, C.: Flash cookies and privacy II: now with HTML5 and etag respawning. Social Science Research Networks (2011)","DOI":"10.2139\/ssrn.1898390"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","volume-title":"Privacy Enhancing Technologies","author":"P Eckersley","year":"2010","unstructured":"Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1\u201318. Springer, Heidelberg (2010)"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Leon, P., Ur, B., Shay, R., Wang, Y., Balebako, R., Cranor, L.: Why Johnny can\u2019t opt out: a usability evaluation of tools to limit online behavioral advertising. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 589\u2013598. ACM (2012)","DOI":"10.1145\/2207676.2207759"},{"key":"21_CR15","unstructured":"Mayer, J.: Tracking the Trackers: Self-help tools. http:\/\/cyberlaw.stanford.edu\/node\/6730"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Mayer, J.R., Mitchell, J.C.: Third-party web tracking: policy and technology. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 413\u2013427. IEEE (2012)","DOI":"10.1109\/SP.2012.47"},{"key":"21_CR17","first-page":"639","volume":"7","author":"AM McDonald","year":"2012","unstructured":"McDonald, A.M., Cranor, L.F.: A survey of the use of adobe flash local shared objects to respawn http cookies. J. Law Policy Inf. Soc. 7, 639\u2013721 (2012)","journal-title":"J. Law Policy Inf. Soc."},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Weinberg, Z., Chen, E.Y., Jayaraman, P.R., Jackson, C.: I still know what you visited last summer: leaking browsing history via user interaction and side channel attacks. In: 2011 IEEE Symposium on Security and Privacy (SP), pp. 147\u2013161. IEEE (2011)","DOI":"10.1109\/SP.2011.23"},{"key":"21_CR19","unstructured":"Witten, I.H., Frank, E., Trigg, L.E., Hall, M.A., Holmes, G., Cunningham, S.J.: WEKA: practical machine learning tools and techniques with Java implementations"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15509-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T05:42:41Z","timestamp":1674279761000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15509-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319155081","9783319155098"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15509-8_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}