{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T17:14:30Z","timestamp":1756574070360,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/icics.2011.6174239","type":"proceedings-article","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T17:57:10Z","timestamp":1333648630000},"page":"1-5","source":"Crossref","is-referenced-by-count":20,"title":["Sequence-based bot detection in massive multiplayer online games"],"prefix":"10.1109","author":[{"given":"C.","family":"Platzer","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"ARCEmu World of Warcraft Server Emulator","year":"2011","key":"17"},{"key":"15","article-title":"Binary codes capable of correcting deletions, insertions and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics Doklady"},{"journal-title":"WoW ZoloFighter Bot","year":"2009","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1103599.1103606"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2006.1593224"},{"key":"11","volume":"3809","author":"kim","year":"2005","journal-title":"Detection of Auto Programs for MMORPGs"},{"journal-title":"Exploiting Online Games Cheating Massively Distributed Systems","year":"2007","author":"hoglund","key":"12"},{"year":"2011","key":"3"},{"key":"2","article-title":"The life of the chinese gold farmer","author":"dibbell","year":"2007","journal-title":"Life"},{"volume":"6","journal-title":"Mmodata Charts Version 3 3","year":"2011","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1178823.1178829"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1517494.1517498"},{"key":"6","article-title":"Game bot detection based on avatar trajectory","author":"chen","year":"2009","journal-title":"Entertainment Computing - ICEC"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.78"},{"year":"2011","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1077246.1077255"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1324198.1324205"}],"event":{"name":"2011 8th International Conference on Information, Communications & Signal Processing (ICICS 2011)","start":{"date-parts":[[2011,12,13]]},"location":"Singapore","end":{"date-parts":[[2011,12,16]]}},"container-title":["2011 8th International Conference on Information, Communications &amp; Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6165552\/6173124\/06174239.pdf?arnumber=6174239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T19:29:11Z","timestamp":1490124551000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6174239\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icics.2011.6174239","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}