{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T04:39:50Z","timestamp":1766983190031,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319457437"},{"type":"electronic","value":"9783319457444"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45744-4_12","type":"book-chapter","created":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T04:54:30Z","timestamp":1473828870000},"page":"238-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["A Machine Learning Approach for Detecting Third-Party Trackers on the Web"],"prefix":"10.1007","author":[{"given":"Qianru","family":"Wu","sequence":"first","affiliation":[]},{"given":"Qixu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guanxing","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,15]]},"reference":[{"issue":"3","key":"12_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2013.160","volume":"12","author":"N Nikiforakis","year":"2014","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: On the workings and current practices of web-based device fingerprinting. Secur. Priv. IEEE 12(3), 28\u201336 (2014)","journal-title":"Secur. Priv. IEEE"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.comnet.2015.08.012","volume":"91","author":"W Qianru","year":"2015","unstructured":"Qianru, W., Liu, Q., Zhang, Y., Wen, G.: Trackerdetector: A system to detect third-party trackers through machine learning. Comput. Netw. 91, 164\u2013173 (2015)","journal-title":"Comput. Netw."},{"key":"12_CR3","unstructured":"Bau, J., Mayer, J., Paskov, H., Mitchell, J.C.: A promising direction for web tracking countermeasures. In: Web, vol. 2 (2013)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Mayer, J.R., Mitchell, J.C.: Third-party web tracking: Policy and technology. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 413\u2013427. IEEE (2012)","DOI":"10.1109\/SP.2012.47"},{"key":"12_CR5","unstructured":"Adblock plus (2016). https:\/\/addons.mozilla.org\/zh-cn\/firefox\/addon\/adblock-plus\/"},{"key":"12_CR6","unstructured":"Donottrackme: Online privacy protection (2016). https:\/\/addons.mozilla.org\/zh-cn\/firefox\/addon\/donottrackplus\/"},{"key":"12_CR7","unstructured":"Ghostery (2016). https:\/\/addons.mozilla.org\/zh-cn\/firefox\/addon\/ghostery\/"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Pan, X., Cao, Y., Chen, Y.: I do not know what you visited last summer: Protecting users from third-party web tracking with trackingfree browser (2015)","DOI":"10.14722\/ndss.2015.23163"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: Exploring the ecosystem of web-based devicefingerprinting. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 541\u2013555. IEEE (2013)","DOI":"10.1109\/SP.2013.43"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Acar, G., Juarez, M., Nikiforakis, N., Diaz, C., G\u00fcrses, S., Piessens, F., Preneel, B.: Fpdetective: dusting the web for fingerprinters. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 1129\u20131140. ACM (2013)","DOI":"10.1145\/2508859.2516674"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A., Diaz, C.: The web never forgets: Persistent tracking mechanisms in the wild. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 674\u2013689. ACM (2014)","DOI":"10.1145\/2660267.2660347"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Ayenson, M., Wambach, D.J., Soltani, A., Good, N., Hoofnagle, C.J.: Flash cookies and privacy ii: Now with html5 and etag respawning. Available at SSRN 1898390 (2011)","DOI":"10.2139\/ssrn.1898390"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Soltani, A., Canty, S., Mayo, Q., Thomas, L., Hoofnagle, C.J.: Flash cookies and privacy. In: AAAI Spring Symposium: Intelligent Information Privacy Management (2010)","DOI":"10.2139\/ssrn.1446862"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","volume-title":"Privacy Enhancing Technologies","author":"P Eckersley","year":"2010","unstructured":"Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1\u201318. Springer, Heidelberg (2010)"},{"key":"12_CR15","unstructured":"Doubleclick ad exchange real-time bidding protocol: cookie matching. https:\/\/developers.google.com\/ad-exchange\/rtb\/cookie-guide"},{"key":"12_CR16","unstructured":"Kohno, T., Roesner, F.: University of Washington David Wetherall. Detecting and defending against third-party tracking on the web. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (2012)"},{"key":"12_CR17","unstructured":"Noscript (2016). https:\/\/addons.mozilla.org\/zh-cn\/firefox\/addon\/noscript\/"},{"key":"12_CR18","first-page":"1","volume":"2","author":"B Krishnamurthy","year":"2011","unstructured":"Krishnamurthy, B., Naryshkin, K., Wills, C.: Privacy leakage vs. protection measures: the growing disconnect. Proc. Web 2, 1\u201310 (2011)","journal-title":"Proc. Web"},{"key":"12_CR19","unstructured":"Keep-my-opt-outs (2016). https:\/\/chrome.google.com\/webstore\/detail\/keep-my-opt-outs\/hhnjdplhmcnkiecampfdgfjilccfpfoe"},{"key":"12_CR20","unstructured":"Targeted advertising cookie opt-out (2016). https:\/\/addons.mozilla.org\/zh-cn\/firefox\/addon\/targeted-advertising-cookie-op\/"},{"key":"12_CR21","unstructured":"Betterprivacy (2016). https:\/\/addons.mozilla.org\/zh-cn\/firefox\/addon\/betterprivacy\/"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Kushmerick, N.: Learning to remove internet advertisements. In: Proceedings of the Third Annual Conference on Autonomous Agents, pp. 175\u2013181. ACM (1999)","DOI":"10.1145\/301136.301186"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Orr, C.R., Chauhan, A., Gupta, M., Frisz, C.J., Dunn, C.W.: An approach for identifying javascript-loaded advertisements through static program analysis. In: Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, pp. 1\u201312. ACM (2012)","DOI":"10.1145\/2381966.2381968"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Bhagavatula, S., Dunn, C., Kanich, C., Gupta, M., Ziebart, B.: Leveraging machine learning to improve unwanted resource filtering. In: Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, pp. 95\u2013102. ACM (2014)","DOI":"10.1145\/2666652.2666662"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Yamada, A., Masanori, H., Miyake, Y.: Web tracking site detection based on temporal link analysis. In: 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 626\u2013631. IEEE (2010)","DOI":"10.1109\/WAINA.2010.134"},{"key":"12_CR26","unstructured":"Mayer, J.: Tracking the trackers: Self-help tools. http:\/\/cyberlaw.stanford.edu\/blog\/2011\/09\/tracking-trackers-self-help-tools, 9 2011"},{"key":"12_CR27","unstructured":"Witten, I.H., Frank, E., Trigg, L.E., Hall, M.A., Holmes, G., Cunningham, S.J., Weka: Practical machine learning tools and techniques with java implementations (1999)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45744-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T02:54:43Z","timestamp":1631674483000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-45744-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319457437","9783319457444"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45744-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"15 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}