{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:15:14Z","timestamp":1752228914090,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642005695"},{"type":"electronic","value":"9783642005701"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00570-1_1","type":"book-chapter","created":{"date-parts":[[2009,6,22]],"date-time":"2009-06-22T23:22:29Z","timestamp":1245712949000},"page":"3-26","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Classification of Automated Search Traffic"],"prefix":"10.1007","author":[{"given":"Greg","family":"Buehrer","sequence":"first","affiliation":[]},{"given":"Jack W.","family":"Stokes","sequence":"additional","affiliation":[]},{"given":"Kumar","family":"Chellapilla","sequence":"additional","affiliation":[]},{"given":"John C.","family":"Platt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,4,17]]},"reference":[{"key":"1_CR1","first-page":"3","volume-title":"Learning User Interaction Models for Predicting Web Search Result Preferences, In SIGIR\u201906, 29th International ACM Conference on Research and Development on Information Retrieval","author":"E. Agichtein","year":"2006","unstructured":"Agichtein, E., Brill, E., Dumais, S., and Ragno, R.: Learning User Interaction Models for Predicting Web Search Result Preferences, In SIGIR\u201906, 29th International ACM Conference on Research and Development on Information Retrieval, 2006. (ACM, New York, NY) pp 3\u201310."},{"key":"1_CR2","first-page":"88","volume-title":"Using Terminological Feedback for Web Search Refinement \u2013 A Log-based Study., In SIGIR\u201903, 26th International ACM Conference on Research and Development on Information Retrieval","author":"P. Anick","year":"2003","unstructured":"Anick, P.: Using Terminological Feedback for Web Search Refinement \u2013 A Log-based Study., In SIGIR\u201903, 26th International ACM Conference on Research and Development on Information Retrieval, 2003. (ACM, New York, NY) pp 88\u201395."},{"key":"1_CR3","volume-title":"Pattern Recognition and Machine Learning","author":"C. Bishop","year":"2006","unstructured":"Bishop, C.: Pattern Recognition and Machine Learning. (Springer, New York, NY, 2006)."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Brin, S., and Page, L.: The Anatomy of a Large-scale Hypertextual Web Search Engine, In WWW\u201998, 7th International Conference on World Wide Web, 1998. (Elsevier Science Publishers B. V., Amsterdam, The Netherlands) pp 107\u2013117.","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"1_CR5","unstructured":"Click Quality Team, Google, Inc. How Fictitious Clicks Occur in Third-Party Click Fraud Audit Reports. http:\/\/www.google.com\/adwords\/ReportonThird-PartyClickFraudAuditing.pdf, 2006."},{"key":"1_CR6","first-page":"11","volume-title":"A, In HOTBOTS\u201907, 1st Workshop on Hot Topics in Understanding Botnets","author":"N. Daswani","year":"2007","unstructured":"Daswani, N., Stoppelman, M., and the Google Click Quality and Security Teams: The Anatomy of Clickbot. A, In HOTBOTS\u201907, 1st Workshop on Hot Topics in Understanding Botnets, 2007. (USENIX Association, Berkeley, CA) pp 11\u201311."},{"key":"1_CR7","first-page":"1","volume-title":"Spam, Damn Spam, and Statistics: Using Statistical Analysis to Locate Spam Web Pages, In WebDB\u201904, 7th International Workshop on the Web and Databases","author":"D. Fetterly","year":"2004","unstructured":"Fetterly, D., Manasse, M., and Najork, M.: Spam, Damn Spam, and Statistics: Using Statistical Analysis to Locate Spam Web Pages, In WebDB\u201904, 7th International Workshop on the Web and Databases, 2004. (ACM, New York, NY) pp 1\u20136."},{"issue":"15","key":"1_CR8","doi-asserted-by":"publisher","first-page":"2479","DOI":"10.1093\/bioinformatics\/bth261","volume":"20","author":"E. Frank","year":"1994","unstructured":"Frank, E., Hall, M., Trigg, L., Holmes, G., and Witten, I. H.: Data Mining in Bioinformatics Using Weka. Bioinformatics, 20(15), 2479\u20132481, 1994.","journal-title":"Bioinformatics"},{"key":"1_CR9","first-page":"701","volume-title":"A Large Scale Study of Wireless Search Behavior: Google Mobile Search, In CHI\u201906, CHI Conference on Human Factors in Computing Systems","author":"M. Kamvar","year":"2006","unstructured":"Kamvar, M., and Baluja, S.: A Large Scale Study of Wireless Search Behavior: Google Mobile Search, In CHI\u201906, CHI Conference on Human Factors in Computing Systems, 2006. (ACM, New York, NY) pp 701\u2013709."},{"key":"1_CR10","first-page":"7","volume-title":"Wide-scale Botnet Detection and Characterization, In HOTBOTS\u201907, 1st Workshop on Hot Topics in Understanding Botnets","author":"A. Karasaridis","year":"2007","unstructured":"Karasaridis, A., Rexroad, B., and Hoeflin, D.: Wide-scale Botnet Detection and Characterization, In HOTBOTS\u201907, 1st Workshop on Hot Topics in Understanding Botnets, 2007. (USENIX Association, Berkeley, CA) pp 7\u20137."},{"key":"1_CR11","first-page":"1","volume-title":"Is a Bot at the Controls? Detecting Input Data Attacks, In NetGames\u201907, 6th Workshop on Network and System Support for Games","author":"T. Schluessler","year":"2007","unstructured":"Schluessler, T., Goglin, S., and Johnson, E.: Is a Bot at the Controls? Detecting Input Data Attacks, In NetGames\u201907, 6th Workshop on Network and System Support for Games, 2007. (ACM, New York, NY) pp 1\u20136."},{"key":"1_CR12","unstructured":"Stokes, J. W., Platt, J. C., Kravis, J., and Shilman, M.: ALADIN: Active Learning of Anomalies to Detect Intrusions, Microsoft Research Technical Report MSR-TR-2008-24, March 4, 2008."},{"key":"1_CR13","unstructured":"Tuzhilin, A.: The Lane\u2019s Gifts v. Google Report. http:\/\/googleblog.blogspot.com\/pdf\/Tuzhilin_Report.pdf."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Wu, K.-L., Yu, P. S., and Ballman, A.: SpeedTracer: A Web Usage Mining and Analysis Tool. http:\/\/www.research.ibm.com\/journal\/sj\/371\/wu.html, 1998.","DOI":"10.1147\/sj.371.0089"}],"container-title":["Weaving Services and People on the World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00570-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T21:35:52Z","timestamp":1675719352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-00570-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642005695","9783642005701"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00570-1_1","relation":{},"subject":[],"published":{"date-parts":[[2009]]},"assertion":[{"value":"17 April 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}