{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T07:23:48Z","timestamp":1778311428886,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["L022796"],"award-info":[{"award-number":["L022796"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3323407","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"105-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Clicktok"],"prefix":"10.1145","author":[{"given":"Shishir","family":"Nagaraja","sequence":"first","affiliation":[{"name":"University of Strathclyde"}]},{"given":"Ryan","family":"Shah","sequence":"additional","affiliation":[{"name":"University of Strathclyde"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. You can now rent a Mirai botnet of 400000 bots. https:\/\/www.bleepingcomputer.com\/news\/security\/you-can-now-rent-a-mirai-botnet-of-400-000-bots\/  2016. You can now rent a Mirai botnet of 400000 bots. https:\/\/www.bleepingcomputer.com\/news\/security\/you-can-now-rent-a-mirai-botnet-of-400-000-bots\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Patrick Billingsley. 1995. Probability and Measure (3 ed.). Wiley-Interscience. http:\/\/www.worldcat.org\/isbn\/0471007102  Patrick Billingsley. 1995. Probability and Measure (3 ed.). Wiley-Interscience. http:\/\/www.worldcat.org\/isbn\/0471007102"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593240"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/568760.568871"},{"key":"e_1_3_2_1_5_1","unstructured":"Y-Lan Boureau Jean Ponce and Yann Lecun. 2010. A Theoretical Analysis of Feature Pooling in Visual Recognition. In 27TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING HAIFA ISRAEL.   Y-Lan Boureau Jean Ponce and Yann Lecun. 2010. A Theoretical Analysis of Feature Pooling in Visual Recognition. In 27TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING HAIFA ISRAEL."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1451983.1451985"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815720"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.02.010"},{"key":"e_1_3_2_1_9_1","unstructured":"Click-spam accounting {n. d.}. The lane's gift v. google report. http:\/\/googleblog.blogspot.in\/pdf\/Tuzhilin_Report.pdf.  Click-spam accounting {n. d.}. The lane's gift v. google report. http:\/\/googleblog.blogspot.in\/pdf\/Tuzhilin_Report.pdf."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323128.1323139"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342394"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516688"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/3104322.3104326"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382283"},{"key":"e_1_3_2_1_16_1","volume-title":"NSDI","author":"Gummadi Ramakrishna","year":"2009"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764877"},{"key":"e_1_3_2_1_18_1","unstructured":"Google Inc. Accessed Mar 2018. Monkeyrunner reference. https:\/\/developer.android.com\/studio\/test\/monkeyrunner  Google Inc. Accessed Mar 2018. Monkeyrunner reference. https:\/\/developer.android.com\/studio\/test\/monkeyrunner"},{"key":"e_1_3_2_1_19_1","volume-title":"PUBCRAWL: Protecting Users and Businesses from CRAWLers. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)","author":"Jacob Gregoire","year":"2012"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1362903.1362905"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772742"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406293"},{"key":"e_1_3_2_1_23_1","volume-title":"The Goals and Challenges of Click Fraud Penetration Testing Systems. In International Symposium on Software Reliability Engineering.","author":"Kintana Carmelo","year":"2009"},{"key":"e_1_3_2_1_24_1","volume-title":"Botnets: A study and analysis. In Computational Intelligence, Cyber Security and Computational Models","author":"Kirubavathi G","year":"2014"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Brendan Kitts Jing Ying Zhang Gang Wu Wesley Brandi Julien Beasley Kieran Morrill John Ettedgui Sid Siddhartha Hong Yuan Feng Gao et al. 2015. Click fraud detection: adversarial pattern recognition over 5 years at Microsoft. In Real World Data Mining Applications. Springer 181--201.  Brendan Kitts Jing Ying Zhang Gang Wu Wesley Brandi Julien Beasley Kieran Morrill John Ettedgui Sid Siddhartha Hong Yuan Feng Gao et al. 2015. Click fraud detection: adversarial pattern recognition over 5 years at Microsoft. In Real World Data Mining Applications. Springer 181--201.","DOI":"10.1007\/978-3-319-07812-0_10"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.88"},{"key":"e_1_3_2_1_28_1","unstructured":"Daniel D. Lee and H. Sebastian Seung. 2000. Algorithms for Non-negative Matrix Factorization. In In NIPS. MIT Press 556--562.  Daniel D. Lee and H. Sebastian Seung. 2000. Algorithms for Non-negative Matrix Factorization. In In NIPS. MIT Press 556--562."},{"key":"e_1_3_2_1_29_1","volume-title":"DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Liu Bin","year":"2014"},{"key":"e_1_3_2_1_30_1","unstructured":"Wei Meng Ruian Duan and Wenke Lee. 2013. DNS Changer remediation study. Talk at M3AAWG 27th (2013).  Wei Meng Ruian Duan and Wenke Lee. 2013. DNS Changer remediation study. Talk at M3AAWG 27th (2013)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.124"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242606"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454161"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2026647.2026661"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2018.8605973"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Bob Mungamuru and Stephen Weis. 2008. In Financial Cryptography and Data Security Gene Tsudik (Ed.). Springer-Verlag Berlin Heidelberg Chapter Competition and Fraud in Online Advertising Markets 187--191.  Bob Mungamuru and Stephen Weis. 2008. In Financial Cryptography and Data Security Gene Tsudik (Ed.). Springer-Verlag Berlin Heidelberg Chapter Competition and Fraud in Online Advertising Markets 187--191.","DOI":"10.1007\/978-3-540-85230-8_16"},{"key":"e_1_3_2_1_38_1","unstructured":"G. Ollmann. 2009. Want to rent an 80-120k DDoS Botnet? Blog: Damballa. http:\/\/bit.ly\/W9Hh2x  G. Ollmann. 2009. Want to rent an 80-120k DDoS Botnet? Blog: Damballa. http:\/\/bit.ly\/W9Hh2x"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660369"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660369"},{"key":"e_1_3_2_1_41_1","unstructured":"The Selenium Project. Accessed Oct 2017. Selenium IDE. https:\/\/docs.seleniumhq.org  The Selenium Project. Accessed Oct 2017. Selenium IDE. https:\/\/docs.seleniumhq.org"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-017-0471-z"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068843"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2005.10.001"},{"key":"e_1_3_2_1_46_1","first-page":"9","article-title":"United States District Court: Microsoft vs Eric Lam et. al","author":"Western Division of Washington at Seattle United States District Court. June","year":"2009","journal-title":"Civil Case Number CO"},{"key":"e_1_3_2_1_47_1","unstructured":"Jialu Wei. 2016. DDoS on internet of things - a big alarm for the future.  Jialu Wei. 2016. DDoS on internet of things - a big alarm for the future."},{"key":"e_1_3_2_1_48_1","unstructured":"William Wu-Shyong Wei. 1994. Time series analysis. Addison-Wesley publ.  William Wu-Shyong Wei. 1994. Time series analysis. Addison-Wesley publ."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718540"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663719"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964114.1964119"},{"key":"e_1_3_2_1_52_1","unstructured":"Nicola Zingirian and Michele Benini. 2018. Click Spam Prevention Model for On-Line Advertisement. CoRR abs\/1802.02480 (2018). arXiv:1802.02480 http:\/\/arxiv.org\/abs\/1802.02480  Nicola Zingirian and Michele Benini. 2018. Click Spam Prevention Model for On-Line Advertisement. CoRR abs\/1802.02480 (2018). arXiv:1802.02480 http:\/\/arxiv.org\/abs\/1802.02480"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Miami Florida","acronym":"WiSec '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323407","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3323407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323407"}},"subtitle":["click fraud detection using traffic analysis"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":52,"alternative-id":["10.1145\/3317549.3323407","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3323407","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}