{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:49:13Z","timestamp":1765370953022,"version":"3.46.0"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T00:00:00Z","timestamp":1752019200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T00:00:00Z","timestamp":1752019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s42044-025-00300-5","type":"journal-article","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:50:00Z","timestamp":1752141000000},"page":"2023-2048","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A polymorphic code generation engine with obfuscation techniques for protecting web bot attacks"],"prefix":"10.1007","volume":"8","author":[{"given":"Rizwan Ur","family":"Rahman","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Deepak Singh","family":"Tomar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pavan","family":"Kumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,7,9]]},"reference":[{"key":"300_CR1","doi-asserted-by":"publisher","first-page":"1684","DOI":"10.1109\/TIFS.2022.3170237","volume":"17","author":"A Cabri","year":"2022","unstructured":"Cabri, A., Masulli, F., Rovetta, S., Suchacka, G.: A quantum-inspired classifier for early web bot detection. IEEE Trans. Inf. Forensics Secur. 17, 1684\u20131697 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"300_CR2","doi-asserted-by":"publisher","first-page":"6662","DOI":"10.3390\/su15086662","volume":"15","author":"FK Alarfaj","year":"2023","unstructured":"Alarfaj, F.K., Ahmad, H., Khan, H.U., Alomair, A.M., Almusallam, N., Ahmed, M.: Twitter bot detection using diverse content features and applying machine learning algorithms. Sustainability 15(8), 6662 (2023)","journal-title":"Sustainability"},{"key":"300_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.107944","volume":"132","author":"PJ Dhanith","year":"2024","unstructured":"Dhanith, P.J., Saeed, K., Rohith, G., Raja, S.P.: Weakly supervised learning for an effective focused web crawler. Eng. Appl. Artif. Intell. 132, 107944 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"300_CR4","unstructured":"Sand, D.S.: A framework for scalable web data collection (2022)"},{"key":"300_CR5","unstructured":"eBay Inc, Bidder's Edge Inc: http:\/\/www.tomwbell.com\/NetLaw\/Ch06\/eBay.html (2000)"},{"key":"300_CR6","unstructured":"United States Court of Appeals: http:\/\/www.internetlibrary.com\/pdf\/efculturaltravel-zefer-1-cir.pdf (2001)"},{"key":"300_CR7","unstructured":"Non-Infringing Content Become Copyright Infringement. https:\/\/www.techdirt.com\/articles\/20090605\/2228205147.shtml (2009)"},{"key":"300_CR8","unstructured":"Convicted AT&T hacker. https:\/\/www.forbes.com\/sites\/andygreenberg\/2012\/11\/21\/security-researchers-cry-foul-over-conviction-of-att-ipad-hacker\/#370f896f6853 (2012)"},{"key":"300_CR9","unstructured":"Now you can have more chances to get tatkal seats, thanks to Railway's this action (2020). https:\/\/economictimes.indiatimes.com\/industry\/transportation\/railways\/indian-railways-roots-out-illegal-softwares-more-tatkal-tickets-for-passengers-now\/articleshow\/74193975.cms"},{"issue":"2","key":"300_CR10","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.1007\/s11831-021-09608-4","volume":"29","author":"M Kumar","year":"2022","unstructured":"Kumar, M., Jindal, M.K., Kumar, M.: A systematic survey on CAPTCHA recognition: types, creation and breaking techniques. Arch. Computat. Methods Eng. 29(2), 1107\u20131136 (2022)","journal-title":"Arch. Computat. Methods Eng."},{"key":"300_CR11","unstructured":"Bursztein, E., Bethard, S.: Decaptcha: breaking 75% of eBay audio CAPTCHAs. In: Proceedings of the 3rd USENIX Conference on Offensive Technologies, August, p. 8. USENIX Association (2009)"},{"key":"300_CR12","doi-asserted-by":"crossref","unstructured":"Kolomeets, M., Chechulin, A.: Analysis of the malicious bots market. In: 2021 29th Conference of Open Innovations Association (FRUCT), pp. 199\u2013205. IEEE (2021)","DOI":"10.23919\/FRUCT52173.2021.9435421"},{"key":"300_CR13","volume-title":"Generation Robot: A Century of Science Fiction, Fact, and Speculation","author":"T Favro","year":"2018","unstructured":"Favro, T.: Generation Robot: A Century of Science Fiction, Fact, and Speculation. Simon and Schuster (2018)"},{"key":"300_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-021-11533-4","volume":"81","author":"S Almahmoud","year":"2022","unstructured":"Almahmoud, S., Hammo, B., Al-Shboul, B., Obeid, N.: A hybrid approach for identifying non-human traffic in online digital advertising. Multimedia Tools Appl. 81, 1\u201334 (2022)","journal-title":"Multimedia Tools Appl."},{"key":"300_CR15","doi-asserted-by":"crossref","unstructured":"Rahman, R.U., Tomar, D.S.: Botnet threats to E-Commerce web applications and their detection. In: Improving E-Commerce Web Applications Through Business Intelligence Techniques, pp. 48\u201381. IGI Global (2018)","DOI":"10.4018\/978-1-5225-3646-8.ch003"},{"key":"300_CR16","doi-asserted-by":"crossref","unstructured":"Li, X., Azad, B.A., Rahmati, A., Nikiforakis, N.: Good bot, bad bot: characterizing automated browsing activity. In: 2021 IEEE Symposium on Security and Privacy (sp), May, pp. 1589\u20131605. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00079"},{"key":"300_CR17","doi-asserted-by":"publisher","first-page":"141292","DOI":"10.1109\/ACCESS.2020.3012969","volume":"8","author":"P Lewandowski","year":"2020","unstructured":"Lewandowski, P., Janiszewski, M., Felkner, A.: SpiderTrap\u2014an innovative approach to analyze activity of Internet bots on a website. IEEE Access 8, 141292\u2013141309 (2020)","journal-title":"IEEE Access"},{"key":"300_CR18","unstructured":"Shaw, J., Tsemekhman, K.: Combating Fraud in Online Advertising (2014)"},{"key":"300_CR19","unstructured":"Stiansen, T., Glines, S.M., Foss, S.H., Jr.: U.S. Patent No. 9553888. U.S. Patent and Trademark Office, Washington, DC (2017)"},{"issue":"1","key":"300_CR20","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s11416-020-00368-6","volume":"17","author":"RU Rahman","year":"2021","unstructured":"Rahman, R.U., Tomar, D.S.: Threats of price scraping on e-commerce websites: attack model and its detection using neural network. J. Comput. Virol. Hacking Tech. 17(1), 75\u201389 (2021)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"300_CR21","doi-asserted-by":"crossref","unstructured":"Rahman, R.U., Verma, R., Bansal, H., Tomar, D.S.: Classification of spamming attacks to blogging websites and their security techniques. In: Encyclopedia of Criminal Activities and the Deep Web, pp. 864\u2013880. IGI Global (2020)","DOI":"10.4018\/978-1-5225-9715-5.ch058"},{"issue":"5","key":"300_CR22","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.3390\/electronics12051229","volume":"12","author":"EA Altulaihan","year":"2023","unstructured":"Altulaihan, E.A., Alismail, A., Frikha, M.: A survey on web application penetration testing. Electronics 12(5), 1229 (2023)","journal-title":"Electronics"},{"key":"300_CR23","doi-asserted-by":"crossref","unstructured":"Tan, P.N., Kumar, V.: Discovery of web robot sessions based on their navigational patterns. In: Intelligent Technologies for Information Analysis, pp. 193\u2013222. Springer, Berlin (2004)","DOI":"10.1007\/978-3-662-07952-2_9"},{"key":"300_CR24","doi-asserted-by":"crossref","unstructured":"Sadeghpour, S., Vlajic, N.: ReBotDetector: A Detection Model with LSTM Feature Extractor for Session-Replay Web Bot Attacks. In: 2024 IEEE International Conference on Cyber Security and Resilience (CSR), September, pp. 16\u201321. IEEE (2024)","DOI":"10.1109\/CSR61664.2024.10679505"},{"key":"300_CR25","doi-asserted-by":"crossref","unstructured":"Llamas, J.M., Preuveneers, D., Joosen, W.: Poster: Robust Edge-Based Detection of Bot Attacks Through Federated Learning. In: 2024 IEEE\/ACM Symposium on Edge Computing (SEC), December, pp. 542\u2013544. IEEE (2024)","DOI":"10.1109\/SEC62691.2024.00073"},{"key":"300_CR26","doi-asserted-by":"crossref","unstructured":"Yasuhara, K., Kodama, N., Saito, T.: Challenges in Web Bot Detection and Detection Evasion Technologies. In: International Conference on Network-Based Information Systems, September, pp. 162\u2013173. Springer Nature Switzerland, Cham (2024)","DOI":"10.1007\/978-3-031-72325-4_16"},{"key":"300_CR27","unstructured":"Gianvecchio, S., Xie, M., Wu, Z., Wang, H.: Measurement and Classification of Humans and Bots in Internet Chat. In: USENIX Security Symposium, July, pp. 155\u2013170 (2008)"},{"key":"300_CR28","unstructured":"Lagopoulos, A., Tsoumakas, G., Papadopoulos, G.: Web Robot Detection in Academic Publishing. arXiv preprint arXiv:1711.05098 (2017)"},{"key":"300_CR29","doi-asserted-by":"crossref","unstructured":"Pathirage, G.S., Manathunga, K.: Machine Learning and Browser Fingerprinting Based Approach for Web Bot Detection. In: 2024 6th International Conference on Advancements in Computing (ICAC), December, pp. 175\u2013180. IEEE (2024)","DOI":"10.1109\/ICAC64487.2024.10850990"},{"key":"300_CR30","doi-asserted-by":"crossref","unstructured":"Spyros, A., Koritsas, I., Papoutsis, A., Panagiotou, P., Chatzakou, D., Kavallieros, D., Tsikrika, T., Vrochidis, S., Kompatsiaris, I.: AI-based Holistic Framework for Cyber Threat Intelligence Management. IEEE Access (2025)","DOI":"10.1109\/ACCESS.2025.3533084"},{"issue":"10","key":"300_CR31","doi-asserted-by":"publisher","first-page":"363","DOI":"10.3390\/fi16100363","volume":"16","author":"K Sim","year":"2024","unstructured":"Sim, K., Heo, H., Cho, H.: Combating web tracking: analyzing web tracking technologies for user privacy. Future Internet 16(10), 363 (2024)","journal-title":"Future Internet"},{"key":"300_CR32","doi-asserted-by":"crossref","unstructured":"Malashin, I. P., Tynchenko, V. S., Gantimurov, A. P., Neluyb, V. A., & Borodulin, A. S. (2024). Detecting of Robotic Imitation of Human on-the-Website Activity with Advanced Vector Analysis and Fractional Derivatives. IEEE Access..","DOI":"10.1109\/ACCESS.2024.3391377"},{"issue":"18","key":"300_CR33","doi-asserted-by":"publisher","first-page":"3840","DOI":"10.3390\/app9183840","volume":"9","author":"B Cervantes","year":"2019","unstructured":"Cervantes, B., G\u00f3mez, F., Monroy, R., Loyola-Gonz\u00e1lez, O., Medina-P\u00e9rez, M.A., Ram\u00edrez-M\u00e1rquez, J.: Pattern-based and visual analytics for visitor analysis on websites. Appl. Sci. 9(18), 3840 (2019)","journal-title":"Appl. Sci."},{"key":"300_CR34","unstructured":"Acien, A., Morales, A., Fierrez, J., Vera-Rodriguez, R.: BeCAPTCHA-Mouse: synthetic mouse trajectories and improved bot detection. arXiv preprint arXiv:2005.00890 (2020)"},{"key":"300_CR35","doi-asserted-by":"publisher","first-page":"107074","DOI":"10.1016\/j.knosys.2021.107074","volume":"223","author":"G Suchacka","year":"2021","unstructured":"Suchacka, G., Cabri, A., Rovetta, S., Masulli, F.: Efficient on-the-fly Web bot detection. Knowl. Based Syst. 223, 107074 (2021)","journal-title":"Knowl. Based Syst."},{"issue":"1","key":"300_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-020-00713-z","volume":"11","author":"B Bebensee","year":"2021","unstructured":"Bebensee, B., Nazarov, N., Zhang, B.T.: Leveraging node neighborhoods and egograph topology for better bot detection in social graphs. Soc. Netw. Anal. Min. 11(1), 1\u201314 (2021)","journal-title":"Soc. Netw. Anal. Min."},{"key":"300_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102001","volume":"97","author":"RU Rahman","year":"2020","unstructured":"Rahman, R.U., Tomar, D.S.: New biostatistics features for detecting web bot activity on web applications. Comput. Secur. 97, 102001 (2020)","journal-title":"Comput. Secur."},{"key":"300_CR38","doi-asserted-by":"crossref","unstructured":"Beheshti, S.M.R.S., Liatsis, P.: CAPTCHA Usability and Performance, How to Measure the Usability Level of Human Interactive Applications Quantitatively and Qualitatively? In: 2015 International Conference on Developments of E-Systems Engineering (DeSE), December, pp. 131\u2013136. IEEE (2015)","DOI":"10.1109\/DeSE.2015.23"},{"issue":"2","key":"300_CR39","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.displa.2010.12.004","volume":"32","author":"YL Lee","year":"2011","unstructured":"Lee, Y.L., Hsu, C.H.: Usability study of text-based CAPTCHAs. Displays 32(2), 81\u201386 (2011)","journal-title":"Displays"},{"key":"300_CR40","doi-asserted-by":"crossref","unstructured":"Bursztein, E., Martin, M., Mitchell, J.: Text-based CAPTCHA strengths and weaknesses. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, October, pp. 125\u2013138 (2011)","DOI":"10.1145\/2046707.2046724"},{"key":"300_CR41","unstructured":"von Ahn, L., Blum, M., Hopper, N., Langford, J., Manber, U.: The CAPTCHA Project, Carnegie Mellon University, 2000\u20132004 [Online]. Available from: http:\/\/www.captcha.net\/captchas\/gimpy\/. Accessed 31 Jan 2013"},{"key":"300_CR42","unstructured":"Mori, G., Malik, J.: Recognizing objects in adversarial clutter: breaking a visual CAPTCHA. In: 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Proceedings, June, vol. 1, pp. I-I. IEEE (2003)"},{"key":"300_CR43","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: A Low-cost Attack on a Microsoft CAPTCHA. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, October, pp. 543\u2013554 (2008)","DOI":"10.1145\/1455770.1455839"},{"key":"300_CR44","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.cose.2014.05.004","volume":"45","author":"VD Nguyen","year":"2014","unstructured":"Nguyen, V.D., Chow, Y.W., Susilo, W.: On the security of text-based 3D CAPTCHAs. Comput. Secur. 45, 84\u201399 (2014)","journal-title":"Comput. Secur."},{"issue":"5","key":"300_CR45","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1016\/j.cose.2009.12.003","volume":"29","author":"Y Soupionis","year":"2010","unstructured":"Soupionis, Y., Gritzalis, D.: Audio CAPTCHA: existing solutions assessment and a new implementation for VoIP telephony. Comput. Secur. 29(5), 603\u2013618 (2010)","journal-title":"Comput. Secur."},{"key":"300_CR46","doi-asserted-by":"crossref","unstructured":"Lv, Y., Cai, F., Lin, D., Cao, D.: Chinese character CAPTCHA recognition based on convolution neural network. In: 2016 IEEE Congress on Evolutionary Computation (CEC), July, pp. 4854\u20134859. IEEE (2016)","DOI":"10.1109\/CEC.2016.7744412"},{"key":"300_CR47","doi-asserted-by":"crossref","unstructured":"Garg, G., Pollett, C.: Neural network captcha crackers. In: 2016 Future Technologies Conference (FTC), December, pp. 853\u2013861. IEEE (2016)","DOI":"10.1109\/FTC.2016.7821703"},{"key":"300_CR48","doi-asserted-by":"crossref","unstructured":"Aiken, W., Kim, H.: POSTER: DeepCRACk: Using deep learning to automatically crack audio CAPTCHAs. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, May, pp. 797\u2013799 (2018)","DOI":"10.1145\/3196494.3201581"},{"key":"300_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, N., Ebrahimi, M., Li, W., Chen, H.: A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web. In: 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), November, pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ISI49825.2020.9280537"},{"key":"300_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101635","volume":"88","author":"FH Alqahtani","year":"2020","unstructured":"Alqahtani, F.H., Alsulaiman, F.A.: Is image-based CAPTCHA secure against attacks based on machine learning? An experimental study. Comput. Secur. 88, 101635 (2020)","journal-title":"Comput. Secur."},{"issue":"20","key":"300_CR51","doi-asserted-by":"publisher","first-page":"13333","DOI":"10.1007\/s00521-021-05957-0","volume":"33","author":"O Bostik","year":"2021","unstructured":"Bostik, O., Horak, K., Kratochvila, L., Zemcik, T., Bilik, S.: Semi-supervised deep learning approach to break common CAPTCHAs. Neural Comput. Appl. 33(20), 13333\u201313343 (2021)","journal-title":"Neural Comput. Appl."},{"issue":"4","key":"300_CR52","doi-asserted-by":"publisher","first-page":"480","DOI":"10.3390\/electronics10040480","volume":"10","author":"S Dankwa","year":"2021","unstructured":"Dankwa, S., Yang, L.: An efficient and accurate depth-wise separable convolutional neural network for cybersecurity vulnerability assessment based on CAPTCHA breaking. Electronics 10(4), 480 (2021)","journal-title":"Electronics"},{"issue":"2","key":"300_CR53","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1049\/ise2.12047","volume":"16","author":"J Nian","year":"2022","unstructured":"Nian, J., Wang, P., Gao, H., Guo, X.: A deep learning-based attack on text CAPTCHAs by using object detection techniques. IET Inf. Secur. 16(2), 97\u2013110 (2022)","journal-title":"IET Inf. Secur."},{"key":"300_CR54","doi-asserted-by":"crossref","unstructured":"Deng, X., Zhao, R., Wang, Y., Chen, L., Wang, Y., Xue, Z.: 3E-Solver: An Effortless, Easy-to-Update, and End-to-End Solver with Semi-Supervised Learning for Breaking Text-Based Captchas. In: Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, pp. 3817\u20133824 (2022)","DOI":"10.24963\/ijcai.2022\/530"},{"issue":"2","key":"300_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3505226","volume":"13","author":"N Zhang","year":"2022","unstructured":"Zhang, N., Ebrahimi, M., Li, W., Chen, H.: Counteracting dark Web text-based CAPTCHA with generative adversarial learning for proactive cyber threat intelligence. ACM Trans. Manag. Inf. Syst. (TMIS) 13(2), 1\u201321 (2022)","journal-title":"ACM Trans. Manag. Inf. Syst. (TMIS)"},{"key":"300_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3584974","volume":"4","author":"RS Bhowmick","year":"2023","unstructured":"Bhowmick, R.S., Indra, R., Ganguli, I., Paul, J., Sil, J.: Breaking CAPTCHA system with minimal exertion through deep learning: real-time risk assessment on Indian government websites. Digit. Threats: Res. Pract. 4, 1\u201324 (2023)","journal-title":"Digit. Threats: Res. Pract."},{"key":"300_CR57","doi-asserted-by":"crossref","unstructured":"Terada, K., Okabe, Y., & Matsumoto, Y.: Is Puzzle-Based CAPTCHA Secure Against Attacks Based on CNN? In: 2023 International Conference on Information Networking (ICOIN), January, pp. 358\u2013362. IEEE (2023)","DOI":"10.1109\/ICOIN56518.2023.10049032"},{"key":"300_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00500-023-07844-3","volume":"27","author":"M Kumar","year":"2023","unstructured":"Kumar, M., Jindal, M.K., Kumar, M.: An efficient technique for breaking of coloured Hindi CAPTCHA. Soft. Comput. 27, 1\u201326 (2023)","journal-title":"Soft. Comput."},{"key":"300_CR59","unstructured":"Walia, J.S.: Vulnerability analysis of captcha using Deep learning. arXiv preprint arXiv:2302.09389 (2023)"},{"key":"300_CR60","unstructured":"Khatavkar, V., Velankar, M., Petkar, S.: Segmentation-free Connectionist Temporal Classification loss based OCR Model for Text Captcha Classification. arXiv e-prints, arXiv-2402 (2024)"},{"key":"300_CR61","doi-asserted-by":"crossref","unstructured":"Edgar, M.: Total requests and transfer size. In: Speed Metrics Guide: Choosing the Right Metrics to Use When Evaluating Websites, pp. 53\u201371. Apress, Berkeley, CA (2024)","DOI":"10.1007\/979-8-8688-0155-6_4"},{"key":"300_CR62","doi-asserted-by":"crossref","unstructured":"Viticchi\u00e9, A., Regano, L., Torchiano, M., Basile, C., Ceccato, M., Tonella, P., Tiella, R.: Assessment of source code obfuscation techniques. In: 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), October, pp. 11\u201320. IEEE (2016)","DOI":"10.1109\/SCAM.2016.17"},{"key":"300_CR63","doi-asserted-by":"crossref","unstructured":"Courouss\u00e9, D., Barry, T., Robisson, B., Belleville, N., Jaillon, P., Potin, O., Heydemann, K.: All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems. In: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, January, pp. 17\u201318 (2018)","DOI":"10.1145\/3178291.3178296"},{"key":"300_CR64","doi-asserted-by":"crossref","unstructured":"Zhang, N., Feng, Z., Xu, D.: An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation. In: International Conference on Applied Cryptography and Network Security, February, pp. 217\u2013240. Springer Nature Switzerland, Cham (2024)","DOI":"10.1007\/978-3-031-54776-8_9"},{"key":"300_CR65","unstructured":"Elshheibia, T.A., Mohamed, M.I., Almahdi, A.M.: WEB Applications Vulnerability Analysis and prevention (2024)"},{"key":"300_CR66","unstructured":"Khalil, M.M., Ghazi, H.M., Habib, M.I., Shahzad, F., Elahi, A.I.: Guideline for selecting the Right Content Management System (RCMS) for Web development: a comprehensive approach. J. Comput. Biomed. Inform. (2024)"},{"key":"300_CR67","doi-asserted-by":"crossref","unstructured":"Priyanka, D.: Educational Technology and Libraries Supporting Online\/Digital Learning with the ASP. NET MVC Framework. In: AI-Assisted Library Reconstruction, pp. 191\u2013208. IGI Global (2024)","DOI":"10.4018\/979-8-3693-2782-1.ch011"},{"issue":"1","key":"300_CR68","doi-asserted-by":"publisher","first-page":"211","DOI":"10.32996\/jcsts.2024.6.1.24","volume":"6","author":"A Naik","year":"2024","unstructured":"Naik, A.: The Front-End Dilemma: How to Choose the Perfect Technology for your Application. J. Comput. Sci. Technol. Stud. 6(1), 211\u2013216 (2024)","journal-title":"J. Comput. Sci. Technol. Stud."},{"issue":"5","key":"300_CR69","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1109\/TVCG.2006.143","volume":"12","author":"P Lindstrom","year":"2006","unstructured":"Lindstrom, P., Isenburg, M.: Fast and efficient compression of floating-point data. IEEE Trans. Visual Comput. Graph. 12(5), 1245\u20131250 (2006)","journal-title":"IEEE Trans. Visual Comput. Graph."},{"key":"300_CR70","unstructured":"Sadeghpour, S.: Machine Learning-Based Defense Against Advanced Session-Replay Web Bots (2024)"},{"issue":"9","key":"300_CR71","doi-asserted-by":"publisher","first-page":"5367","DOI":"10.3390\/app13095367","volume":"13","author":"R Sun","year":"2023","unstructured":"Sun, R., Zhu, Y., Fei, J., Chen, X.: A survey on moving target defense: Intelligently affordable, optimized and self-adaptive. Appl. Sci. 13(9), 5367 (2023)","journal-title":"Appl. Sci."},{"key":"300_CR72","doi-asserted-by":"crossref","unstructured":"Rahman, R. U., Wadhwa, D., Bali, A., & Tomar, D. S. (2020). The Emerging Threats of Web Scrapping to Web Applications Security and Their Defense Mechanism. In Encyclopedia of Criminal Activities and the Deep Web (pp. 788\u2013809). IGI Global.","DOI":"10.4018\/978-1-5225-9715-5.ch053"},{"key":"300_CR73","doi-asserted-by":"crossref","unstructured":"Jonker, H., Krumnow, B., Vlot, G.: Fingerprint surface-based detection of web bot detectors. In: European Symposium on Research in Computer Security, September, pp. 586\u2013605. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-29962-0_28"},{"issue":"3","key":"300_CR74","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSP.2009.78","volume":"7","author":"S Mitterhofer","year":"2009","unstructured":"Mitterhofer, S., Kruegel, C., Kirda, E., Platzer, C.: Server-side bot detection in massively multiplayer online games. IEEE Secur. Priv. 7(3), 29\u201336 (2009)","journal-title":"IEEE Secur. Priv."},{"key":"300_CR75","doi-asserted-by":"crossref","unstructured":"Jang, D.I., Kim, M., Jung, H.C., Noh, B.N.: Analysis of HTTP2P botnet: case study waledac. In: 2009 IEEE 9th Malaysia International Conference on Communications (Micc), December, pp. 409\u2013412. IEEE (2009)","DOI":"10.1109\/MICC.2009.5431541"},{"key":"300_CR76","unstructured":"List of Common Good and Bad Crawling Bots. Available online: https:\/\/simtechdev.com\/blog\/good-and-bad-bots-to-control-to-save-server-resources-and-improve-performance\/ (2021)"},{"key":"300_CR77","doi-asserted-by":"crossref","unstructured":"Hsiao, S.W., Chen, Y.N., Sun, Y.S., Chen, M.C.: Combining dynamic passive analysis and active fingerprinting for effective bot malware detection in virtualized environments. In: International Conference on Network and System Security, June, pp. 699\u2013706. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-38631-2_59"},{"key":"300_CR78","unstructured":"Orihuela Rodr\u00edguez, D.: Malware and spy systems hybrid botnet over TOR (2020)"},{"key":"300_CR79","unstructured":"How many people are missing out on JavaScript enhancement? https:\/\/gds.blog.gov.uk\/2013\/10\/21\/how-many-people-are-missing-out-on-javascript-enhancement\/ (2013)"}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-025-00300-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42044-025-00300-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-025-00300-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:09:23Z","timestamp":1765357763000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42044-025-00300-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,9]]},"references-count":79,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["300"],"URL":"https:\/\/doi.org\/10.1007\/s42044-025-00300-5","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"type":"print","value":"2520-8438"},{"type":"electronic","value":"2520-8446"}],"subject":[],"published":{"date-parts":[[2025,7,9]]},"assertion":[{"value":"4 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}