{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T07:03:26Z","timestamp":1771571006745,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308558.3313665","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"840-852","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild"],"prefix":"10.1145","author":[{"given":"Amin","family":"Kharraz","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Zane","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Paul","family":"Murley","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Charles","family":"Lever","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, USA"}]},{"given":"Joshua","family":"Mason","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Andrew","family":"Miller","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Manos","family":"Antonakakis","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, USA"}]},{"given":"Michael","family":"Bailey","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. CoinBlockerLists. https:\/\/github.com\/ZeroDot1\/CoinBlockerLists. Accessed: 07-29-2018.  {n. d.}. CoinBlockerLists. https:\/\/github.com\/ZeroDot1\/CoinBlockerLists. Accessed: 07-29-2018."},{"key":"e_1_3_2_1_2_1","unstructured":"{n. d.}. Stratum mining protocol. https:\/\/en.bitcoin.it\/wiki\/Stratum_mining_protocol. Accessed: 07-29-2018.  {n. d.}. Stratum mining protocol. https:\/\/en.bitcoin.it\/wiki\/Stratum_mining_protocol. Accessed: 07-29-2018."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. Censys. https:\/\/censys.io\/.  2018. Censys. https:\/\/censys.io\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. MinerBlock Extension. https:\/\/github.com\/xd4rker\/MinerBlock\/blob\/master\/assets\/filters.txt.  2018. MinerBlock Extension. https:\/\/github.com\/xd4rker\/MinerBlock\/blob\/master\/assets\/filters.txt."},{"key":"e_1_3_2_1_5_1","first-page":"188","article-title":"An overview of social engineering malware: Trends, tactics, and implications","volume":"33","author":"Abraham Sherly","year":"2010","unstructured":"Sherly Abraham and InduShobha Chengalur-Smith . 2010 . An overview of social engineering malware: Trends, tactics, and implications . Technology in Society 33 (2010), 188 - 196 . Sherly Abraham and InduShobha Chengalur-Smith. 2010. An overview of social engineering malware: Trends, tactics, and implications. Technology in Society 33(2010), 188-196.","journal-title":"Technology in Society"},{"key":"e_1_3_2_1_6_1","unstructured":"David Andersen. 2014. Mining Money with Monero ... and CPU vector intrinsics. https:\/\/da-data.blogspot.com\/2014\/08\/minting-money-with-monero-and-cpu.html.  David Andersen. 2014. Mining Money with Monero ... and CPU vector intrinsics. https:\/\/da-data.blogspot.com\/2014\/08\/minting-money-with-monero-and-cpu.html."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. 20th International Conference on Financial Cryptography and Data Security (FC). 441-459","author":"Arshad Sajjad","year":"2016","unstructured":"Sajjad Arshad , Amin Kharraz , and William Robertson . 2016 . Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions . In Proc. 20th International Conference on Financial Cryptography and Data Security (FC). 441-459 . Sajjad Arshad, Amin Kharraz, and William Robertson. 2016. Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions. In Proc. 20th International Conference on Financial Cryptography and Data Security (FC). 441-459."},{"key":"e_1_3_2_1_8_1","first-page":"13","volume-title":"Proceedings of the 20th USENIX Conference on Security(SEC'11)","author":"Caballero Juan","year":"2011","unstructured":"Juan Caballero , Chris Grier , Christian Kreibich , and Vern Paxson . 2011 . Measuring Pay-per-install: The Commoditization of Malware Distribution . In Proceedings of the 20th USENIX Conference on Security(SEC'11) . USENIX Association, Berkeley, CA, USA , 13 - 13 . Juan Caballero, Chris Grier, Christian Kreibich, and Vern Paxson. 2011. Measuring Pay-per-install: The Commoditization of Malware Distribution. In Proceedings of the 20th USENIX Conference on Security(SEC'11). USENIX Association, Berkeley, CA, USA, 13-13."},{"key":"e_1_3_2_1_9_1","volume-title":"Influence: Science and Practice. Writers of the","author":"Cialdini Robert B.","year":"2009","unstructured":"Robert B. Cialdini . 2009 . Influence: Science and Practice. Writers of the Round Table Press , Boston . Robert B. Cialdini. 2009. Influence: Science and Practice. Writers of the Round Table Press, Boston."},{"key":"e_1_3_2_1_10_1","unstructured":"Catalin Cimpanu. 2017. Cryptojackers Found on Starbucks WiFi Network GitHub Pirate Streaming Sites. https:\/\/www.bleepingcomputer.com\/news\/security\/cryptojackers-found-on-starbucks-wifi-network-github-pirate-streaming-sites\/.  Catalin Cimpanu. 2017. Cryptojackers Found on Starbucks WiFi Network GitHub Pirate Streaming Sites. https:\/\/www.bleepingcomputer.com\/news\/security\/cryptojackers-found-on-starbucks-wifi-network-github-pirate-streaming-sites\/."},{"key":"e_1_3_2_1_11_1","unstructured":"CoinMarketCap. 2018. Top 100 Cryptocurrencies by Market Capitalization. https:\/\/coinmarketcap.com\/.  CoinMarketCap. 2018. Top 100 Cryptocurrencies by Market Capitalization. https:\/\/coinmarketcap.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"CryptoMineDev. 2018. MinerBlock. https:\/\/chrome.google.com\/webstore\/detail\/minerblock\/emikbbbebcdfohonlaifafnoanocnebl?hl=en.  CryptoMineDev. 2018. MinerBlock. https:\/\/chrome.google.com\/webstore\/detail\/minerblock\/emikbbbebcdfohonlaifafnoanocnebl?hl=en."},{"key":"e_1_3_2_1_13_1","unstructured":"Dan Goodin. 2018. Now even YouTube serves ads with CPU-draining cryptocurrency miners. https:\/\/arstechnica.com\/information-technology\/2018\/01\/now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners\/.  Dan Goodin. 2018. Now even YouTube serves ads with CPU-draining cryptocurrency miners. https:\/\/arstechnica.com\/information-technology\/2018\/01\/now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners\/."},{"key":"e_1_3_2_1_14_1","volume-title":"Cryptojacking: Digging for Your Own Treasure. https:\/\/www.fortinet.com\/blog\/threat-research\/cryptojacking-digging-for-your-own-treasure.html.","author":"Maciejak David","year":"2017","unstructured":"David Maciejak . 2017 . Cryptojacking: Digging for Your Own Treasure. https:\/\/www.fortinet.com\/blog\/threat-research\/cryptojacking-digging-for-your-own-treasure.html. David Maciejak. 2017. Cryptojacking: Digging for Your Own Treasure. https:\/\/www.fortinet.com\/blog\/threat-research\/cryptojacking-digging-for-your-own-treasure.html."},{"key":"e_1_3_2_1_15_1","unstructured":"Willem de Groot. 2017. Cryptojacking found on 2496 online stores. https:\/\/gwillem.gitlab.io\/2017\/11\/07\/cryptojacking-found-on-2496-stores\/.  Willem de Groot. 2017. Cryptojacking found on 2496 online stores. https:\/\/gwillem.gitlab.io\/2017\/11\/07\/cryptojacking-found-on-2496-stores\/."},{"key":"e_1_3_2_1_16_1","volume-title":"A first look at browser-based Cryptojacking. CoRR","author":"Eskandari Shayan","year":"2018","unstructured":"Shayan Eskandari , Andreas Leoutsarakos , Troy Mursch , and Jeremy Clark . 2018. A first look at browser-based Cryptojacking. CoRR ( 2018 ). Shayan Eskandari, Andreas Leoutsarakos, Troy Mursch, and Jeremy Clark. 2018. A first look at browser-based Cryptojacking. CoRR (2018)."},{"key":"e_1_3_2_1_17_1","unstructured":"Google Chromium. 2017. Chrome debugging protocol viewer. https:\/\/chromedevtools.github.io\/devtools-protocol\/.  Google Chromium. 2017. Chrome debugging protocol viewer. https:\/\/chromedevtools.github.io\/devtools-protocol\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Google Development. 2018. Extending DevTools. https:\/\/developer.chrome.com\/extensions\/devtools.  Google Development. 2018. Extending DevTools. https:\/\/developer.chrome.com\/extensions\/devtools."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764877"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243840"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23044"},{"key":"e_1_3_2_1_22_1","unstructured":"Product Hunt. 2018. Inwemo. https:\/\/www.producthunt.com\/posts\/inwemo.  Product Hunt. 2018. Inwemo. https:\/\/www.producthunt.com\/posts\/inwemo."},{"key":"e_1_3_2_1_23_1","unstructured":"Ian Hickson. 2009. W3C Working Draft: Web Workers. https:\/\/www.w3.org\/TR\/2009\/WD-workers-20090423\/.  Ian Hickson. 2009. W3C Working Draft: Web Workers. https:\/\/www.w3.org\/TR\/2009\/WD-workers-20090423\/."},{"key":"e_1_3_2_1_24_1","unstructured":"Jerome Segura. 2018. The state of malicious cryptomining. https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/state-malicious-cryptomining\/.  Jerome Segura. 2018. The state of malicious cryptomining. https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/state-malicious-cryptomining\/."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceeding of 25th USENIX Security Symposium. 192-203","author":"Kharraz Amin","year":"2016","unstructured":"Amin Kharraz , Sajjad Arshad , Collin Mulliner , William Robertson , and Engin Kirda . 2016 . UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware . In Proceeding of 25th USENIX Security Symposium. 192-203 . Amin Kharraz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda. 2016. UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. In Proceeding of 25th USENIX Security Symposium. 192-203."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.103"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00044"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053035"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243858"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241152"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813724"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382267"},{"key":"e_1_3_2_1_35_1","unstructured":"Lindsey O'Donnell. 2018. Cryptojacking Attack Found on Los Angeles Times Website. https:\/\/threatpost.com\/cryptojacking-attack-found-on-los-angeles-times-website\/130041\/.  Lindsey O'Donnell. 2018. Cryptojacking Attack Found on Los Angeles Times Website. https:\/\/threatpost.com\/cryptojacking-attack-found-on-los-angeles-times-website\/130041\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Lindsey O'Donnell. 2018. Cryptojacking Campaign Exploits Drupal Bug Over 400 Websites Attacked. https:\/\/threatpost.com\/cryptojacking-campaign-exploits-drupal-bug-over-400-websites-attacked\/131733\/.  Lindsey O'Donnell. 2018. Cryptojacking Campaign Exploits Drupal Bug Over 400 Websites Attacked. https:\/\/threatpost.com\/cryptojacking-campaign-exploits-drupal-bug-over-400-websites-attacked\/131733\/."},{"key":"e_1_3_2_1_37_1","volume-title":"Chen","author":"Liu Chaoying","year":"2018","unstructured":"Chaoying Liu and Joseph C . Chen . 2018 . Malvertising Campaign Abuses Google's DoubleClick to Deliver Cryptocurrency Miners . https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/malvertising-campaign-abuses-googles-doubleclick-to-deliver-cryptocurrency-miners\/. Chaoying Liu and Joseph C. Chen. 2018. Malvertising Campaign Abuses Google's DoubleClick to Deliver Cryptocurrency Miners. https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/malvertising-campaign-abuses-googles-doubleclick-to-deliver-cryptocurrency-miners\/."},{"key":"e_1_3_2_1_38_1","unstructured":"Malwarebytes Inc.2017. A look into the global drive-by cryptocurrency mining phenomenon. https:\/\/go.malwarebytes.com\/rs\/805-USG-300\/images\/Drive-by_Mining_FINAL.pdf.  Malwarebytes Inc.2017. A look into the global drive-by cryptocurrency mining phenomenon. https:\/\/go.malwarebytes.com\/rs\/805-USG-300\/images\/Drive-by_Mining_FINAL.pdf."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23163"},{"key":"e_1_3_2_1_40_1","unstructured":"Marius Musch Christian Wressnegger Martin Johns and Konrad Rieck. 2018. Web-based Cryptojacking in the Wild. arXiv preprint arXiv:1808.09474(2018).  Marius Musch Christian Wressnegger Martin Johns and Konrad Rieck. 2018. Web-based Cryptojacking in the Wild. arXiv preprint arXiv:1808.09474(2018)."},{"key":"e_1_3_2_1_41_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2009","unstructured":"Satoshi Nakamoto . 2009 . Bitcoin: A peer-to-peer electronic cash system . http:\/\/www.bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2009. Bitcoin: A peer-to-peer electronic cash system. http:\/\/www.bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241154"},{"key":"e_1_3_2_1_43_1","volume-title":"Hack Brief: Hackers Enlisted Tesla's Public Cloud To Mine Cryptocurrency. https:\/\/www.wired.com\/story\/cryptojacking-tesla-amazon-cloud\/.","author":"Newman Lily Hay","year":"2018","unstructured":"Lily Hay Newman . 2018 . Hack Brief: Hackers Enlisted Tesla's Public Cloud To Mine Cryptocurrency. https:\/\/www.wired.com\/story\/cryptojacking-tesla-amazon-cloud\/. Lily Hay Newman. 2018. Hack Brief: Hackers Enlisted Tesla's Public Cloud To Mine Cryptocurrency. https:\/\/www.wired.com\/story\/cryptojacking-tesla-amazon-cloud\/."},{"key":"e_1_3_2_1_44_1","volume-title":"IEEE International Conference on Distributed Computing Systems (ICDCS).","author":"Nolen Scaife Patrick Traynor","year":"2016","unstructured":"Patrick Traynor Nolen Scaife , Henry Carterand Kevin Butler . 2016 . CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data . In IEEE International Conference on Distributed Computing Systems (ICDCS). Patrick Traynor Nolen Scaife, Henry Carterand Kevin Butler. 2016. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. In IEEE International Conference on Distributed Computing Systems (ICDCS)."},{"key":"e_1_3_2_1_45_1","unstructured":"Rafael Keramidas. 2018. No Coin. https:\/\/github.com\/keraf\/NoCoin\/blob\/master\/src\/js\/background.js.  Rafael Keramidas. 2018. No Coin. https:\/\/github.com\/keraf\/NoCoin\/blob\/master\/src\/js\/background.js."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Jan R\u00fcth Torsten Zimmermann Konrad Wolsing and Oliver Hohlfeld. 2018. Digging into Browser-based Crypto Mining. arXiv preprint arXiv:1808.00811(2018).  Jan R\u00fcth Torsten Zimmermann Konrad Wolsing and Oliver Hohlfeld. 2018. Digging into Browser-based Crypto Mining. arXiv preprint arXiv:1808.00811(2018).","DOI":"10.1145\/3278532.3278539"},{"key":"e_1_3_2_1_47_1","unstructured":"scikit-learn. 2018. scikit-learn: machine learning in Python. https:\/\/github.com\/scikit-learn\/scikit-learn.  scikit-learn. 2018. scikit-learn: machine learning in Python. https:\/\/github.com\/scikit-learn\/scikit-learn."},{"key":"e_1_3_2_1_48_1","volume-title":"Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. In USENIX Security Symposium.","author":"Thomas Kurt","year":"2016","unstructured":"Kurt Thomas , Juan A. Elices Crespo , Ryan Rasti , Jean-Michel Picod , Cait Phillips , Marc-Andre\u00b4 Decoste , Chris Sharp , Fabio Tirelo , Ali Tofigh , Marc-Antoine Courteau , Lucas Ballard , Robert Shield , Nav Jagpal , Moheeb Abu Rajab , Panayiotis Mavrommatis , Niels Provos , Elie Bursztein , and Damon McCoy . 2016 . Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. In USENIX Security Symposium. Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-Andre\u00b4 Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, and Damon McCoy. 2016. Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. In USENIX Security Symposium."},{"key":"e_1_3_2_1_49_1","unstructured":"tunghobrens. 2018. AntiMiner - No 1 Coin MinerBlock. https:\/\/chrome.google.com\/webstore\/detail\/anti-miner-no-1-coin-mine\/ibhpgkhoicjhklmbhdoeikeggbeejonj?hl=en.  tunghobrens. 2018. AntiMiner - No 1 Coin MinerBlock. https:\/\/chrome.google.com\/webstore\/detail\/anti-miner-no-1-coin-mine\/ibhpgkhoicjhklmbhdoeikeggbeejonj?hl=en."},{"key":"e_1_3_2_1_50_1","unstructured":"Jordan Tuwiner. {n. d.}. Bitcoin Mining Pools. https:\/\/www.buybitcoinworldwide.com\/mining\/pools\/. accessed: 01-29-2019.  Jordan Tuwiner. {n. d.}. Bitcoin Mining Pools. https:\/\/www.buybitcoinworldwide.com\/mining\/pools\/. accessed: 01-29-2019."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_31"},{"key":"e_1_3_2_1_52_1","unstructured":"Wappalyzer. {n. d.}. MinerBlock. https:\/\/www.wappalyzer.com\/download. accessed: 01-23-2019.  Wappalyzer. {n. d.}. MinerBlock. https:\/\/www.wappalyzer.com\/download. accessed: 01-23-2019."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/01402398208437106"},{"key":"e_1_3_2_1_54_1","unstructured":"World Wide Web Consortium. 2018. WebAssembly Specifications. https:\/\/webassembly.github.io\/spec\/.  World Wide Web Consortium. 2018. WebAssembly Specifications. https:\/\/webassembly.github.io\/spec\/."},{"key":"e_1_3_2_1_55_1","unstructured":"James Wyke. 2012. ZeroAccess Botnet - Mining and Fraud for Massive Financial Gain. https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/technical%20papers\/Sophos_ZeroAccess_Botnet.pdf.  James Wyke. 2012. ZeroAccess Botnet - Mining and Fraud for Massive Financial Gain. https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/technical%20papers\/Sophos_ZeroAccess_Botnet.pdf."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663719"}],"event":{"name":"WWW '19: The Web Conference","location":"San Francisco CA USA","acronym":"WWW '19","sponsor":["IW3C2 International World Wide Web Conference Committee"]},"container-title":["The World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313665","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308558.3313665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:31Z","timestamp":1750204411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313665"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":56,"alternative-id":["10.1145\/3308558.3313665","10.1145\/3308558"],"URL":"https:\/\/doi.org\/10.1145\/3308558.3313665","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}