{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:11:15Z","timestamp":1775283075448,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,5,8]],"date-time":"2007-05-08T00:00:00Z","timestamp":1178582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,5,8]]},"DOI":"10.1145\/1242572.1242612","type":"proceedings-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:31Z","timestamp":1181140651000},"page":"291-300","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["Spam double-funnel"],"prefix":"10.1145","author":[{"given":"Yi-Min","family":"Wang","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]},{"given":"Ming","family":"Ma","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]},{"given":"Yuan","family":"Niu","sequence":"additional","affiliation":[{"name":"University of California: Davis, Davis, CA"}]},{"given":"Hao","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California: Davis, Davis, CA"}]}],"member":"320","published-online":{"date-parts":[[2007,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Adali S.","year":"2005","unstructured":"Adali , S. , Liu , T. , and Magdon-Ismail , M . Optimal Link Bombs are Uncoordinated . In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , May 2005 . Adali, S., Liu, T., and Magdon-Ismail, M. Optimal Link Bombs are Uncoordinated. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), May 2005."},{"key":"e_1_3_2_1_2_1","volume-title":"Pagerank Increase Under Different Collusion Topologies. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Baeza-Yates R","year":"2005","unstructured":"Baeza-Yates , R , Castillo , C. , and Lopez , V . Pagerank Increase Under Different Collusion Topologies. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , May 2005 . Baeza-Yates, R, Castillo, C., and Lopez, V. Pagerank Increase Under Different Collusion Topologies. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), May 2005."},{"key":"e_1_3_2_1_3_1","volume-title":"R. Link-based Characterization and Detection of Web Spam. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Becchetti L.","year":"2006","unstructured":"Becchetti , L. , Castillo , C. , Donato , D. , Leonardi , S. , Baeza-Yates , R. Link-based Characterization and Detection of Web Spam. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , August 2006 . Becchetti, L., Castillo, C., Donato, D., Leonardi, S., Baeza-Yates, R. Link-based Characterization and Detection of Web Spam. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), August 2006."},{"key":"e_1_3_2_1_4_1","volume-title":"the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Benczur A.","year":"2005","unstructured":"Benczur , A. , Csalogany , K. , Sarlos , T. , and Uher , M . SpamRank -- Fully Automatic Link Spam Detection . In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , May 2005 . Benczur, A., Csalogany, K., Sarlos, T., and Uher, M. SpamRank -- Fully Automatic Link Spam Detection. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), May 2005."},{"key":"e_1_3_2_1_5_1","volume-title":"Improving Cloaking Detection Using Search Query Popularity and Monetizability. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Chellapilla K.","year":"2006","unstructured":"Chellapilla , K. and Chickering , D.M . Improving Cloaking Detection Using Search Query Popularity and Monetizability. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , August 2006 . Chellapilla, K. and Chickering, D.M. Improving Cloaking Detection Using Search Query Popularity and Monetizability. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), August 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135793"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1017074.1017077"},{"key":"e_1_3_2_1_8_1","volume-title":"Web Spam Taxonomy. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Gyongyi Z.","year":"2005","unstructured":"Gyongyi , Z. and Garcia-Molina , H . Web Spam Taxonomy. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , 2005 . Gyongyi, Z. and Garcia-Molina, H. Web Spam Taxonomy. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), 2005."},{"key":"e_1_3_2_1_9_1","volume-title":"Adversarial Informaton Retrieval Aspects of Sponsored Search. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Jansen B.J.","year":"2006","unstructured":"Jansen , B.J. Adversarial Informaton Retrieval Aspects of Sponsored Search. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , 2006 . Jansen, B.J. Adversarial Informaton Retrieval Aspects of Sponsored Search. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), 2006."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345545"},{"key":"e_1_3_2_1_11_1","volume-title":"SVMs for the Blogosphere: Blog Identification and Splog Detection. In AAAI Spring Symposium on Computational Approaches to Analysing Weblogs","author":"Kolari P.","year":"2006","unstructured":"Kolari , P. , Tim Finin , T. , and Joshi , A . SVMs for the Blogosphere: Blog Identification and Splog Detection. In AAAI Spring Symposium on Computational Approaches to Analysing Weblogs , March 2006 . Kolari, P., Tim Finin, T., and Joshi, A. SVMs for the Blogosphere: Blog Identification and Splog Detection. In AAAI Spring Symposium on Computational Approaches to Analysing Weblogs, March 2006."},{"key":"e_1_3_2_1_12_1","volume-title":"Web Spam Detection and Anti-Trust Rank. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Krishnan V.","year":"2006","unstructured":"Krishnan , V. and Raj , R . Web Spam Detection and Anti-Trust Rank. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , August 2006 . Krishnan, V. and Raj, R. Web Spam Detection and Anti-Trust Rank. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), August 2006."},{"key":"e_1_3_2_1_13_1","volume-title":"Propaganda and Trust. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Metaxas P.","year":"2005","unstructured":"Metaxas , P. and DeStephano , J. Web Spam , Propaganda and Trust. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , May 2005 . Metaxas, P. and DeStephano, J. Web Spam, Propaganda and Trust. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), May 2005."},{"key":"e_1_3_2_1_14_1","volume-title":"Blocking Blog Spam with Language Model Disagreement. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Mishne G.","year":"2005","unstructured":"Mishne , G. , Carmel , D. , and Lempel , R . Blocking Blog Spam with Language Model Disagreement. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , May 2005 . Mishne, G., Carmel, D., and Lempel, R. Blocking Blog Spam with Language Model Disagreement. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), May 2005."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. Network and Distributed System Security (NDSS) Symposium","author":"Niu Y.","year":"2007","unstructured":"Niu , Y. , Wang , Y. M. , Chen , H. , Ma , M. , and Hsu , F . A Quantitative Study of Forum Spamming Using Context-based Analysis . In Proc. Network and Distributed System Security (NDSS) Symposium , February 2007 . Niu, Y., Wang, Y. M., Chen, H., Ma, M., and Hsu, F. A Quantitative Study of Forum Spamming Using Context-based Analysis. In Proc. Network and Distributed System Security (NDSS) Symposium, February 2007."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062783"},{"key":"e_1_3_2_1_18_1","volume-title":"P. Tracking Web Spam with Hidden Style Similarity. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Urvoy T.","year":"2006","unstructured":"Urvoy , T. , Lavernge , T. , Filoche , P. Tracking Web Spam with Hidden Style Similarity. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , August 2006 . Urvoy, T., Lavernge, T., Filoche, P. Tracking Web Spam with Hidden Style Similarity. In the 2nd International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), August 2006."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. Network and Distributed System Security (NDSS) Symposium","author":"Wang Y. M.","year":"2006","unstructured":"Wang , Y. M. , Beck , D. , Jiang , X. , Roussev , R. , Verbowski , C. , Chen , S. , and King , S . Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities . In Proc. Network and Distributed System Security (NDSS) Symposium , February 2006 . Wang, Y. M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., and King, S. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In Proc. Network and Distributed System Security (NDSS) Symposium, February 2006."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)","author":"Wang Y. M.","year":"2006","unstructured":"Wang , Y. M. , Beck , D. , Wang , J. , Verbowski , C. , and Daniels , B . Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting . In Proc. 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI) , July 2006 . Wang, Y. M., Beck, D., Wang, J., Verbowski, C., and Daniels, B. Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting. In Proc. 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), July 2006."},{"key":"e_1_3_2_1_23_1","volume-title":"Cloaking and Redirection: A Preliminary Study. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"Wu B.","year":"2005","unstructured":"Wu , B. and Davison , B.D . Cloaking and Redirection: A Preliminary Study. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) , 2005 . Wu, B. and Davison, B.D. Cloaking and Redirection: A Preliminary Study. In the 1st International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), 2005."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062762"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135901"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. Models of Trust for the Web Workshop (MTW), International World Wide Web Conference","author":"Wu B.","year":"2006","unstructured":"Wu , B. , Goel , V. , Davison , B.D. Propagating Trust and Distrust to Demote Web Spam . In Proc. Models of Trust for the Web Workshop (MTW), International World Wide Web Conference , 2006 . Wu, B., Goel, V., Davison, B.D. Propagating Trust and Distrust to Demote Web Spam. In Proc. Models of Trust for the Web Workshop (MTW), International World Wide Web Conference, 2006."},{"key":"e_1_3_2_1_27_1","unstructured":"Fiddler HTTP Proxy http:\/\/www.fiddlertool.com\/  Fiddler HTTP Proxy http:\/\/www.fiddlertool.com\/"},{"key":"e_1_3_2_1_28_1","unstructured":"Fighting Splogs http:\/\/fightsplog.blogspot.com\/  Fighting Splogs http:\/\/fightsplog.blogspot.com\/"},{"key":"e_1_3_2_1_29_1","unstructured":"The Google AdSense Program http:\/\/google.com\/adsense  The Google AdSense Program http:\/\/google.com\/adsense"},{"key":"e_1_3_2_1_30_1","unstructured":"Network Whois records http:\/\/whois.domaintools.com\/ 66.230.138.211 and http:\/\/whois.domaintools.com\/64.111.214.154  Network Whois records http:\/\/whois.domaintools.com\/ 66.230.138.211 and http:\/\/whois.domaintools.com\/64.111.214.154"},{"key":"e_1_3_2_1_31_1","unstructured":"Screenshots of sample redirection spam pages http:\/\/research.microsoft.com\/SearchRanger\/Redirection-spam_3_types.htm  Screenshots of sample redirection spam pages http:\/\/research.microsoft.com\/SearchRanger\/Redirection-spam_3_types.htm"},{"key":"e_1_3_2_1_32_1","unstructured":"Screenshots of sample click-through analyses http:\/\/research.microsoft.com\/SearchRanger\/Spam_ads_click-through_analysis.htm  Screenshots of sample click-through analyses http:\/\/research.microsoft.com\/SearchRanger\/Spam_ads_click-through_analysis.htm"}],"event":{"name":"WWW'07: 16th International World Wide Web Conference","location":"Banff Alberta Canada","acronym":"WWW'07","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 16th international conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1242572.1242612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1242572.1242612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:53Z","timestamp":1750258073000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1242572.1242612"}},"subtitle":["connecting web spammers with advertisers"],"short-title":[],"issued":{"date-parts":[[2007,5,8]]},"references-count":30,"alternative-id":["10.1145\/1242572.1242612","10.1145\/1242572"],"URL":"https:\/\/doi.org\/10.1145\/1242572.1242612","relation":{},"subject":[],"published":{"date-parts":[[2007,5,8]]},"assertion":[{"value":"2007-05-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}