{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:02:49Z","timestamp":1725753769455},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642412837"},{"type":"electronic","value":"9783642412844"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41284-4_19","type":"book-chapter","created":{"date-parts":[[2013,10,22]],"date-time":"2013-10-22T17:35:11Z","timestamp":1382463311000},"page":"369-389","source":"Crossref","is-referenced-by-count":7,"title":["Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Lauinger","sequence":"first","affiliation":[]},{"given":"Kaan","family":"Onarlioglu","sequence":"additional","affiliation":[]},{"given":"Abdelberi","family":"Chaabane","sequence":"additional","affiliation":[]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[]},{"given":"William","family":"Robertson","sequence":"additional","affiliation":[]},{"given":"Mohamed Ali","family":"Kaafar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"An estimate of infringing use of the Internet. Tech. rep., Envisional Ltd. (January 2011), \n                    \n                      http:\/\/documents.envisional.com\/docs\/Envisional-Internet_Usage-Jan2011.pdf","key":"19_CR1"},{"doi-asserted-by":"crossref","unstructured":"Antoniades, D., Markatos, E., Dovrolis, C.: One-click hosting services: A file-sharing hideout. In: IMC 2009. ACM (November 2009)","key":"19_CR2","DOI":"10.1145\/1644893.1644920"},{"doi-asserted-by":"crossref","unstructured":"Cuevas, R., Kryczka, M., Cuevas, A., Kaune, S., Guerrero, C., Rejaie, R.: Is content publishing in BitTorrent altruistic or profit-driven? In: Co-NEXT 2010 (November 2010)","key":"19_CR3","DOI":"10.1145\/1921168.1921183"},{"unstructured":"Enigmax: Hotfile goes to war against copyright infringers (February 2011), \n                    \n                      http:\/\/torrentfreak.com\/hotfile-goes-to-war-against-copyright-infringers-110219\/","key":"19_CR4"},{"unstructured":"Ernesto: Hotfile\u2019s most downloaded files are open source software (April 2012), \n                    \n                      http:\/\/torrentfreak.com\/hotfiles-most-donwloaded-files-are-open-source-software-120411\/","key":"19_CR5"},{"unstructured":"Ernesto: Rapidshare limits public download traffic to drive away pirates (November 2012), \n                    \n                      http:\/\/torrentfreak.com\/rapidshare-limits-public-download-traffic-to-drive-away-pirates-121108\/","key":"19_CR6"},{"unstructured":"Jain, R.: The art of computer systems performance analysis: Techniques for experimental design, easurements, simulation, and modeling. Wiley (April 1991)","key":"19_CR7"},{"doi-asserted-by":"crossref","unstructured":"Jelveh, Z., Ross, K.: Profiting from filesharing: A measurement study of economic incentives in cyberlockers. In: P2P 2012. IEEE (September 2012)","key":"19_CR8","DOI":"10.1109\/P2P.2012.6335811"},{"doi-asserted-by":"crossref","unstructured":"Kammerstetter, M., Platzer, C., Wondracek, G.: Vanity, cracks and malware: Insights into the anti-copy protection ecosystem. In: CCS 2012. ACM (October 2012)","key":"19_CR9","DOI":"10.1145\/2382196.2382282"},{"unstructured":"Kravets, D.: Feds tell Megaupload users to forget about their data (June 2012), \n                    \n                      http:\/\/www.wired.com\/threatlevel\/2012\/06\/feds-megaupload-data\/","key":"19_CR10"},{"doi-asserted-by":"crossref","unstructured":"Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide, J., Jahanian, F.: Internet inter-domain traffic. In: SIGCOMM 2010. ACM (August 2010)","key":"19_CR11","DOI":"10.1145\/1851182.1851194"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-33338-5_9","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"T. Lauinger","year":"2012","unstructured":"Lauinger, T., Kirda, E., Michiardi, P.: Paying for piracy? An analysis of one-click hosters\u2019 controversial reward schemes. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol.\u00a07462, pp. 169\u2013189. Springer, Heidelberg (2012)"},{"unstructured":"Lauinger, T., Szydlowski, M., Onarlioglu, K., Wondracek, G., Kirda, E., Kruegel, C.: Clickonomics: Determining the effect of anti-piracy measures for one-click hosting. In: NDSS 2013. Internet Society (February 2013)","key":"19_CR13"},{"unstructured":"Liang, J., Kumar, R., Xi, Y., Ross, K.: Pollution in P2P file sharing systems. In: INFOCOM 2005. IEEE (March 2005)","key":"19_CR14"},{"doi-asserted-by":"crossref","unstructured":"Mahanti, A., Carlsson, N., Williamson, C.: Content sharing dynamics in the global file hosting landscape. In: MASCOTS 2012, pp. 219\u2013228. IEEE (August 2012)","key":"19_CR15","DOI":"10.1109\/MASCOTS.2012.34"},{"issue":"11","key":"19_CR16","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1016\/j.peva.2011.07.016","volume":"68","author":"A. Mahanti","year":"2011","unstructured":"Mahanti, A., Williamson, C., Carlsson, N., Arlitt, M., Mahanti, A.: Characterizing the file hosting ecosystem: A view from the edge. Performance Evaluation\u00a068(11), 1085\u20131102 (2011)","journal-title":"Performance Evaluation"},{"unstructured":"Nikiforakis, N., Balduzzi, M., Acker, S.V., Joosen, W., Balzarotti, D.: Exposing the lack of privacy in file hosting services. In: LEET 2011. Usenix (March 2011)","key":"19_CR17"},{"issue":"3","key":"19_CR18","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.socec.2003.12.027","volume":"33","author":"A. Rehn","year":"2004","unstructured":"Rehn, A.: The politics of contraband: The honor economies of the warez scene. Journal of Socio-Economics\u00a033(3), 359\u2013374 (2004)","journal-title":"Journal of Socio-Economics"},{"unstructured":"Sandoval, G.: MPAA wants more criminal cases brought against \u2018rogue\u2019 sites (March 2012), \n                    \n                      http:\/\/news.cnet.com\/8301-31001_3-57407346-261\/mpaa-wants-more-criminal-cases-brought-against-rogue-sites\/","key":"19_CR19"},{"doi-asserted-by":"crossref","unstructured":"Sanju\u00e0s-Cuxart, J., Barlet-Ros, P., Sol\u00e9-Pareta, J.: Measurement based analysis of one-click file hosting services. Journal of Network and Systems Management (May 2011)","key":"19_CR20","DOI":"10.1007\/s10922-011-9202-4"},{"issue":"2","key":"19_CR21","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.istr.2011.09.007","volume":"16","author":"P.A. Watters","year":"2011","unstructured":"Watters, P.A., Layton, R., Dazeley, R.: How much material on BitTorrent is infringing content? A case study. Information Security Technical Report\u00a016(2), 79\u201387 (2011)","journal-title":"Information Security Technical Report"},{"unstructured":"Wilson, D.: Exclusive: Megaupload issues response to RIAA over Mastercard cutoff (December 2010), \n                    \n                      http:\/\/www.zeropaid.com\/news\/91680\/exclusive-megaupload-issues-response-to-riaa-over-mastercard-cutoff\/","key":"19_CR22"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41284-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T22:47:55Z","timestamp":1558651675000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41284-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642412837","9783642412844"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41284-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}