{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T14:15:08Z","timestamp":1771078508785,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,8,22]],"date-time":"2009-08-22T00:00:00Z","timestamp":1250899200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1007\/s11416-009-0132-6","type":"journal-article","created":{"date-parts":[[2009,8,21]],"date-time":"2009-08-21T19:33:38Z","timestamp":1250883218000},"page":"51-62","source":"Crossref","is-referenced-by-count":20,"title":["Removing web spam links from search engine results"],"prefix":"10.1007","volume":"7","author":[{"given":"Manuel","family":"Egele","sequence":"first","affiliation":[]},{"given":"Clemens","family":"Kolbitsch","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Platzer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,8,22]]},"reference":[{"issue":"1\u20135","key":"132_CR1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1023\/A:1006559212014","volume":"11","author":"C.G. Atkeson","year":"1997","unstructured":"Atkeson C.G., Moore A.W., Schaal S.: Locally weighted learning. Artif. Intell. Rev. 11(1\u20135), 11\u201373 (1997)","journal-title":"Artif. Intell. Rev."},{"key":"132_CR2","unstructured":"Bifet, A., Castillo, C., Chirita, P.-A., Weber, I.: An analysis of factors used in search engine ranking. In: Adversarial Information Retrieval on the Web (2005)"},{"key":"132_CR3","doi-asserted-by":"crossref","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. In: 7th International World Wide Web Conference (WWW) (1998)","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"132_CR4","doi-asserted-by":"crossref","unstructured":"Cacheda, F., Vi\u00f1a, \u00c1.: Experiencies retrieving information in the world wide web. In: Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), pp. 72\u201379 (2001)","DOI":"10.1109\/ISCC.2001.935357"},{"key":"132_CR5","unstructured":"Chellapilla, K., Chickering, D.: Improving cloaking detection using search query popularity and monetizability. In: Adversarial Information Retrieval on the Web (2006)"},{"issue":"1","key":"132_CR6","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1108\/10662240710730470","volume":"17","author":"M.P. Evans","year":"2007","unstructured":"Evans M.P.: Analysing Google rankings through search engine optimization data. Internet Res. 17(1), 21\u201337 (2007)","journal-title":"Internet Res."},{"key":"132_CR7","doi-asserted-by":"crossref","unstructured":"Fetterly, D., Manasse, M., Najork, M.: Spam, damn spam, and statistics: using statistical analysis to locate spam web pages. In: WebDB, pp. 1\u20136 (2004)","DOI":"10.1145\/1017074.1017077"},{"key":"132_CR8","unstructured":"Google. Zeitgeist: Search patterns, trends, and surprises. http:\/\/www.google.com\/press\/zeitgeist.html . Accessed 29 June 2009"},{"key":"132_CR9","unstructured":"Google Keeps Tweaking Its Search Engine. http:\/\/www.nytimes.com\/2007\/06\/03\/business\/yourmoney\/03google.html?page%wanted=4&_r=1 . Accessed 29 June 2009"},{"key":"132_CR10","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H.: Web spam taxonomy. In: Adversarial Information Retrieval on the Web (2005)"},{"issue":"4","key":"132_CR11","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"M.A. Hearst","year":"1998","unstructured":"Hearst M.A.: Support vector machines. IEEE Intell. Syst. 13(4), 18\u201328 (1998)","journal-title":"IEEE Intell. Syst."},{"key":"132_CR12","doi-asserted-by":"crossref","unstructured":"Heckerman, D.: A tutorial on learning with bayesian networks. Technical report, Microsoft Research (1995)","DOI":"10.1016\/B978-1-55860-377-6.50079-7"},{"key":"132_CR13","unstructured":"John, G.H., Langley, P.: Estimating continuous distributions in bayesian classifiers. In: UAI \u201995: Proceedings of the Eleventh Annual Conference on Uncertainty in Artificial Intelligence, August 18\u201320, 1995, Montreal, Quebec, Canada, pp. 338\u2013345 (1995)"},{"issue":"1","key":"132_CR14","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.ijar.2006.08.001","volume":"45","author":"V.G. Kaburlasos","year":"2007","unstructured":"Kaburlasos V.G., Athanasiadis I.N., Mitkas P.A.: Fuzzy lattice reasoning (flr) classifier and its application for ambient ozone estimation. Int. J. Approx. Reason. 45(1), 152\u2013188 (2007)","journal-title":"Int. J. Approx. Reason."},{"key":"132_CR15","unstructured":"Karlberger, C., Bayler, G., Kruegel, C., Kirda, E.: Exploiting redundancy in natural language to penetrate bayesian spam filters. In: First USENIX Workshop on Offensive Technologies (WOOT07) (2007)"},{"key":"132_CR16","unstructured":"MacQueen, J.B.: Some methods for classification and analysis of multivariate observations. In: Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability, pp. 281\u2013297 (1967)"},{"key":"132_CR17","unstructured":"Niu, Y., Wang, Y.-M., Chen, H., Ma, M., Hsu, F.: A quantitative study of forum spamming using context-based analysis. In: NDSS (2007)"},{"key":"132_CR18","doi-asserted-by":"crossref","unstructured":"Ntoulas, A., Najork, M., Manasse, M., Fetterly, D.: Detecting spam web pages through content analysis. In: 15th International World Wide Web Conference (WWW) (2006)","DOI":"10.1145\/1135777.1135794"},{"key":"132_CR19","unstructured":"Platt, J.C.: Fast training of support vector machines using sequential minimal optimization. In: Advances in kernel methods: support vector learning, pp. 185\u2013208. MIT Press, Cambridge. ISBN:0-262-19416-3 (1999)"},{"key":"132_CR20","unstructured":"Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F.: All your iframes point to us. In: 17th USENIX Security Symposium (2008)"},{"key":"132_CR21","unstructured":"Provos, N., McNamee, D., Mavrommatis, P., Wang, K., Modadugu, N.: The ghost in the browser analysis of web-based malware. In: First Workshop on Hot Topics in Understanding Botnets (HotBots \u201907) (2007)"},{"key":"132_CR22","unstructured":"Quinlan, R.: C4.5: programs for machine learning. Morgan Kaufmann, San Francisco (1993)"},{"key":"132_CR23","unstructured":"Rahul Mohandas (McAfee Avert Labs). Analysis of Adversarial Code: The role of Malware Kits! http:\/\/clubhack.com\/2007\/files\/Rahul-Analysis_of_Adversarial_Code.pdf , December 2007. Accessed 29 June 2009"},{"key":"132_CR24","unstructured":"Google Search Engine Ranking Factors. http:\/\/www.seomoz.org\/article\/search-ranking-factors . Accessed 29 June 2009"},{"key":"132_CR25","unstructured":"Shi, H.: Best-first decision tree learning. Master\u2019s thesis, University of Waikato, Hamilton, NZ, COMP594 (2007)"},{"key":"132_CR26","doi-asserted-by":"crossref","unstructured":"Svore, K., Wu, Q., Burges, C., Raman, A.: Improving web spam classification using rank-time features. In: Adversarial Information Retrieval on the Web (2007)","DOI":"10.1145\/1244408.1244411"},{"key":"132_CR27","doi-asserted-by":"crossref","unstructured":"Wang, Y.-M., Ma, M., Niu, Y., Chen, H.: Spam double-funnel: connecting web spammers with advertisers. In: 16th International Conference on World Wide Web (2007)","DOI":"10.1145\/1242572.1242612"},{"key":"132_CR28","unstructured":"Witten, I., Frank, E.: Data mining: practical machine learning tools and techniques 2nd edn. Morgan Kaufmann, San Francisco (2005)"},{"key":"132_CR29","unstructured":"Wu, B., Davison, B.: Cloaking and redirection: a preliminary study. In: Adversarial Information Retrieval on the Web (2005)"},{"key":"132_CR30","doi-asserted-by":"crossref","unstructured":"Wu, B., Davison, B.D.: Identifying link farm spam pages. In: 14th International World Wide Web Conference (WWW) (2005)","DOI":"10.1145\/1062745.1062762"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-009-0132-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-009-0132-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-009-0132-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T20:28:59Z","timestamp":1739305739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-009-0132-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,22]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["132"],"URL":"https:\/\/doi.org\/10.1007\/s11416-009-0132-6","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,8,22]]}}}