{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:15:05Z","timestamp":1774880105684,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Directorate-General for the Fight against Counterfeiting - Italian Patent and Trademark Office"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,23]]},"DOI":"10.1145\/3106426.3106441","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T12:12:36Z","timestamp":1502367156000},"page":"403-410","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Learning to detect and measure fake ecommerce websites in search-engine results"],"prefix":"10.1145","author":[{"given":"Claudio","family":"Carpineto","sequence":"first","affiliation":[{"name":"Fondazione Ugo Bordoni, Rome, Italy"}]},{"given":"Giovanni","family":"Romano","sequence":"additional","affiliation":[{"name":"Fondazione Ugo Bordoni, Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51963-0_32"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence. 1--10","author":"Bannur S. N.","unstructured":"S. N. Bannur , L. K. Saul , and S. Savage . 2011. BINSPECT: Holistic Analysis and Detection of Malicious Web Pages . In Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence. 1--10 . S. N. Bannur, L. K. Saul, and S. Savage. 2011. BINSPECT: Holistic Analysis and Detection of Malicious Web Pages. In Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence. 1--10."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508434"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963436"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994622"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623354"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2016.10.002"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of SecureComm 2012: Security and Privacy in Communication Networks. 149--166","author":"Eshete Birhanu","year":"2012","unstructured":"Birhanu Eshete , Adolfo Villafiorita , and Komminist Weldemariam . 2012 . Judging a site by its content: learning the textual, structural, and visual features of malicious web pages . In Proceedings of SecureComm 2012: Security and Privacy in Communication Networks. 149--166 . Birhanu Eshete, Adolfo Villafiorita, and Komminist Weldemariam. 2012. Judging a site by its content: learning the textual, structural, and visual features of malicious web pages. In Proceedings of SecureComm 2012: Security and Privacy in Communication Networks. 149--166."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of 2015 International Conference on Web Information Systems and Technologies (WEBIST","author":"Horch Andrea","year":"2015","unstructured":"Andrea Horch , Holger Kette , and Anette Weisbecker . 2015 . Extracting Product Offers from e-Shop Websites . In Proceedings of 2015 International Conference on Web Information Systems and Technologies (WEBIST 2015), Heraklion, Greece. Springer, 232--251. Andrea Horch, Holger Kette, and Anette Weisbecker. 2015. Extracting Product Offers from e-Shop Websites. In Proceedings of 2015 International Conference on Web Information Systems and Technologies (WEBIST 2015), Heraklion, Greece. Springer, 232--251."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of USENIX Security","author":"Leontiadis N.","year":"2011","unstructured":"N. Leontiadis , T. Moore , and N. Christin . 2011. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade . In Proceedings of USENIX Security 2011 , San Francisco, CA, USA. N. Leontiadis, T. Moore, and N. Christin. 2011. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In Proceedings of USENIX Security 2011, San Francisco, CA, USA."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2012.031"},{"key":"e_1_3_2_1_13_1","volume-title":"Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact","author":"EUIPO.","unstructured":"OECD\/ EUIPO. 2016. Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact . OECD Publishing , Paris . OECD\/EUIPO. 2016. Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact. OECD Publishing, Paris."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2410795"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695818"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741658"},{"key":"e_1_3_2_1_17_1","unstructured":"John R. Wadleigh. 2015. Tracking how cybercriminals compromise websites to sell counterfeit goods. Master's thesis. Bobby B. Lyle School of Engineering: Department of Computer Science Southern Methodist University Texas USA.  John R. Wadleigh. 2015. Tracking how cybercriminals compromise websites to sell counterfeit goods . Master's thesis. Bobby B. Lyle School of Engineering: Department of Computer Science Southern Methodist University Texas USA."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663738"},{"key":"e_1_3_2_1_19_1","volume-title":"Chih chung Chang, and Chih jen Lin","author":"Hsu Chih","year":"2010","unstructured":"Chih wei Hsu , Chih chung Chang, and Chih jen Lin . 2010 . A practical guide to support vector classification. (2010). Chih wei Hsu, Chih chung Chang, and Chih jen Lin. 2010. A practical guide to support vector classification. (2010)."}],"event":{"name":"WI '17: International Conference on Web Intelligence 2017","location":"Leipzig Germany","acronym":"WI '17","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","TCII IEEE Computer Society Technical Committee on Intelligent Informatics","Web Intelligence Consortium"]},"container-title":["Proceedings of the International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106441","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106426.3106441","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:17Z","timestamp":1750217417000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106441"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"references-count":18,"alternative-id":["10.1145\/3106426.3106441","10.1145\/3106426"],"URL":"https:\/\/doi.org\/10.1145\/3106426.3106441","relation":{},"subject":[],"published":{"date-parts":[[2017,8,23]]},"assertion":[{"value":"2017-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}