{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:04:04Z","timestamp":1771063444904,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,13]],"date-time":"2012-08-13T00:00:00Z","timestamp":1344816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,13]]},"DOI":"10.1145\/2342356.2342394","type":"proceedings-article","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T12:18:56Z","timestamp":1344946736000},"page":"175-186","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["Measuring and fingerprinting click-spam in ad networks"],"prefix":"10.1145","author":[{"given":"Vacha","family":"Dave","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Saikat","family":"Guha","sequence":"additional","affiliation":[{"name":"Microsoft Research India, Bangalore, India"}]},{"given":"Yin","family":"Zhang","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,8,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"AdSense for domains program policies. http:\/\/support.google.com\/adsense\/bin\/answer.py?answer=96332.  AdSense for domains program policies. http:\/\/support.google.com\/adsense\/bin\/answer.py?answer=96332."},{"key":"e_1_3_2_2_2_1","unstructured":"The adsense revenue share. http:\/\/adsense.blogspot.com\/2010\/05\/adsense-revenue-share.html.  The adsense revenue share. http:\/\/adsense.blogspot.com\/2010\/05\/adsense-revenue-share.html."},{"key":"e_1_3_2_2_3_1","first-page":"Q4","year":"2010","unstructured":"Click Fraud Falls in Q4 2010 . http:\/\/searchenginewatch.com\/article\/2050117\/Click-Fraud-Falls-in-Q4-2010. Click Fraud Falls in Q4 2010. http:\/\/searchenginewatch.com\/article\/2050117\/Click-Fraud-Falls-in-Q4-2010.","journal-title":"Click Fraud Falls in"},{"key":"e_1_3_2_2_4_1","unstructured":"Click fraud rampant in online ads says bing. http:\/\/www.theaustralian.com.au\/media\/click-fraud-rampant-in-online-adssays- bing\/story-e6frg996-1226056349034.  Click fraud rampant in online ads says bing. http:\/\/www.theaustralian.com.au\/media\/click-fraud-rampant-in-online-adssays- bing\/story-e6frg996-1226056349034."},{"key":"e_1_3_2_2_5_1","unstructured":"Cloaking and Faking the Referrer. http:\/\/kbeezie.com\/view\/cloaking-and-faking-referrer\/.  Cloaking and Faking the Referrer. http:\/\/kbeezie.com\/view\/cloaking-and-faking-referrer\/."},{"key":"e_1_3_2_2_6_1","unstructured":"For Impatient Web Users an Eye Blink Is Just Too Long to Wait. http:\/\/www.nytimes.com\/2012\/03\/01\/technology\/impatient-web-users-fleeslow- loading-sites.html.  For Impatient Web Users an Eye Blink Is Just Too Long to Wait. http:\/\/www.nytimes.com\/2012\/03\/01\/technology\/impatient-web-users-fleeslow- loading-sites.html."},{"key":"e_1_3_2_2_7_1","unstructured":"Google AdSense for Domains. http:\/\/www.google.com\/domainpark\/index.html.  Google AdSense for Domains. http:\/\/www.google.com\/domainpark\/index.html."},{"key":"e_1_3_2_2_8_1","unstructured":"Google Click Fraud Inflates Conversion Rates and Tricks Advertisers into Overpaying. http:\/\/www.benedelman.org\/news\/011210-1.html.  Google Click Fraud Inflates Conversion Rates and Tricks Advertisers into Overpaying. http:\/\/www.benedelman.org\/news\/011210-1.html."},{"key":"e_1_3_2_2_9_1","unstructured":"Google Redirect Virus: How to Remove. http:\/\/www.pcmag.com\/article2\/0 2817 2370676 00.asp.  Google Redirect Virus: How to Remove. http:\/\/www.pcmag.com\/article2\/0 2817 2370676 00.asp."},{"key":"e_1_3_2_2_10_1","unstructured":"International Cyber Ring That Infected Millions of Computers Dismantled. http:\/\/www.fbi.gov\/news\/stories\/2011\/november\/malware_110911.  International Cyber Ring That Infected Millions of Computers Dismantled. http:\/\/www.fbi.gov\/news\/stories\/2011\/november\/malware_110911."},{"key":"e_1_3_2_2_11_1","unstructured":"Malware connection report. http:\/\/www.malware-control.com\/staticspages\/ 03aaf7c8e47ef32e8de23dfe9215d4a5.php.  Malware connection report. http:\/\/www.malware-control.com\/staticspages\/ 03aaf7c8e47ef32e8de23dfe9215d4a5.php."},{"key":"e_1_3_2_2_12_1","unstructured":"Stealing Clicks. http:\/\/www.forbes.com\/2007\/09\/21\/google-click-forensicstech- secure-cx_ag_0924fraud.html.  Stealing Clicks. http:\/\/www.forbes.com\/2007\/09\/21\/google-click-forensicstech- secure-cx_ag_0924fraud.html."},{"key":"e_1_3_2_2_13_1","unstructured":"Uncovering an advertising fraud scheme. Or \"the Internet is for porn\". http:\/\/www.behind-the-enemy-lines.com\/2011\/03\/uncovering-advertisingfraud-scheme.html.  Uncovering an advertising fraud scheme. Or \"the Internet is for porn\". http:\/\/www.behind-the-enemy-lines.com\/2011\/03\/uncovering-advertisingfraud-scheme.html."},{"key":"e_1_3_2_2_14_1","unstructured":"Upcoming changes in Google's HTTP Referrer. http:\/\/googlewebmastercentral.blogspot.com\/2012\/03\/upcoming-changes-ingoogles-http.html.  Upcoming changes in Google's HTTP Referrer. http:\/\/googlewebmastercentral.blogspot.com\/2012\/03\/upcoming-changes-ingoogles-http.html."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766196"},{"key":"e_1_3_2_2_16_1","unstructured":"Click Quality Team Google Inc. How Fictitious Clicks Occur in Third-Party Click Fraud Audit Reports. http:\/\/www.google.com\/adwords\/ReportonThird PartyClickFraudAuditing.pdf.  Click Quality Team Google Inc. How Fictitious Clicks Occur in Third-Party Click Fraud Audit Reports. http:\/\/www.google.com\/adwords\/ReportonThird PartyClickFraudAuditing.pdf."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773182"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_2_19_1","volume-title":"Crimeware:Understanding New Attacks and Defenses","author":"Daswani N.","year":"2008","unstructured":"N. Daswani , C. Mysen , V. Rao , S. Weis , K. Gharachorloo , and S. Ghosemajumder . Crimeware:Understanding New Attacks and Defenses , chapter Online Advertising Fraud. 2008 . N. Daswani, C. Mysen, V. Rao, S. Weis, K. Gharachorloo, and S. Ghosemajumder. Crimeware:Understanding New Attacks and Defenses, chapter Online Advertising Fraud. 2008."},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of HotBots","author":"Daswani N.","year":"2007","unstructured":"N. Daswani and M. Stoppelman . The anatomy of clickbot.A . In Proceedings of HotBots , 2007 . N. Daswani and M. Stoppelman. The anatomy of clickbot.A. In Proceedings of HotBots, 2007."},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of IPTPS '02","author":"Douceur J. R.","unstructured":"J. R. Douceur . The Sybil Attack . In Proceedings of IPTPS '02 . J. R. Douceur. The Sybil Attack. In Proceedings of IPTPS '02."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633056"},{"key":"e_1_3_2_2_23_1","unstructured":"A. M. Eugene Rodionov. The evolution of tdl: Conquering x64. http:\/\/go.eset.com\/us\/resources\/white-papers\/The_Evolution_of_TDL.pdf.  A. M. Eugene Rodionov. The evolution of tdl: Conquering x64. http:\/\/go.eset.com\/us\/resources\/white-papers\/The_Evolution_of_TDL.pdf."},{"key":"e_1_3_2_2_24_1","unstructured":"B. Geddes. Search arbitrage: Web blight or brilliant marketing strategy? http:\/\/searchengineland.com\/search-arbitrage-web-blight-or-brilliantmarketing- strategy-10768.  B. Geddes. Search arbitrage: Web blight or brilliant marketing strategy? http:\/\/searchengineland.com\/search-arbitrage-web-blight-or-brilliantmarketing- strategy-10768."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764877"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11600930_5"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1362903.1362905"},{"key":"e_1_3_2_2_28_1","volume-title":"International Symposium on Software Reliability Engineering","author":"Kintana C.","year":"2009","unstructured":"C. Kintana , D. Turner , J.-Y. Pan , A. Metwally , N. Daswani , E. Chin , and A. Bortz . The goals and challenges of click fraud penetration testing systems . International Symposium on Software Reliability Engineering , 2009 . C. Kintana, D. Turner, J.-Y. Pan, A. Metwally, N. Daswani, E. Chin, and A. Bortz. The goals and challenges of click fraud penetration testing systems. International Symposium on Software Reliability Engineering, 2009."},{"key":"e_1_3_2_2_29_1","volume-title":"International Joint Conference on Artificial Intelligence","author":"Lieberman H.","year":"1995","unstructured":"H. Lieberman . Letizia : An agent that assists web browsing . In International Joint Conference on Artificial Intelligence , 1995 . H. Lieberman. Letizia: An agent that assists web browsing. In International Joint Conference on Artificial Intelligence, 1995."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.36"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.124"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242606"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454161"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2026647.2026661"},{"key":"e_1_3_2_2_35_1","volume-title":"Pay-Per-Click Search Engine Marketing Handbook","author":"Mordkovich B.","year":"2005","unstructured":"B. Mordkovich and E. Mordkovich . Click fraud and how to counteract it in ad campaigns . In Pay-Per-Click Search Engine Marketing Handbook , 2005 . B. Mordkovich and E. Mordkovich. Click fraud and how to counteract it in ad campaigns. In Pay-Per-Click Search Engine Marketing Handbook, 2005."},{"key":"e_1_3_2_2_36_1","volume-title":"The evolution of TDL: Conquering x64. Technical report","author":"Rodionov E.","year":"2011","unstructured":"E. Rodionov and A. Matrosov . The evolution of TDL: Conquering x64. Technical report , 2011 . E. Rodionov and A. Matrosov. The evolution of TDL: Conquering x64. Technical report, 2011."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068843"},{"key":"e_1_3_2_2_39_1","unstructured":"A. Tuzhilin. The lane's gift v. google report. http:\/\/googleblog.blogspot.in\/pdf\/Tuzhilin_Report.pdf.  A. Tuzhilin. The lane's gift v. google report. http:\/\/googleblog.blogspot.in\/pdf\/Tuzhilin_Report.pdf."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718540"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964114.1964119"}],"event":{"name":"SIGCOMM '12: ACM SIGCOMM 2012 Conference","location":"Helsinki Finland","acronym":"SIGCOMM '12","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342356.2342394","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2342356.2342394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:01Z","timestamp":1750238461000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342356.2342394"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,13]]},"references-count":41,"alternative-id":["10.1145\/2342356.2342394","10.1145\/2342356"],"URL":"https:\/\/doi.org\/10.1145\/2342356.2342394","relation":{},"subject":[],"published":{"date-parts":[[2012,8,13]]},"assertion":[{"value":"2012-08-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}