{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:30:13Z","timestamp":1773930613680,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T00:00:00Z","timestamp":1497830400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"H2020 EU-funded projects NeCS and C3ISP and EIT-Digital Project HII"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,19]]},"DOI":"10.1145\/3102254.3102263","type":"proceedings-article","created":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T20:05:41Z","timestamp":1501099541000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["A time series classification approach to game bot detection"],"prefix":"10.1145","author":[{"given":"Mario Luca","family":"Bernardi","sequence":"first","affiliation":[{"name":"Giustino Fortunato University, Benevento, Italy"}]},{"given":"Marta","family":"Cimitile","sequence":"additional","affiliation":[{"name":"Unitelma Sapienza, Roma, Italy"}]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[{"name":"National Research Council of Italy (CNR), Pisa, Italy"}]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[{"name":"National Research Council of Italy (CNR), Pisa, Italy"}]}],"member":"320","published-online":{"date-parts":[[2017,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ernest Adams. 2014. Fundamentals of game design. Pearson Education.  Ernest Adams. 2014. Fundamentals of game design . Pearson Education."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2016.06.002"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178823.1178829"},{"key":"e_1_3_2_1_4_1","first-page":"94","article-title":"Game bot detection based on avatar trajectory","volume":"2008","author":"Chen Kuan-Ta","year":"2009","unstructured":"Kuan-Ta Chen , Andrew Liao , Hsing-Kuo Pao , and Hao-Hua Chu . 2009 . Game bot detection based on avatar trajectory . Entertainment Computing-ICEC 2008 (2009), 94 -- 105 . Kuan-Ta Chen, Andrew Liao, Hsing-Kuo Pao, and Hao-Hua Chu. 2009. Game bot detection based on avatar trajectory. Entertainment Computing-ICEC 2008 (2009), 94--105.","journal-title":"Entertainment Computing-ICEC"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517494.1517498"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Ying-Chieh Chen Patrick S Chen Ronggong Song and Larry Korba. 2004. Online Gaming Crime and Security Issue-Cases and Countermeasures from Taiwan.. In PST. 131--136.  Ying-Chieh Chen Patrick S Chen Ronggong Song and Larry Korba. 2004. Online Gaming Crime and Security Issue-Cases and Countermeasures from Taiwan.. In PST . 131--136.","DOI":"10.1109\/ITCC.2005.215"},{"key":"e_1_3_2_1_7_1","volume-title":"Noo-Ri Kim, Hana Cho, Tae Bok Yoon, Hunjoo Lee, and Jee-Hyong Lee.","author":"Chung Yeounoh","year":"2015","unstructured":"Yeounoh Chung , Chang Yong Park , Noo-Ri Kim, Hana Cho, Tae Bok Yoon, Hunjoo Lee, and Jee-Hyong Lee. 2015 . A Behavior Analysis-Based Game Bot Detection Approach Considering Various Play Styles. CoRR abs\/1509.02458 (2015). Yeounoh Chung, Chang Yong Park, Noo-Ri Kim, Hana Cho, Tae Bok Yoon, Hunjoo Lee, and Jee-Hyong Lee. 2015. A Behavior Analysis-Based Game Bot Detection Approach Considering Various Play Styles. CoRR abs\/1509.02458 (2015)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379788"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31128-4_29"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-014-0416-2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2003.10.007"},{"key":"e_1_3_2_1_12_1","first-page":"41","article-title":"A comprehensive foundation","volume":"2","author":"Haykin Simon","year":"2004","unstructured":"Simon Haykin and Neural Network . 2004 . A comprehensive foundation . Neural Networks 2 , 2004 (2004), 41 . Simon Haykin and Neural Network. 2004. A comprehensive foundation. Neural Networks 2, 2004 (2004), 41.","journal-title":"Neural Networks"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2010.5619911"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2009.2032534"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-2122-8"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.01.034"},{"key":"e_1_3_2_1_18_1","volume-title":"Detection of MMORPG Bots Based on Behavior Analysis. ACE 2008","author":"Kashifuji Yoshitaka","year":"2008","unstructured":"Yoshitaka Kashifuji . 2008 . Detection of MMORPG Bots Based on Behavior Analysis. ACE 2008 (2008), 4. Yoshitaka Kashifuji. 2008. Detection of MMORPG Bots Based on Behavior Analysis. ACE 2008 (2008), 4."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11589990_187"},{"key":"e_1_3_2_1_20_1","volume-title":"Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks 3361, 10","author":"LeCun Yann","year":"1995","unstructured":"Yann LeCun , Yoshua Bengio , and others. 1995. Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks 3361, 10 ( 1995 ), 1995. Yann LeCun, Yoshua Bengio, and others. 1995. Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks 3361, 10 (1995), 1995."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2008.4565057"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.108"},{"key":"e_1_3_2_1_23_1","first-page":"49","article-title":"Feature-based Classification of Time-series Data","volume":"10","author":"Nanopoulos Alex","year":"2001","unstructured":"Alex Nanopoulos , Rob Alcock , and Yannis Manolopoulos . 2001 . Feature-based Classification of Time-series Data . International Journal of Computer Research 10 (2001), 49 -- 61 . Alex Nanopoulos, Rob Alcock, and Yannis Manolopoulos. 2001. Feature-based Classification of Time-series Data. International Journal of Computer Research 10 (2001), 49--61.","journal-title":"International Journal of Computer Research"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.81"},{"key":"e_1_3_2_1_25_1","first-page":"52","article-title":"Cyberextortion: an overview of distributed denial of service attacks against online gaming companies","volume":"7","author":"Paulson Richard A","year":"2006","unstructured":"Richard A Paulson and James E Weber . 2006 . Cyberextortion: an overview of distributed denial of service attacks against online gaming companies . Issues in Information Systems 7 , 2 (2006), 52 -- 56 . Richard A Paulson and James E Weber. 2006. Cyberextortion: an overview of distributed denial of service attacks against online gaming companies. Issues in Information Systems 7, 2 (2006), 52--56.","journal-title":"Issues in Information Systems"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203627488"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77226-2_19"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/985921.986080"},{"key":"e_1_3_2_1_31_1","volume-title":"Play between worlds: Exploring online game culture","author":"Taylor Tina L","unstructured":"Tina L Taylor . 2009. Play between worlds: Exploring online game culture . Mit Press . Tina L Taylor. 2009. Play between worlds: Exploring online game culture. Mit Press."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1501750.1501770"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806565.1806570"},{"key":"e_1_3_2_1_34_1","volume-title":"Virtual communities as communities. Communities in cyberspace","author":"Wellman Barry","year":"1999","unstructured":"Barry Wellman and Milena Gulia . 1999. Virtual communities as communities. Communities in cyberspace ( 1999 ), 167--194. Barry Wellman and Milena Gulia. 1999. Virtual communities as communities. Communities in cyberspace (1999), 167--194."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324198.1324205"},{"key":"e_1_3_2_1_36_1","volume-title":"Maps of digital desires: Exploring the topography of gender and play in online games. Beyond Barbie and Mortal Kombat: New perspectives on gender and gaming","author":"Yee Nick","year":"2008","unstructured":"Nick Yee . 2008. Maps of digital desires: Exploring the topography of gender and play in online games. Beyond Barbie and Mortal Kombat: New perspectives on gender and gaming ( 2008 ), 83--96. Nick Yee. 2008. Maps of digital desires: Exploring the topography of gender and play in online games. Beyond Barbie and Mortal Kombat: New perspectives on gender and gaming (2008), 83--96."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08010-9_33"}],"event":{"name":"WIMS '17: 7th International Conference on Web Intelligence, Mining and Semantics","location":"Amantea Italy","acronym":"WIMS '17","sponsor":["COSPECS Dipartimento di Scienze Cognitive Psicologiche Pedagogiche e degli Studi Culturali, Universita degli Studi di Messina","Arescon Advanced Research & Solution Consulting","DISA-MIS Dipartimento di Scienze Aziendali - Management e Innovation Systems, Universita Degli Studi di Salerno","Xenia Progetti Xenia Progetti"]},"container-title":["Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3102254.3102263","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3102254.3102263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:18Z","timestamp":1750217418000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3102254.3102263"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,19]]},"references-count":35,"alternative-id":["10.1145\/3102254.3102263","10.1145\/3102254"],"URL":"https:\/\/doi.org\/10.1145\/3102254.3102263","relation":{},"subject":[],"published":{"date-parts":[[2017,6,19]]},"assertion":[{"value":"2017-06-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}