{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:56:05Z","timestamp":1773510965636,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010683","name":"H2020 Security","doi-asserted-by":"publisher","award":["700024"],"award-info":[{"award-number":["700024"]}],"id":[{"id":"10.13039\/100010683","id-type":"DOI","asserted-by":"publisher"}]},{"name":"H2020 Marie Sk?odowska-Curie Actions","award":["778229"],"award-info":[{"award-number":["778229"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3339267","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Towards a framework for detecting advanced Web bots"],"prefix":"10.1145","author":[{"given":"Christos","family":"Iliou","sequence":"first","affiliation":[{"name":"Information Technologies Institute, CERTH, Thessaloniki, Greece, Dept. of Computing and Informatics, Bournemouth University, Bournemouth, United Kingdom"}]},{"given":"Theodoros","family":"Kostoulas","sequence":"additional","affiliation":[{"name":"Dept. of Computing and Informatics, Bournemouth University, Bournemouth, United Kingdom"}]},{"given":"Theodora","family":"Tsikrika","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, CERTH, Thessaloniki, Greece"}]},{"given":"Vasilis","family":"Katos","sequence":"additional","affiliation":[{"name":"Dept. of Computing and Informatics, Bournemouth University, Bournemouth, United Kingdom"}]},{"given":"Stefanos","family":"Vrochidis","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, CERTH, Thessaloniki, Greece"}]},{"given":"Yiannis","family":"Kompatsiaris","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, CERTH, Thessaloniki, Greece"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Akamai. 2018. Akamai's Bot Manager - Advanced strategies to flexibly manage the long-term business and IT impact of bots. https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/product-brief\/bot-manager-product-brief.pdf  Akamai. 2018. Akamai's Bot Manager - Advanced strategies to flexibly manage the long-term business and IT impact of bots. https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/product-brief\/bot-manager-product-brief.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2014.6900644"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2467696.2467722"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.363"},{"key":"e_1_3_2_1_5_1","volume-title":"Communication and Computational Technologies (ICCICCT), 2014 International Conference on. IEEE, 632--636","author":"Bhargav Anshul","year":"2014"},{"key":"e_1_3_2_1_6_1","volume-title":"11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17).","author":"Bock Kevin"},{"key":"e_1_3_2_1_7_1","volume-title":"Online Web Bot Detection Using a Sequential Classification Approach. In 2018 IEEE 20th International Conference on High Performance Computing and Communications","author":"Cabri Alberto"},{"key":"e_1_3_2_1_8_1","volume-title":"From Database to Cyber Security","author":"Chu Zi"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070109"},{"key":"e_1_3_2_1_10_1","unstructured":"Distil Networks. 2018. 2018 BAD BOT REPORT: The Year Bad Bots Went Mainstream. https:\/\/resources.distilnetworks.com\/white-paper-reports\/2018-bad-bot-report  Distil Networks. 2018. 2018 BAD BOT REPORT: The Year Bad Bots Went Mainstream. https:\/\/resources.distilnetworks.com\/white-paper-reports\/2018-bad-bot-report"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Wang Dong Xi Lei Zhang Hui Liu Hebing Zhang Hao and Song Ting. 2015. Web robot detection with semi-supervised learning method. (2015).  Wang Dong Xi Lei Zhang Hui Liu Hebing Zhang Hao and Song Ting. 2015. Web robot detection with semi-supervised learning method. (2015).","DOI":"10.2991\/ic3me-15.2015.407"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22741"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12184"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2476-4"},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Security Symposium. 507--522","author":"Jacob Gregoire","year":"2012"},{"key":"e_1_3_2_1_17_1","unstructured":"Otterbach Johannes. 2016. Principal Component Analysis (PCA) for Feature Selection and some of its Pitfalls. http:\/\/jotterbach.github.io\/2016\/03\/24\/Principal_Component_Analysis\/  Otterbach Johannes. 2016. Principal Component Analysis (PCA) for Feature Selection and some of its Pitfalls. http:\/\/jotterbach.github.io\/2016\/03\/24\/Principal_Component_Analysis\/"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/HMI.2016.7449167"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(94)90127-9"},{"key":"e_1_3_2_1_21_1","volume-title":"Italian Workshop on Neural Nets. Springer, 197--206","author":"Rovetta Stefano","year":"2017"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.53"},{"key":"e_1_3_2_1_23_1","volume-title":"Detection of Attack-Targeted Scans from The Apache HTTP Server Access Logs. Applied Computing and Informatics","author":"Seyyar Merve Ba\u015f","year":"2017"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCSSE.2012.6261924"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.4236\/jdaip.2015.31001"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.01.210"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.08.028"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766196"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Security Symposium","volume":"9","author":"Wang Gang","year":"2013"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.93"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.06.004"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","location":"Canterbury CA United Kingdom","acronym":"ARES '19"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339267","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3339267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339267"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":31,"alternative-id":["10.1145\/3339252.3339267","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3339267","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}