{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:59:29Z","timestamp":1750309169050,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,26]],"date-time":"2008-10-26T00:00:00Z","timestamp":1224979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,26]]},"DOI":"10.1145\/1458082.1458128","type":"proceedings-article","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T12:59:40Z","timestamp":1226408380000},"page":"329-338","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Spam characterization and detection in peer-to-peer file-sharing systems"],"prefix":"10.1145","author":[{"given":"Dongmei","family":"Jia","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Wai Gen","family":"Yee","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Ophir","family":"Frieder","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177125"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064009.1064017"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498344"},{"key":"e_1_3_2_1_4_1","volume-title":"Spam Detection: A Syntax and Semantic-based Approach. In proc. International Conf. on Information and Knowledge Engineering (IKE'06)","author":"Hashemi R.","year":"2006","unstructured":"R. Hashemi , M. Bahar , K. D. Tift , and H. Nguyen . Spam Detection: A Syntax and Semantic-based Approach. In proc. International Conf. on Information and Knowledge Engineering (IKE'06) , Las Vegas, Nevada , June 2006 . R. Hashemi, M. Bahar, K. D. Tift, and H. Nguyen. Spam Detection: A Syntax and Semantic-based Approach. In proc. International Conf. on Information and Knowledge Engineering (IKE'06), Las Vegas, Nevada, June 2006."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099671"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244408.1244412"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.232"},{"volume-title":"Proc. IPTPS'06","author":"Lee Uichin","key":"e_1_3_2_1_9_1","unstructured":"Uichin Lee , Min Choi , Junghoo Cho , Medy. Y. Sanadidi , Mario Gerla . Understanding Pollution Dynamics in P2P File Sharing . In Proc. IPTPS'06 . Uichin Lee, Min Choi, Junghoo Cho, Medy. Y. Sanadidi, Mario Gerla. Understanding Pollution Dynamics in P2P File Sharing. In Proc. IPTPS'06."},{"key":"e_1_3_2_1_10_1","unstructured":"Limewire. www.limewire.org  Limewire. www.limewire.org"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of Workshop on the Economics of Peer-to-Peer Systems","author":"Dutta D.","year":"2003","unstructured":"D. Dutta , A. Goel , R. Govindan , H. Zhang , The Design of A Distributed Rating Scheme for Peer-to-peer Systems , In Proc. of Workshop on the Economics of Peer-to-Peer Systems , 2003 D. Dutta, A. Goel, R. Govindan, H. Zhang, The Design of A Distributed Rating Scheme for Peer-to-peer Systems, In Proc. of Workshop on the Economics of Peer-to-Peer Systems, 2003"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_13_1","volume-title":"3rd Symposium on Networked Systems Design &amp; Implementation (NSDI)","author":"Walsh Kevin","year":"2006","unstructured":"Kevin Walsh , Emin Gun Sirer . Experience with an Object Reputation System for Peer-to-Peer Filesharing . In 3rd Symposium on Networked Systems Design &amp; Implementation (NSDI) , 2006 . Kevin Walsh, Emin Gun Sirer. Experience with an Object Reputation System for Peer-to-Peer Filesharing. In 3rd Symposium on Networked Systems Design &amp; Implementation (NSDI), 2006."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.369065"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064218"},{"key":"e_1_3_2_1_16_1","volume-title":"Los Angeles","author":"Zhou Runfang","year":"2007","unstructured":"Runfang Zhou and Kai Hwang . Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks. 21th IEEE International Parallel &amp; Distributed Processing Symposium (IPDPS'07) , Los Angeles , March 26-30, 2007 Runfang Zhou and Kai Hwang. Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks. 21th IEEE International Parallel &amp; Distributed Processing Symposium (IPDPS'07), Los Angeles, March 26-30, 2007"},{"key":"e_1_3_2_1_17_1","unstructured":"Bitzi website. www.Bitzi.com  Bitzi website. www.Bitzi.com"},{"key":"e_1_3_2_1_18_1","volume-title":"http:\/\/www.google.com\/support\/webmasters\/bin\/answer.py?answer=66359. Accessed","author":"Content Web Site Google Duplicate","year":"2008","unstructured":"Google Duplicate Content Web Site . http:\/\/www.google.com\/support\/webmasters\/bin\/answer.py?answer=66359. Accessed May 25, 2008 . Google Duplicate Content Web Site. http:\/\/www.google.com\/support\/webmasters\/bin\/answer.py?answer=66359. Accessed May 25, 2008."},{"key":"e_1_3_2_1_19_1","unstructured":"M. Nilsson. Id3v2 web site. www.id3.org.  M. Nilsson. Id3v2 web site. www.id3.org."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4020-3005-5","volume-title":"Information Retrieval: Algorithms and Heuristics","author":"Grossman D.","year":"2004","unstructured":"D. Grossman and O. Frieder . Information Retrieval: Algorithms and Heuristics . Springer , second edition, 2004 . D. Grossman and O. Frieder. Information Retrieval: Algorithms and Heuristics. Springer, second edition, 2004."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. 4th Conf. on Email and Anti-Spam (CEAS)","author":"Webb Steve","year":"2007","unstructured":"Steve Webb , J. Caverlee , and C. Pu . Characterizing Web Spam Using Content and HTTP Session Analysis . In Proc. 4th Conf. on Email and Anti-Spam (CEAS) , 2007 . Steve Webb, J. Caverlee, and C. Pu. Characterizing Web Spam Using Content and HTTP Session Analysis. In Proc. 4th Conf. on Email and Anti-Spam (CEAS), 2007."},{"key":"e_1_3_2_1_22_1","volume-title":"Wired","author":"Macguire J.","year":"2003","unstructured":"J. Macguire . Hitting P2P Users Where It Hurts , In Wired , Jan. 13, 2003 . http:\/\/www.wired.com\/entertainment\/music\/news\/2003\/01\/57112 J. Macguire. Hitting P2P Users Where It Hurts, In Wired, Jan. 13, 2003. http:\/\/www.wired.com\/entertainment\/music\/news\/2003\/01\/57112"},{"key":"e_1_3_2_1_23_1","unstructured":"Googlebombing 'failure.' Official Google Blog. Sept. 16 2005. http:\/\/googleblog.blogspot.com\/2005\/09\/googlebombing-failure.html  Googlebombing 'failure.' Official Google Blog. Sept. 16 2005. http:\/\/googleblog.blogspot.com\/2005\/09\/googlebombing-failure.html"},{"key":"e_1_3_2_1_24_1","unstructured":"http:\/\/wiki.limewire.org\/index.php?title=Junk_Filter  http:\/\/wiki.limewire.org\/index.php?title=Junk_Filter"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244408.1244411"},{"key":"e_1_3_2_1_26_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Web_scraping#References  http:\/\/en.wikipedia.org\/wiki\/Web_scraping#References"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281124"},{"key":"e_1_3_2_1_28_1","unstructured":"The Gnutella protocol specification v0.6. http:\/\/rfc-gnutella.sourceforge.net.  The Gnutella protocol specification v0.6. http:\/\/rfc-gnutella.sourceforge.net."},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. Wkshp. Large Scale Distributed Systems for Inf. Retr. (LSDS-IR)","author":"Yee W. G.","year":"2007","unstructured":"W. G. Yee , L. T. Nguyen , O. Frieder . A View of the Data on P2P File-sharing Systems . In Proc. Wkshp. Large Scale Distributed Systems for Inf. Retr. (LSDS-IR) , 2007 . W. G. Yee, L. T. Nguyen, O. Frieder. A View of the Data on P2P File-sharing Systems. In Proc. Wkshp. Large Scale Distributed Systems for Inf. Retr. (LSDS-IR), 2007."},{"key":"e_1_3_2_1_30_1","volume-title":"Automatic File Description Tuning in P2P File-Sharing Systems","author":"Jia D.","year":"2008","unstructured":"D. Jia , W. G. Yee , L. T. Nguyen , O. Frieder . Distributed , Automatic File Description Tuning in P2P File-Sharing Systems . Springer Journal of Peer-to-Peer Networking and Applications , 2008 . D. Jia, W. G. Yee, L. T. Nguyen, O. Frieder. Distributed, Automatic File Description Tuning in P2P File-Sharing Systems. Springer Journal of Peer-to-Peer Networking and Applications, 2008."}],"event":{"name":"CIKM08: Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","ACM Association for Computing Machinery","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Napa Valley California USA","acronym":"CIKM08"},"container-title":["Proceedings of the 17th ACM conference on Information and knowledge management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1458082.1458128","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1458082.1458128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:44Z","timestamp":1750287224000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1458082.1458128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,26]]},"references-count":30,"alternative-id":["10.1145\/1458082.1458128","10.1145\/1458082"],"URL":"https:\/\/doi.org\/10.1145\/1458082.1458128","relation":{},"subject":[],"published":{"date-parts":[[2008,10,26]]},"assertion":[{"value":"2008-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}