{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:18Z","timestamp":1763468058378,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046762","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"467-476","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["SURF"],"prefix":"10.1145","author":[{"given":"Long","family":"Lu","sequence":"first","affiliation":[{"name":"Georgia Inst. of Technolog, Atlanta, GA, USA"}]},{"given":"Roberto","family":"Perdisci","sequence":"additional","affiliation":[{"name":"University of Georgia, Atlanta, GA, USA"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Inst. of Technolog, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Google search engine optimization. http:\/\/www.google.com\/webmasters\/.  Google search engine optimization. http:\/\/www.google.com\/webmasters\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Google trends. http:\/\/www.google.com\/trends.  Google trends. http:\/\/www.google.com\/trends."},{"key":"e_1_3_2_1_3_1","unstructured":"URLVoid: Scan a website with multiple scanning engines. http:\/\/www.urlvoid.com\/.  URLVoid: Scan a website with multiple scanning engines. http:\/\/www.urlvoid.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"WOT\n  : Web of trust. http:\/\/www.mywot.com\/wiki\/API.  WOT: Web of trust. http:\/\/www.mywot.com\/wiki\/API."},{"volume-title":"Programs for Machine Learning","year":"1993","key":"e_1_3_2_1_5_1","unstructured":"C4.5 : Programs for Machine Learning . Morgan Kaufmann Publishers , 1993 . C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, 1993."},{"key":"e_1_3_2_1_6_1","volume-title":"July","author":"0","year":"2006","unstructured":"Google drives 7 0 percent of traffic to most web sites. http:\/\/searchengineoptimism.com\/Google_refers_70_percent.html , July 2006 . Google drives 70 percent of traffic to most web sites. http:\/\/searchengineoptimism.com\/Google_refers_70_percent.html, July 2006."},{"volume-title":"November","year":"2007","key":"e_1_3_2_1_7_1","unstructured":"Malware poisoning results for innocent searches. http:\/\/www.eweek.com\/c\/a\/Security\/Malware-Poisoning-Results-for-Innocent-Searches , November 2007 . Malware poisoning results for innocent searches. http:\/\/www.eweek.com\/c\/a\/Security\/Malware-Poisoning-Results-for-Innocent-Searches, November 2007."},{"key":"e_1_3_2_1_8_1","volume-title":"Technical report","author":"0","year":"2010","unstructured":"Barracuda labs 201 0 mid-year security report. Technical report , Barracuda Networks Inc ., 2010 . Barracuda labs 2010 mid-year security report. Technical report, Barracuda Networks Inc., 2010."},{"volume-title":"November","year":"2010","key":"e_1_3_2_1_9_1","unstructured":"Search engine optimization 'poisoning' way up this year. http:\/\/www.networkworld.com\/news\/2010\/110910-seo-poisoning-increases.html , November 2010 . Search engine optimization 'poisoning' way up this year. http:\/\/www.networkworld.com\/news\/2010\/110910-seo-poisoning-increases.html, November 2010."},{"volume-title":"February","year":"2011","key":"e_1_3_2_1_10_1","unstructured":"The dirty little secrets of search. http:\/\/www.nytimes.com\/2011\/02\/13\/business\/13search.html , February 2011 . The dirty little secrets of search. http:\/\/www.nytimes.com\/2011\/02\/13\/business\/13search.html, February 2011."},{"key":"e_1_3_2_1_11_1","unstructured":"Google: Search engine spam on the rise. http:\/\/www.pcworld.com\/article\/217370\/google_search January 2011.  Google: Search engine spam on the rise. http:\/\/www.pcworld.com\/article\/217370\/google_search January 2011."},{"key":"e_1_3_2_1_12_1","volume-title":"Web spam taxonomy. Technical report","author":"Gy\u00f6ngyi Z.","year":"2005","unstructured":"Z. Gy\u00f6ngyi and H. Garcia-Molina . Web spam taxonomy. Technical report , Stanford University , 2005 . Z. Gy\u00f6ngyi and H. Garcia-Molina. Web spam taxonomy. Technical report, Stanford University, 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_14_1","volume-title":"SophosLab","author":"Howard F.","year":"2010","unstructured":"F. Howard and O. Komili . Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware. Technical report , SophosLab , 2010 . F. Howard and O. Komili. Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware. Technical report, SophosLab, 2010."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 20th USENIX Security","author":"John J.","year":"2011","unstructured":"J. John , F. Yu , Y. Xie , M. Abadi , and A. Krishnamurthy . deSEO: Combating search-result poisoning . In Proceedings of the 20th USENIX Security , 2011 . J. John, F. Yu, Y. Xie, M. Abadi, and A. Krishnamurthy. deSEO: Combating search-result poisoning. In Proceedings of the 20th USENIX Security, 2011."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866356"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the NDSS","author":"Moshchuk E.","year":"2006","unstructured":"E. Moshchuk , T. Bragin , S. D. Gribble , and H. M. Levy . A crawler-based study of spyware on the web . In Proceedings of the NDSS , 2006 . E. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy. A crawler-based study of spyware on the web. In Proceedings of the NDSS, 2006."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 3rd USENIX LEET","author":"Rajab M. A.","year":"2010","unstructured":"M. A. Rajab , L. Ballard , P. Mavrommatis , N. Provos , and X. Zhao . The nocebo effect on the web: an analysis of fake anti-virus distribution . In Proceedings of the 3rd USENIX LEET , 2010 . M. A. Rajab, L. Ballard, P. Mavrommatis, N. Provos, and X. Zhao. The nocebo effect on the web: an analysis of fake anti-virus distribution. In Proceedings of the 3rd USENIX LEET, 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1326561.1326564"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the NDSS","author":"Wang Y.-M.","year":"2006","unstructured":"Y.-M. Wang , D. Beck , X. Jiang , and R. Roussev . Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities . In Proceedings of the NDSS , 2006 . Y.-M. Wang, D. Beck, X. Jiang, and R. Roussev. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proceedings of the NDSS, 2006."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062762"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135901"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS'11"},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046762","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046762"}},"subtitle":["detecting and measuring search poisoning"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":24,"alternative-id":["10.1145\/2046707.2046762","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046762","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}