{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:14:22Z","timestamp":1763507662099,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046761","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"455-466","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Fashion crimes"],"prefix":"10.1145","author":[{"given":"Tyler","family":"Moore","sequence":"first","affiliation":[{"name":"Wellesley College, Wellesley, MA, USA"}]},{"given":"Nektarios","family":"Leontiadis","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Nicolas","family":"Christin","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Google Web Search API. BiBTeXhttps:\/\/code.google.com\/apis\/websearch\/.  Google Web Search API. BiBTeXhttps:\/\/code.google.com\/apis\/websearch\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. USENIX LEET'10","author":"Rajab M. Abu","year":"2010","unstructured":"M. Abu Rajab , L. Ballard , P. Mavrommatis , N. Provos , and X. Zhao . The nocebo effect on the web: an analysis of fake anti-virus distribution . In Proc. USENIX LEET'10 , San Jose, CA , April 2010 . M. Abu Rajab, L. Ballard, P. Mavrommatis, N. Provos, and X. Zhao. The nocebo effect on the web: an analysis of fake anti-virus distribution. In Proc. USENIX LEET'10, San Jose, CA, April 2010."},{"key":"e_1_3_2_1_3_1","unstructured":"AdBlock. Adblock easy list. BiBTeXhttps:\/\/easylist-downloads.adblockplus.org\/easylist.t xt.  AdBlock. Adblock easy list. BiBTeXhttps:\/\/easylist-downloads.adblockplus.org\/easylist.t xt."},{"key":"e_1_3_2_1_4_1","unstructured":"Adify. Adify vertical gauge shows steady growth in seven of eleven critical verticals. BiBTeXhttp:\/\/www.smartbrief.com\/news\/aaaa\/industryMW-detail.jsp?id=732F69A7--9192--4E05-A261--52C068021634. Last accessed May 5 2011.  Adify. Adify vertical gauge shows steady growth in seven of eleven critical verticals. BiBTeXhttp:\/\/www.smartbrief.com\/news\/aaaa\/industryMW-detail.jsp?id=732F69A7--9192--4E05-A261--52C068021634. Last accessed May 5 2011."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866310"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022649401552"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894166.1894196"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315292"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_11_1","first-page":"517","volume-title":"Proc. VLDB'05","author":"Gy\u00f6ngyi Z.","year":"2005","unstructured":"Z. Gy\u00f6ngyi and H. Garcia-Mollina . Link spam alliances . In Proc. VLDB'05 , pages 517 -- 528 , Trondheim, Norway , Aug. 2005 . Z. Gy\u00f6ngyi and H. Garcia-Mollina. Link spam alliances. In Proc. VLDB'05, pages 517--528, Trondheim, Norway, Aug. 2005."},{"key":"e_1_3_2_1_12_1","volume-title":"Experian hitwise reports bing-powered share of searches reaches 30 percent in march","author":"Hitwise Experian","year":"2011","unstructured":"Experian Hitwise . Experian hitwise reports bing-powered share of searches reaches 30 percent in march 2011 , April 2011. BiBTeXhttp :\/\/www.hitwise.com\/us\/press-center\/press-releases\/experian-hitwise-reports-bing-powered-share-of-s\/. Experian Hitwise. Experian hitwise reports bing-powered share of searches reaches 30 percent in march 2011, April 2011. BiBTeXhttp:\/\/www.hitwise.com\/us\/press-center\/press-releases\/experian-hitwise-reports-bing-powered-share-of-s\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Google Inc. Google insights for search. BiBTeXhttp:\/\/www.google.com\/insights\/search\/.  Google Inc. Google insights for search. BiBTeXhttp:\/\/www.google.com\/insights\/search\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Google Inc. Google traffic estimator. BiBTeXhttps:\/\/adwords.google.com\/select\/TrafficEstimatorSandbox.  Google Inc. Google traffic estimator. BiBTeXhttps:\/\/adwords.google.com\/select\/TrafficEstimatorSandbox."},{"key":"e_1_3_2_1_15_1","unstructured":"Google Inc. Google trends. BiBTeXhttp:\/\/www.google.com\/trends\/.  Google Inc. Google trends. BiBTeXhttp:\/\/www.google.com\/trends\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1076034.1076063"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. USENIX Security'11","author":"John J.","year":"2011","unstructured":"J. John , F. Yu , Y. Xie , M. Abadi , and A. Krishnamurthy . deSEO: Combating search-result poisoning . In Proc. USENIX Security'11 , San Francisco, CA , August 2011 . J. John, F. Yu, Y. Xie, M. Abadi, and A. Krishnamurthy. deSEO: Combating search-result poisoning. In Proc. USENIX Security'11, San Francisco, CA, August 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_3_2_1_19_1","first-page":"1137","volume-title":"Proc. IJCAI'95","author":"Kohavi R.","year":"1995","unstructured":"R. Kohavi . A study of cross-validation and bootstrap for accuracy estimation and model selection . In Proc. IJCAI'95 , pages 1137 -- 1145 , Montreal, QC, Canada , Aug. 1995 . R. Kohavi. A study of cross-validation and bootstrap for accuracy estimation and model selection. In Proc. IJCAI'95, pages 1137--1145, Montreal, QC, Canada, Aug. 1995."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. USENIX Security'11","author":"Leontiadis N.","year":"2011","unstructured":"N. Leontiadis , T. Moore , and N. Christin . Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade . In Proc. USENIX Security'11 , San Francisco, CA , August 2011 . N. Leontiadis, T. Moore, and N. Christin. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In Proc. USENIX Security'11, San Francisco, CA, August 2011."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557077"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_23_1","unstructured":"Microsoft. Microsoft yahoo! change search landscape. BiBTeXhttp:\/\/www.microsoft.com\/presspass\/press\/2009\/jul09\/07--29release.mspx.  Microsoft. Microsoft yahoo! change search landscape. BiBTeXhttp:\/\/www.microsoft.com\/presspass\/press\/2009\/jul09\/07--29release.mspx."},{"key":"e_1_3_2_1_24_1","volume-title":"May","author":"Mohan N.","year":"2010","unstructured":"N. Mohan . The AdSense revenue share , May 2010 . BiBTeXhttp :\/\/adsense.blogspot.com\/2010\/05\/adsense-revenue-share.html. N. Mohan. The AdSense revenue share, May 2010. BiBTeXhttp:\/\/adsense.blogspot.com\/2010\/05\/adsense-revenue-share.html."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299016"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_16"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. USENIX LEET'09","author":"Moore T.","year":"2009","unstructured":"T. Moore , R. Clayton , and H. Stern . Temporal correlations between spam and phishing websites . In Proc. USENIX LEET'09 , Boston, MA , April 2009 . T. Moore, R. Clayton, and H. Stern. Temporal correlations between spam and phishing websites. In Proc. USENIX LEET'09, Boston, MA, April 2009."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_15"},{"key":"e_1_3_2_1_29_1","first-page":"329","volume-title":"Bayesian Networks: A Model of Self-Activated Memory for Evidential Reasoning. In Proc. 7th Conf. of the Cognitive Science Society","author":"Pearl J.","year":"1985","unstructured":"J. Pearl . Bayesian Networks: A Model of Self-Activated Memory for Evidential Reasoning. In Proc. 7th Conf. of the Cognitive Science Society , pages 329 -- 334 , Irvine, CA , Aug. 1985 . J. Pearl. Bayesian Networks: A Model of Self-Activated Memory for Evidential Reasoning. In Proc. 7th Conf. of the Cognitive Science Society, pages 329--334, Irvine, CA, Aug. 1985."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. USENIX Security'08","author":"Provos N.","year":"2008","unstructured":"N. Provos , P. Mavrommatis , M. Abu Rajab , and F. Monrose . All your iFrames point to us . In Proc. USENIX Security'08 , San Jose, CA , August 2008 . N. Provos, P. Mavrommatis, M. Abu Rajab, and F. Monrose. All your iFrames point to us. In Proc. USENIX Security'08, San Jose, CA, August 2008."},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. USENIX HotBots'07","author":"Provos N.","year":"2007","unstructured":"N. Provos , D. McNamee , P. Mavrommatis , K. Wang , and N. Modadugu . The ghost in the browser: Analysis of web-based malware . In Proc. USENIX HotBots'07 , Cambridge, MA , April 2007 . N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser: Analysis of web-based malware. In Proc. USENIX HotBots'07, Cambridge, MA, April 2007."},{"key":"e_1_3_2_1_32_1","volume-title":"January","author":"Schwarz B.","year":"2010","unstructured":"B. Schwarz . Google adwords click through rates : 2% is average but double digits is great , January 2010 . BiBTeXhttp:\/\/www.seroundtable.com\/archives\/021514.html. Last accessed May 3, 2011. B. Schwarz. Google adwords click through rates: 2% is average but double digits is great, January 2010. BiBTeXhttp:\/\/www.seroundtable.com\/archives\/021514.html. Last accessed May 3, 2011."},{"key":"e_1_3_2_1_33_1","first-page":"1","volume-title":"New York Times","author":"Segal D.","year":"2010","unstructured":"D. Segal . A bully finds a pulpit on the web . New York Times , November 2010 . Article appeared in print on November 28, 2010, on page BU 1 of the New York edition. Available online at http:\/\/www.nytimes.com\/2010\/11\/28\/business\/28borker.html. D. Segal. A bully finds a pulpit on the web. New York Times, November 2010. Article appeared in print on November 28, 2010, on page BU1 of the New York edition. Available online at http:\/\/www.nytimes.com\/2010\/11\/28\/business\/28borker.html."},{"key":"e_1_3_2_1_34_1","first-page":"1","volume-title":"New York Times","author":"Segal D.","year":"2011","unstructured":"D. Segal . The dirty little secrets of search . New York Times , February 2011 . Article appeared in print on February 13, 2011, on page BU 1 of the New York edition. Available online at http:\/\/www.nytimes.com\/2011\/02\/13\/business\/13search.html. D. Segal. The dirty little secrets of search. New York Times, February 2011. Article appeared in print on February 13, 2011, on page BU1 of the New York edition. Available online at http:\/\/www.nytimes.com\/2011\/02\/13\/business\/13search.html."},{"key":"e_1_3_2_1_35_1","volume-title":"February","author":"Singha A.","year":"2011","unstructured":"A. Singha . Finding more high-quality sites in search , February 2011 . BiBTeXhttp :\/\/googleblog.blogspot.com\/2011\/02\/finding-more-high-quality-sites-in.html. A. Singha. Finding more high-quality sites in search, February 2011. BiBTeXhttp:\/\/googleblog.blogspot.com\/2011\/02\/finding-more-high-quality-sites-in.html."},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. (online) WEIS 2011","author":"Stone-Gross B.","year":"2011","unstructured":"B. Stone-Gross , R. Abman , R. Kemmerer , C. Kruegel , D. Steigerwald , and G. Vigna . The underground economy of fake antivirus software . In Proc. (online) WEIS 2011 , Fairfax, VA , June 2011 . B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna. The underground economy of fake antivirus software. In Proc. (online) WEIS 2011, Fairfax, VA, June 2011."},{"key":"e_1_3_2_1_37_1","unstructured":"Twitter. Twitter developers trends resources. BiBTeXhttp:\/\/dev.twitter.com\/doc\/get\/trends\/.  Twitter. Twitter developers trends resources. BiBTeXhttp:\/\/dev.twitter.com\/doc\/get\/trends\/."},{"key":"e_1_3_2_1_38_1","unstructured":"Yahoo! Inc. Yahoo buzzlog. BiBTeXhttp:\/\/buzzlog.yahoo.com\/overall\/.  Yahoo! Inc. Yahoo buzzlog. BiBTeXhttp:\/\/buzzlog.yahoo.com\/overall\/."},{"key":"e_1_3_2_1_39_1","unstructured":"Yahoo! Inc. Yahoo site explorer. BiBTeXhttp:\/\/siteexplorer.search.yahoo.com\/.  Yahoo! Inc. Yahoo site explorer. BiBTeXhttp:\/\/siteexplorer.search.yahoo.com\/."}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS'11"},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046761","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046761"}},"subtitle":["trending-term exploitation on the web"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":39,"alternative-id":["10.1145\/2046707.2046761","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046761","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}