{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:35:40Z","timestamp":1760708140825},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642111600"},{"type":"electronic","value":"9783642111617"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-11161-7_23","type":"book-chapter","created":{"date-parts":[[2009,12,14]],"date-time":"2009-12-14T21:17:29Z","timestamp":1260825449000},"page":"335-344","source":"Crossref","is-referenced-by-count":28,"title":["HoneySpam 2.0: Profiling Web Spambot Behaviour"],"prefix":"10.1007","author":[{"given":"Pedram","family":"Hayati","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kevin","family":"Chai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vidyasagar","family":"Potdar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alex","family":"Talevski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Gyongyi, Z., Garcia-Molina, H.: Web spam taxonomy. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, Chiba, Japan (2005)"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Hayati, P., Potdar, V.: Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods. In: 7th IEEE International Conference on Industrial Informatics Cardiff, Wales (2009)","DOI":"10.1109\/INDIN.2009.5195918"},{"key":"23_CR3","unstructured":"Zeitgeist, L.S.: Comment Spam. In: Akismet, ed. (2009), http:\/\/akismet.com\/stats\/"},{"key":"23_CR4","unstructured":"Cobb, S.: The Economics of Spam. EPrivacyGroup (2003), http:\/\/www.eprivacygroup.com"},{"key":"23_CR5","unstructured":"Workathome, Work from home online ad placing work pay per posting (2009), http:\/\/www.workathomeforum.in\/online-adplacing-homejob.htm , http:\/\/www.workathomeforum.in\/online-adplacing-homejob.htm"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1023\/A:1013228602957","volume":"6","author":"P.-N. Tan","year":"2002","unstructured":"Tan, P.-N., Kumar, V.: Discovery of Web Robot Sessions Based on their Navigational Patterns. Data Mining and Knowledge Discovery\u00a06, 9\u201335 (2002)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"23_CR7","unstructured":"Park, K., Pai, V.S., Lee, K.-W., Calo, S.: Securing Web Service by Automatic Robot Detection. In: USENIX 2006 Annual Technical Conference Refereed Paper (2006)"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., Simard, P.: Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). In: NIPS (2004)","DOI":"10.1145\/1054972.1055070"},{"key":"23_CR9","volume-title":"Proceedings of the 2008 15th Working Conference on Reverse Engineering","author":"H. Abram","year":"2008","unstructured":"Abram, H., Michael, W.G., Richard, C.H.: Reverse Engineering CAPTCHAs. In: Proceedings of the 2008 15th Working Conference on Reverse Engineering. IEEE Computer Society, Los Alamitos (2008)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Mori, G., Malik, J.: Recognizing objects in adversarial clutter: breaking a visual CAPTCHA. In: Proceedings. 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol.\u00a01, p I-134-I-141 (2003)","DOI":"10.1109\/CVPR.2003.1211347"},{"key":"23_CR11","unstructured":"Baird, H.S., Bentley, J.L.: Implicit CAPTCHAs. In: Proceedings SPIE\/IS&T Conference on Document Recognition and Retrieval XII (DR&R2005), San Jose, CA (2005)"},{"key":"23_CR12","unstructured":"Ogbuji, U.: Real Web 2.0: Battling Web spam (2008), http:\/\/www.ibm.com\/developerworks\/web\/library\/wa-realweb10\/"},{"key":"23_CR13","unstructured":"Mertz, D.: Charming Python: Beat spam using hashcash (2004), http:\/\/www.ibm.com\/developerworks\/linux\/library\/l-hashcash.html"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Cooley, R., Mobasher, B., Srivastava, J.: Web mining: information and pattern discovery on the World Wide Web. In: Proceedings of Ninth IEEE International Conference on Tools with Artificial Intelligence 1997, pp. 558\u2013567 (1997)","DOI":"10.1109\/TAI.1997.632303"},{"key":"23_CR15","unstructured":"Webb, S., Caverlee, J., Pu, C.: Social Honeypots: Making Friends with a Spammer Near You. In: Proceedings of the Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View, CA (2008)"},{"key":"23_CR16","unstructured":"Andreolini, M., Bulgarelli, A., Colajanni, M., Mazzoni, F.: HoneySpam: honeypots fighting spam at the source. In: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop (2005), Cambridge, MA, p. 11 (2005)"}],"container-title":["Lecture Notes in Computer Science","Principles of Practice in Multi-Agent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11161-7_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:37:54Z","timestamp":1606185474000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11161-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642111600","9783642111617"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11161-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}