{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:27:42Z","timestamp":1750746462535,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,5]],"date-time":"2014-11-05T00:00:00Z","timestamp":1415145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-1237264"],"award-info":[{"award-number":["NSF-1237264"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-09-1-1081"],"award-info":[{"award-number":["N00014-09-1-1081"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,5]]},"DOI":"10.1145\/2663716.2663738","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"359-372","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Search + Seizure"],"prefix":"10.1145","author":[{"given":"David Y.","family":"Wang","sequence":"first","affiliation":[{"name":"University of California San Diego, San Diego, CA, USA"}]},{"given":"Matthew","family":"Der","sequence":"additional","affiliation":[{"name":"University of California San Diego, San Diego, CA, USA"}]},{"given":"Mohammad","family":"Karami","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Lawrence","family":"Saul","sequence":"additional","affiliation":[{"name":"University of California San Diego, San Diego, CA, USA"}]},{"given":"Damon","family":"McCoy","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"University of California San Diego, San Diego, CA, USA"}]},{"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[{"name":"University of California San Diego, San Diego, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AWStats -- Free log file analyzer for advanced statistics (GNU GPL). http:\/\/awstats.sourceforge.net\/.  AWStats -- Free log file analyzer for advanced statistics (GNU GPL). http:\/\/awstats.sourceforge.net\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046686"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Workshop on the Economics of Information Security (WEIS)","author":"Chachra N.","year":"2014","unstructured":"Chachra , N. , McCoy , D. , Savage , S. , and Voelker , G. M . Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting . In Proceedings of the Workshop on the Economics of Information Security (WEIS) ( State College, PA. , June 2014 ). Chachra, N., McCoy, D., Savage, S., and Voelker, G. M. Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting. In Proceedings of the Workshop on the Economics of Information Security (WEIS) (State College, PA., June 2014)."},{"key":"e_1_3_2_1_4_1","unstructured":"Chaffey D. Ecommerce conversion rates. http:\/\/www.smartinsights.com\/ecommerce\/ecommerce-analytics\/ecommerce-conversion-rates\/ March 2014.  Chaffey D. Ecommerce conversion rates. http:\/\/www.smartinsights.com\/ecommerce\/ecommerce-analytics\/ecommerce-conversion-rates\/ March 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623354"},{"key":"e_1_3_2_1_6_1","unstructured":"Generate a Random Name -- Fake Name Generator. http:\/\/www.fakenamegenerator.com\/.  Generate a Random Name -- Fake Name Generator. http:\/\/www.fakenamegenerator.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Fan R. E. Chang K. W. Hsieh C. J. Wang X. R. and Lin C. J. LIBLINEAR: A Library for Large Linear Classification. http:\/\/www.csie.ntu.edu.tw\/ cjlin\/liblinear\/.  Fan R. E. Chang K. W. Hsieh C. J. Wang X. R. and Lin C. J. LIBLINEAR: A Library for Large Linear Classification. http:\/\/www.csie.ntu.edu.tw\/ cjlin\/liblinear\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Google Search Engine Optimization Starter Guide. http:\/\/www.google.com\/webmasters\/docs\/search-engine-optimization-starter-guide.pdf.  Google Search Engine Optimization Starter Guide. http:\/\/www.google.com\/webmasters\/docs\/search-engine-optimization-starter-guide.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"Google. Results labeled \"This site may be hacked\". http:\/\/support.google.com\/websearch\/answer\/190597.  Google. Results labeled \"This site may be hacked\". http:\/\/support.google.com\/websearch\/answer\/190597."},{"key":"e_1_3_2_1_10_1","unstructured":"Greer Burns & Crain. Anti-counterfeiting legal strategies enforcement and remedies. http:\/\/gbclaw.net\/practiceareas\/anti-counterfeiting.  Greer Burns & Crain. Anti-counterfeiting legal strategies enforcement and remedies. http:\/\/gbclaw.net\/practiceareas\/anti-counterfeiting."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382283"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Workshop on the Economics of Information Security (WEIS)","author":"Herley C.","year":"2009","unstructured":"Herley , C. , and Florencio , D . Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy . In Proceedings of the Workshop on the Economics of Information Security (WEIS) ( London, UK , June 2009 ). Herley, C., and Florencio, D. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy. In Proceedings of the Workshop on the Economics of Information Security (WEIS) (London, UK, June 2009)."},{"key":"e_1_3_2_1_13_1","unstructured":"HtmlUnit -- Welcome to HtmlUnit. http:\/\/htmlunit.sourceforge.net\/.  HtmlUnit -- Welcome to HtmlUnit. http:\/\/htmlunit.sourceforge.net\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.33"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"John J. P.","year":"2011","unstructured":"John , J. P. , Yu , F. , Xie , Y. , Krishnamurthy , A. , and Abadi , M . deSEO: Combating Search-Result Poisoning . In Proceedings of the USENIX Security Symposium ( San Francisco, CA , August 2011 ). John, J. P., Yu, F., Xie, Y., Krishnamurthy, A., and Abadi, M. deSEO: Combating Search-Result Poisoning. In Proceedings of the USENIX Security Symposium (San Francisco, CA, August 2011)."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Kanich C.","year":"2011","unstructured":"Kanich , C. , Weaver , N. , McCoy , D. , Halvorson , T. , Kreibich , C. , Levchenko , K. , Paxson , V. , Voelker , G. M. , and Savage , S . Show Me the Money: Characterizing Spam-advertised Revenue . In Proceedings of the USENIX Security Symposium ( San Francisco, CA , August 2011 ). Kanich, C., Weaver, N., McCoy, D., Halvorson, T., Kreibich, C., Levchenko, K., Paxson, V., Voelker, G. M., and Savage, S. Show Me the Money: Characterizing Spam-advertised Revenue. In Proceedings of the USENIX Security Symposium (San Francisco, CA, August 2011)."},{"key":"e_1_3_2_1_17_1","volume-title":"CA.","author":"Karami M.","year":"2013","unstructured":"Karami , M. , Ghaemi , S. , and McCoy , D. Folex : An Analysis of an Herbal and Counterfeit Luxury Goods Affiliate Program. In Proceesings of the eCrime Researchers Summit (eCRS) (San Francisco , CA. , September 2013 ). Karami, M., Ghaemi, S., and McCoy, D. Folex: An Analysis of an Herbal and Counterfeit Luxury Goods Affiliate Program. In Proceesings of the eCrime Researchers Summit (eCRS) (San Francisco, CA., September 2013)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492002.2482610"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660332"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET)","author":"Liu H.","year":"2011","unstructured":"Liu , H. , Levchenko , K. , Felegyhazi , M. , Kreibich , C. , Maier , G. , Voelker , G. M. , and Savage , S . On the Effects of Registrar-level Intervention . In Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET) ( Boston, MA , March 2011 ). Liu, H., Levchenko, K., Felegyhazi, M., Kreibich, C., Maier, G., Voelker, G. M., and Savage, S. On the Effects of Registrar-level Intervention. In Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET) (Boston, MA, March 2011)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046762"},{"key":"e_1_3_2_1_23_1","unstructured":"MarkMonitor Brand Protection. https:\/\/www.markmonitor.com\/services\/brand-protection.php.  MarkMonitor Brand Protection. https:\/\/www.markmonitor.com\/services\/brand-protection.php."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382285"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"McCoy D.","year":"2012","unstructured":"McCoy , D. , Pitsillidis , A. , Jordan , G. , Weaver , N. , Kreibich , C. , Krebs , B. , Voelker , G. M. , Savage , S. , and Levchenko , K . PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs . In Proceedings of the USENIX Security Symposium ( Bellevue, WA , August 2012 ). McCoy, D., Pitsillidis, A., Jordan, G., Weaver, N., Kreibich, C., Krebs, B., Voelker, G. M., Savage, S., and Levchenko, K. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. In Proceedings of the USENIX Security Symposium (Bellevue, WA, August 2012)."},{"key":"e_1_3_2_1_26_1","volume-title":"GA.","author":"Moore T.","year":"2008","unstructured":"Moore , T. , and Clayton , R . The consequence of non-cooperation in the fight against phishing. In Proceesings of the eCrime Researchers Summit (eCRS) (Atlanta , GA. , October 2008 ). Moore, T., and Clayton, R. The consequence of non-cooperation in the fight against phishing. In Proceesings of the eCrime Researchers Summit (eCRS) (Atlanta, GA., October 2008)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046761"},{"key":"e_1_3_2_1_28_1","unstructured":"OpSec. Brand protection from manufacturing to retail. http:\/\/www.opsecsecurity.com\/brand-protection.  OpSec. Brand protection from manufacturing to retail. http:\/\/www.opsecsecurity.com\/brand-protection."},{"key":"e_1_3_2_1_29_1","volume-title":"IAB Internet Advertising Revenue Report","author":"PricewaterhouseCoopers","year":"2012","unstructured":"PricewaterhouseCoopers . IAB Internet Advertising Revenue Report , 2012 Full Year Results . http:\/\/www.iab.net\/media\/file\/IABInternetAdvertisingRevenueReportFY2012% POSTED.pdf. PricewaterhouseCoopers. IAB Internet Advertising Revenue Report, 2012 Full Year Results. http:\/\/www.iab.net\/media\/file\/IABInternetAdvertisingRevenueReportFY2012% POSTED.pdf."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET)","author":"Rajab M. A.","year":"2010","unstructured":"Rajab , M. A. , Ballard , L. , Marvrommatis , P. , Provos , N. , and Zhao , X . The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution . In Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET) ( San Jose, CA , April 2010 ). Rajab, M. A., Ballard, L., Marvrommatis, P., Provos, N., and Zhao, X. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. In Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET) (San Jose, CA, April 2010)."},{"key":"e_1_3_2_1_31_1","unstructured":"Safenames. Mark Protect. http:\/\/www.safenames.net\/BrandProtection\/MarkProtect.aspx.  Safenames. Mark Protect. http:\/\/www.safenames.net\/BrandProtection\/MarkProtect.aspx."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the Virus Bulletin Conference (September","author":"Samosseiko D.","year":"2009","unstructured":"Samosseiko , D. The Partnerka -- What Is It, And Why Should You Care? In Proceedings of the Virus Bulletin Conference (September 2009 ). Samosseiko, D. The Partnerka -- What Is It, And Why Should You Care? In Proceedings of the Virus Bulletin Conference (September 2009)."},{"key":"e_1_3_2_1_33_1","unstructured":"SMGPA. http:\/\/smgpa.net\/.  SMGPA. http:\/\/smgpa.net\/."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. of the 10th Workshop on the Economics of Information Security (WEIS) (Washington D.C.","author":"Stone-Gross B.","year":"2011","unstructured":"Stone-Gross , B. , Abman , R. , Kemmerer , R. , Kruegel , C. , Steigerwald , D. , and Vigna , G . The Underground Economy of Fake Antivirus Software . In Proc. of the 10th Workshop on the Economics of Information Security (WEIS) (Washington D.C. , 2011 ). Stone-Gross, B., Abman, R., Kemmerer, R., Kruegel, C., Steigerwald, D., and Vigna, G. The Underground Economy of Fake Antivirus Software. In Proc. of the 10th Workshop on the Economics of Information Security (WEIS) (Washington D.C., 2011)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046763"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Wang D. Y.","year":"2013","unstructured":"Wang , D. Y. , Savage , S. , and Voelker , G. M . Juice: A Longitudinal Study of an SEO Campaign . In Proceedings of the Network and Distributed System Security Symposium ( San Diego, CA , February 2013 ). Wang, D. Y., Savage, S., and Voelker, G. M. Juice: A Longitudinal Study of an SEO Campaign. In Proceedings of the Network and Distributed System Security Symposium (San Diego, CA, February 2013)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242612"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Whittaker C.","year":"2010","unstructured":"Whittaker , C. , Ryner , B. , and Nazif , M . Large-Scale Automatic Classification of Phishing Pages . In Proceedings of the Network and Distributed System Security Symposium ( San Diego, CA , February 2010 ). Whittaker, C., Ryner, B., and Nazif, M. Large-Scale Automatic Classification of Phishing Pages. In Proceedings of the Network and Distributed System Security Symposium (San Diego, CA, February 2010)."}],"event":{"name":"IMC '14: Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"],"location":"Vancouver BC Canada","acronym":"IMC '14"},"container-title":["Proceedings of the 2014 Conference on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663716.2663738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2663716.2663738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:18Z","timestamp":1750229778000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663716.2663738"}},"subtitle":["The Effectiveness of Interventions on SEO Campaigns"],"short-title":[],"issued":{"date-parts":[[2014,11,5]]},"references-count":38,"alternative-id":["10.1145\/2663716.2663738","10.1145\/2663716"],"URL":"https:\/\/doi.org\/10.1145\/2663716.2663738","relation":{},"subject":[],"published":{"date-parts":[[2014,11,5]]},"assertion":[{"value":"2014-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}