{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:37:35Z","timestamp":1775068655462,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T00:00:00Z","timestamp":1602201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T00:00:00Z","timestamp":1602201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11416-020-00368-6","type":"journal-article","created":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T10:03:13Z","timestamp":1602237793000},"page":"75-89","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Threats of price scraping on e-commerce websites: attack model and its detection using neural network"],"prefix":"10.1007","volume":"17","author":[{"given":"Rizwan Ur","family":"Rahman","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Deepak Singh","family":"Tomar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,10,9]]},"reference":[{"issue":"1\u20132","key":"368_CR1","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1023\/A:1009804230409","volume":"5","author":"JB Schafer","year":"2001","unstructured":"Schafer, J.B., Konstan, J.A., Riedl, J.: E-commerce recommendation applications. Data Min. Knowl. Discov. 5(1\u20132), 115\u2013153 (2001)","journal-title":"Data Min. Knowl. Discov."},{"key":"368_CR2","unstructured":"Marchany, R.C., Tront, J.G.: E-commerce security issues. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, January 2002, pp. 2500\u20132508. IEEE (2002)"},{"key":"368_CR3","doi-asserted-by":"crossref","unstructured":"Rahman, R.U., Tomar, D.S.: Botnet threats to e-commerce web applications and their detection. In: Improving E-Commerce Web Applications Through Business Intelligence Techniques, pp. 48\u201381. IGI Global (2018)","DOI":"10.4018\/978-1-5225-3646-8.ch003"},{"key":"368_CR4","unstructured":"eBay Inc and Bidder\u2019s Edge Inc (2000). http:\/\/www.tomwbell.com\/NetLaw\/Ch06\/eBay.html"},{"key":"368_CR5","unstructured":"Bad Bot Report (2019). https:\/\/resources.distilnetworks.com\/all-blog-posts\/bad-bot-report-2019-the-bot-arms-race-continues"},{"key":"368_CR6","unstructured":"Santos, J.M.A.: Real estate market data scraping and analysis for financial investments (2018)"},{"key":"368_CR7","unstructured":"Kaur, S., Singh, I.: An algorithm to eliminate noisy content from web pages. Doctoral dissertation, Lovely Professional University (2017)"},{"key":"368_CR8","first-page":"245","volume":"29","author":"KC Riley","year":"2018","unstructured":"Riley, K.C.: Data scraping as a cause of action: limiting use of the CFAA and trespass in online copying cases. Fordham Intell. Prop. Media Ent. Law J. 29, 245 (2018)","journal-title":"Fordham Intell. Prop. Media Ent. Law J."},{"key":"368_CR9","doi-asserted-by":"crossref","unstructured":"Salem, F.K.A., Al Feel, R., Elbassuoni, S., Jaber, M., Farah, M.: FA-KES: A fake news dataset around the Syrian war. In: Proceedings of the International AAAI Conference on Web and Social Media, July 2019, vol. 13, no. 01, pp. 573\u2013582 (2019)","DOI":"10.1609\/icwsm.v13i01.3254"},{"key":"368_CR10","unstructured":"Guerin, N.S.: Cross-language news article clustering. Doctoral dissertation (2017)"},{"key":"368_CR11","unstructured":"Goodman, N.: A survey of advances in botnet technologies (2017). arXiv:1702.01132"},{"key":"368_CR12","unstructured":"United States Court of Appeals (2001). http:\/\/www.internetlibrary.com\/pdf\/efculturaltravel-zefer-1-cir.pdf"},{"key":"368_CR13","unstructured":"A better deal for consumers in the digital age (2017). https:\/\/www.gov.uk\/government\/news\/a-better-deal-for-consumers-in-the-digital-age"},{"key":"368_CR14","unstructured":"Picotti, L., Salvadori, I.: National legislation implementing the convention on cybercrime-comparative analysis and good practices. Directorate General of Human Rights and Legal Affairs Council of Europe (2008)"},{"key":"368_CR15","doi-asserted-by":"crossref","unstructured":"Tan, P.N., Kumar, V.: Discovery of web robot sessions based on their navigational patterns. In: Intelligent Technologies for Information Analysis, pp. 193\u2013222. Springer, Berlin (2004)","DOI":"10.1007\/978-3-662-07952-2_9"},{"key":"368_CR16","unstructured":"Stassopoulou, A., Dikaiakos, M.D.: Crawler detection: a Bayesian approach. In:\u00a0International Conference on Internet Surveillance and Protection, 2006. ICISP\u201906, August 2006, pp. 16\u201316. IEEE"},{"key":"368_CR17","doi-asserted-by":"crossref","unstructured":"Bhattarai, A., Rus, V., Dasgupta, D.: Characterizing comment spam in the blogosphere through content analysis. In:\u00a0IEEE Symposium on\u00a0Computational Intelligence in Cyber Security, 2009. CICS\u201909, March 2009, pp. 37\u201344. IEEE","DOI":"10.1109\/CICYBS.2009.4925088"},{"key":"368_CR18","unstructured":"Gianvecchio, S., Xie, M., Wu, Z., Wang, H.: Measurement and classification of humans and bots in internet chat. In:\u00a0USENIX Security Symposium, July 2008,\u00a0pp. 155\u2013170 (2008)"},{"key":"368_CR19","doi-asserted-by":"crossref","unstructured":"Cabri, A., Suchacka, G., Rovetta, S., Masulli, F.: Online web bot detection using a sequential classification approach. In: 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), June 2018, pp. 1536\u20131540. IEEE (2018)","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00252"},{"key":"368_CR20","doi-asserted-by":"publisher","first-page":"28855","DOI":"10.1109\/ACCESS.2019.2901864","volume":"7","author":"P Shi","year":"2019","unstructured":"Shi, P., Zhang, Z., Choo, K.K.R.: Detecting malicious social bots based on clickstream sequences. IEEE Access 7, 28855\u201328862 (2019)","journal-title":"IEEE Access"},{"issue":"3","key":"368_CR21","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1002\/spe.892","volume":"39","author":"R Ierusalimschy","year":"2009","unstructured":"Ierusalimschy, R.: A text pattern-matching tool based on parsing expression grammars. Softw. Pract. Exp. 39(3), 221\u2013258 (2009)","journal-title":"Softw. Pract. Exp."},{"key":"368_CR22","doi-asserted-by":"crossref","unstructured":"Gunawan, R., Rahmatulloh, A., Darmawan, I., Firdaus, F.: Comparison of web scraping techniques: regular expression, HTML DOM and Xpath. In: 2018 International Conference on Industrial Enterprise and System Engineering (ICoIESE 2018), March 2019. Atlantis Press (2019)","DOI":"10.2991\/icoiese-18.2019.50"},{"issue":"4","key":"368_CR23","first-page":"1","volume":"10","author":"Z Zhao","year":"2013","unstructured":"Zhao, Z., Bebenita, M., Herman, D., Sun, J., Shen, X.: HPar: a practical parallel parser for HTML\u2013taming HTML complexities for parallel parsing. ACM Trans. Arch. Code Optim. (TACO) 10(4), 1\u201325 (2013)","journal-title":"ACM Trans. Arch. Code Optim. (TACO)"},{"key":"368_CR24","unstructured":"Behnel, S., Faassen, M., Bicking, I.: lxml: XML and HTML with Python (2005)"},{"key":"368_CR25","doi-asserted-by":"crossref","unstructured":"Rahman, R.U., Wadhwa, D., Bali, A., Tomar, D.S.: The emerging threats of web scrapping to web applications security and their defense mechanism. In: Encyclopedia of Criminal Activities and the Deep Web, pp. 788\u2013809. IGI Global (2020)","DOI":"10.4018\/978-1-5225-9715-5.ch053"},{"key":"368_CR26","doi-asserted-by":"crossref","unstructured":"Dhuria, S., Taneja, H., Taneja, K.: An optimal approach for extraction of web contents using semantic web framework. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, March 2016, p. 40. ACM (2016)","DOI":"10.1145\/2905055.2905246"},{"issue":"3","key":"368_CR27","first-page":"186","volume":"11","author":"NR Haddaway","year":"2015","unstructured":"Haddaway, N.R.: The use of web-scraping software in searching for grey literature. Grey J. 11(3), 186\u2013190 (2015)","journal-title":"Grey J."},{"key":"368_CR28","unstructured":"Sirisuriya, D.S.: A comparative study on web scraping (2015)"},{"key":"368_CR29","volume-title":"Learning Scrapy","author":"D Kouzis-Loukas","year":"2016","unstructured":"Kouzis-Loukas, D.: Learning Scrapy. Packt Publishing Ltd., Birmingham (2016)"},{"key":"368_CR30","doi-asserted-by":"crossref","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: International Conference on Information Security and Cryptology, pp. 186\u2013198. Springer, Berlin (2005)","DOI":"10.1007\/11734727_17"},{"key":"368_CR31","doi-asserted-by":"crossref","unstructured":"Rahman, R.U., Tomar, D.S.: Security attacks on wireless networks and their detection techniques. In:\u00a0Emerging Wireless Communication and Network Technologies, pp. 241\u2013270. Springer, Singapore (2018)","DOI":"10.1007\/978-981-13-0396-8_13"},{"issue":"11","key":"368_CR32","first-page":"17","volume":"35","author":"CM Zhang","year":"2010","unstructured":"Zhang, C.M., Chen, T.P., Zhang, X.Y., Zheng, L.Q.: A method of evaluating network system risk events probability based on attack tree. Huoli yu Zhihui Kongzhi 35(11), 17\u201319 (2010)","journal-title":"Huoli yu Zhihui Kongzhi"},{"key":"368_CR33","volume-title":"Getting Started with Beautiful Soup","author":"VG Nair","year":"2014","unstructured":"Nair, V.G.: Getting Started with Beautiful Soup. Packt Publishing Ltd., Birmingham (2014)"},{"key":"368_CR34","volume-title":"Python for Data Analysis: Data Wrangling with Pandas, NumPy, and IPython","author":"W McKinney","year":"2012","unstructured":"McKinney, W.: Python for Data Analysis: Data Wrangling with Pandas, NumPy, and IPython. O\u2019Reilly Media, Inc., Sebastopol (2012)"},{"issue":"5","key":"368_CR35","first-page":"45","volume":"3","author":"R Rahman","year":"2012","unstructured":"Rahman, R.: Survey on CAPTCHA systems. J. Glob. Res. Comput. Sci. 3(5), 45\u201353 (2012)","journal-title":"J. Glob. Res. Comput. Sci."},{"key":"368_CR36","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2011","unstructured":"Han, J., Pei, J., Kamber, M.: Data Mining: Concepts and Techniques. Elsevier, Amsterdam (2011)"},{"key":"368_CR37","first-page":"300943","volume":"33","author":"RU Rahman","year":"2020","unstructured":"Rahman, R.U., Tomar, D.S.: A new web forensic framework for bot crime investigation. Forens. Sci. Int. Dig. Invest. 33, 300943 (2020)","journal-title":"Forens. Sci. Int. Dig. Invest."},{"key":"368_CR38","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.asoc.2016.01.028","volume":"42","author":"F Li","year":"2016","unstructured":"Li, F., Qiao, J., Han, H., Yang, C.: A self-organizing cascade neural network with random weights for nonlinear system modeling. Appl. Soft Comput. 42, 184\u2013193 (2016)","journal-title":"Appl. Soft Comput."},{"key":"368_CR39","doi-asserted-by":"crossref","unstructured":"Sokolova, M., Japkowicz, N., Szpakowicz, S.: Beyond accuracy, F-score and ROC: a family of discriminant measures for performance evaluation. In: Australasian Joint Conference on Artificial Intelligence, December 2006, pp. 1015\u20131021. Springer, Berlin (2006)","DOI":"10.1007\/11941439_114"},{"key":"368_CR40","doi-asserted-by":"crossref","unstructured":"Sharaff, A., Gupta, H.: Extra-tree classifier with metaheuristics approach for email classification. In: Advances in Computer Communication and Computational Sciences, pp. 189\u2013197. Springer, Singapore (2019)","DOI":"10.1007\/978-981-13-6861-5_17"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-020-00368-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-020-00368-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-020-00368-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T19:50:49Z","timestamp":1669146649000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-020-00368-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,9]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["368"],"URL":"https:\/\/doi.org\/10.1007\/s11416-020-00368-6","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,9]]},"assertion":[{"value":"4 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}