{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:55Z","timestamp":1750306795510,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2490428.2490434","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"42-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Chronicle security against covert crawling"],"prefix":"10.1145","author":[{"given":"Garima","family":"Jain","sequence":"first","affiliation":[{"name":"Indian Institute Of Technology, Rajasthan, Ratanada, Jodhpur, Rajasthan"}]},{"given":"Yatin","family":"Mehandiratta","sequence":"additional","affiliation":[{"name":"Indian Institute Of Technology, Rajasthan, Ratanada, Jodhpur, Rajasthan"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"KyoungSoo Park Vivek S. Pai Kang-Won Lee Seraphin Calo Securing Web Service by Automatic Robot Detection.  KyoungSoo Park Vivek S. Pai Kang-Won Lee Seraphin Calo Securing Web Service by Automatic Robot Detection ."},{"key":"e_1_3_2_1_2_1","unstructured":"Peter Eckersley How unique is your web browser Electronic Frontier Foundation.  Peter Eckersley How unique is your web browser Electronic Frontier Foundation."},{"volume-title":"mln@cs.odu.edu Evaluation of Crawling Policies for a Web-Repository Crawler","author":"McCown Frank","key":"e_1_3_2_1_3_1","unstructured":"Frank McCown ,fmccown@cs.odu.edu, Michael L. Nelson , mln@cs.odu.edu Evaluation of Crawling Policies for a Web-Repository Crawler , Old Dominion University Computer Science Department Norfolk , Virginia, USA 23529 Frank McCown,fmccown@cs.odu.edu, Michael L. Nelson, mln@cs.odu.edu Evaluation of Crawling Policies for a Web-Repository Crawler, Old Dominion University Computer Science Department Norfolk, Virginia, USA 23529"},{"key":"e_1_3_2_1_4_1","first-page":"172","volume-title":"Efficient crawling through URL ordering. (Proceedings of 7th International World Wide Web Conference)","author":"Cho J.","year":"1998","unstructured":"J. Cho , H. Garcia-Molina , and L. Page , Efficient crawling through URL ordering. (Proceedings of 7th International World Wide Web Conference) pages 161| 172 , Brisbane, Australia, April 1998 . Elsevier Science . J. Cho, H. Garcia-Molina, and L. Page, Efficient crawling through URL ordering. (Proceedings of 7th International World Wide Web Conference) pages 161|172, Brisbane, Australia, April 1998. Elsevier Science."},{"key":"e_1_3_2_1_5_1","volume-title":"CA","author":"Kleinberg J.","year":"1998","unstructured":"J. Kleinberg Authoritative sources in a hyperlinked environment. (Proceedings of the 9th ACM-SIAM Symposium on Discrete Algorithms) pages 668|677, San Francisco , CA , Jan. 1998 . J. Kleinberg Authoritative sources in a hyperlinked environment. (Proceedings of the 9th ACM-SIAM Symposium on Discrete Algorithms) pages 668|677, San Francisco, CA, Jan. 1998."},{"key":"e_1_3_2_1_6_1","unstructured":"Marc Najork Janet L. Wiener Breadth first search crawling yields High Quality Pages marc.najork@compaq.com janet.wiener@compaq.com  Marc Najork Janet L. Wiener Breadth first search crawling yields High Quality Pages marc.najork@compaq.com janet.wiener@compaq.com"},{"key":"e_1_3_2_1_7_1","volume-title":"Swearingen How much information? School of Information Management and Systems Univ. of California at Berkeley","author":"Lyman P.","year":"2000","unstructured":"P. Lyman , H. Varian , J. Dunn , A. Strygin , and K. Swearingen How much information? School of Information Management and Systems Univ. of California at Berkeley , 2000 . Available at http:\/\/www.sims.berkeley.edu\/how-much-info P. Lyman, H. Varian, J. Dunn, A. Strygin, and K. Swearingen How much information? School of Information Management and Systems Univ. of California at Berkeley, 2000. Available at http:\/\/www.sims.berkeley.edu\/how-much-info"},{"key":"e_1_3_2_1_8_1","unstructured":"Pang-Ning Tan Vipin Kumar Discovery of Web Robot Sessions Based on their Navigational Patternsptan@cs.umn.edu kumar@cs.umn.edu  Pang-Ning Tan Vipin Kumar Discovery of Web Robot Sessions Based on their Navigational Patterns ptan@cs.umn.edu kumar@cs.umn.edu"},{"key":"e_1_3_2_1_9_1","unstructured":"M. Diligenti\u00e2\u0102\u0103 F. M. Coetzee S. Lawrence C. L. Giles and M. Gori Focused Crawling Using Context Graphs  M. Diligenti\u00e2\u0102\u0103 F. M. Coetzee S. Lawrence C. L. Giles and M. Gori Focused Crawling Using Context Graphs"},{"key":"e_1_3_2_1_10_1","unstructured":"en.wikipedia.org\/  en.wikipedia.org\/"},{"key":"e_1_3_2_1_11_1","unstructured":"Eichmann 1995 Koster 1994a 1995 Ethical Guidelines  Eichmann 1995 Koster 1994a 1995 Ethical Guidelines"},{"key":"e_1_3_2_1_12_1","volume-title":"McCurley Surfing the Web Backwards","author":"Chakrabarti Soumen","year":"1998","unstructured":"Soumen Chakrabarti , David A. Gibson , Kevin S. McCurley Surfing the Web Backwards December 14, 1998 Soumen Chakrabarti, David A. Gibson, Kevin S. McCurley Surfing the Web Backwards December 14, 1998"},{"key":"e_1_3_2_1_13_1","unstructured":"www.dosonline.net  www.dosonline.net"},{"key":"e_1_3_2_1_14_1","unstructured":"http:\/\/www.digipedia.pl\/man\/doc\/view\/harvestman.1\/  http:\/\/www.digipedia.pl\/man\/doc\/view\/harvestman.1\/"},{"key":"e_1_3_2_1_15_1","unstructured":"http:\/\/www.jocsoft.com\/jws\/  http:\/\/www.jocsoft.com\/jws\/"},{"key":"e_1_3_2_1_16_1","unstructured":"http:\/\/sbl.net\/  http:\/\/sbl.net\/"},{"key":"e_1_3_2_1_17_1","unstructured":"http:\/\/www.tenmax.com\/teleport\/pro\/home.htm  http:\/\/www.tenmax.com\/teleport\/pro\/home.htm"},{"key":"e_1_3_2_1_18_1","unstructured":"http:\/\/www.sparkleware.com\/superbot\/  http:\/\/www.sparkleware.com\/superbot\/"},{"key":"e_1_3_2_1_19_1","unstructured":"http:\/\/www.bluesquirrel.com\/products\/webwhacker\/  http:\/\/www.bluesquirrel.com\/products\/webwhacker\/"},{"key":"e_1_3_2_1_20_1","unstructured":"http:\/\/mtest.cloud4sites.com\/mobile\/details.php  http:\/\/mtest.cloud4sites.com\/mobile\/details.php"}],"event":{"name":"SECURIT '12: First International Conference on Security of Internet of Things","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","TCG Trusted Computing Group","Amrita Amrita Vishwa Vidyapeetham","CSA Computer Science Association"],"location":"Kollam India","acronym":"SECURIT '12"},"container-title":["Proceedings of the First International Conference on Security of Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490434","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490428.2490434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:35Z","timestamp":1750232075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":20,"alternative-id":["10.1145\/2490428.2490434","10.1145\/2490428"],"URL":"https:\/\/doi.org\/10.1145\/2490428.2490434","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}