{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:07Z","timestamp":1750220527000,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/M507970\/1"],"award-info":[{"award-number":["EP\/M507970\/1"]}]},{"name":"NSF","award":["CNS-1942610"],"award-info":[{"award-number":["CNS-1942610"]}]},{"name":"The Royal Society","award":["UF160505"],"award-info":[{"award-number":["UF160505"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3471621.3471844","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:50:46Z","timestamp":1633618246000},"page":"340-353","source":"Crossref","is-referenced-by-count":2,"title":["Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown"],"prefix":"10.1145","author":[{"given":"Colin C.","family":"Ife","sequence":"first","affiliation":[{"name":"University College London, UK"}]},{"given":"Yun","family":"Shen","sequence":"additional","affiliation":[{"name":"NortonLifeLock Research Group"}]},{"given":"Steven J.","family":"Murdoch","sequence":"additional","affiliation":[{"name":"University College London, UK"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Boston University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Botnet activity in H1 2018: Multifunctional bots becoming more widespread | Kaspersky Lab. https:\/\/www.kaspersky.com\/about\/press-releases\/2018_botnet-activity-in-h1-2018-multifunctional-bots-becoming-more-widespread. Accessed: 2018-12-01.  [n.d.]. Botnet activity in H1 2018: Multifunctional bots becoming more widespread | Kaspersky Lab. https:\/\/www.kaspersky.com\/about\/press-releases\/2018_botnet-activity-in-h1-2018-multifunctional-bots-becoming-more-widespread. Accessed: 2018-12-01."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Bugat Botnet Administrator Arrested and Malware Disabled \u2014 FBI. https:\/\/www.fbi.gov\/contact-us\/field-offices\/pittsburgh\/news\/press-releases\/bugat-botnet-administrator-arrested-and-malware-disabled. [Accessed online: 11-September-2020].  [n.d.]. Bugat Botnet Administrator Arrested and Malware Disabled \u2014 FBI. https:\/\/www.fbi.gov\/contact-us\/field-offices\/pittsburgh\/news\/press-releases\/bugat-botnet-administrator-arrested-and-malware-disabled. [Accessed online: 11-September-2020]."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Endpoint Protection - Symantec Enterprise (Dyre). https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=82c547f6-ce80-4fe6-b055-f64c962158d8&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments. [Accessed online: 11-September-2020].  [n.d.]. Endpoint Protection - Symantec Enterprise (Dyre). https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=82c547f6-ce80-4fe6-b055-f64c962158d8&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments. [Accessed online: 11-September-2020]."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. Endpoint Protection - Symantec Enterprise (Dyre). https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=82c547f6-ce80-4fe6-b055-f64c962158d8&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments. [Accessed online: 11-September-2020].  [n.d.]. Endpoint Protection - Symantec Enterprise (Dyre). https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=82c547f6-ce80-4fe6-b055-f64c962158d8&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments. [Accessed online: 11-September-2020]."},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. Trojan.Dridex. https:\/\/blog.malwarebytes.com\/detections\/trojan-dridex\/. [Accessed online: 11-September-2020].  [n.d.]. Trojan.Dridex. https:\/\/blog.malwarebytes.com\/detections\/trojan-dridex\/. [Accessed online: 11-September-2020]."},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. VirusTotal. https:\/\/www.virustotal.com.  [n.d.]. VirusTotal. https:\/\/www.virustotal.com."},{"key":"e_1_3_2_1_7_1","unstructured":"[n.d.]. White hats FBI and cops team up for Dorkbot botnet takedown. https:\/\/www.theregister.com\/2015\/12\/04\/dorkbot_botnet_takedown\/. [Accessed online: 11-September-2020].  [n.d.]. White hats FBI and cops team up for Dorkbot botnet takedown. https:\/\/www.theregister.com\/2015\/12\/04\/dorkbot_botnet_takedown\/. [Accessed online: 11-September-2020]."},{"key":"e_1_3_2_1_8_1","unstructured":"[n.d.]. Win32\/Dorkbot threat description - Microsoft Security Intelligence. https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Win32%2fDorkbot. [Accessed online: 11-September-2020].  [n.d.]. Win32\/Dorkbot threat description - Microsoft Security Intelligence. https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Win32%2fDorkbot. [Accessed online: 11-September-2020]."},{"key":"e_1_3_2_1_9_1","unstructured":"2015. Bugat Botnet Administrator Arrested and Malware Disabled. https:\/\/www.justice.gov\/opa\/pr\/bugat-botnet-administrator-arrested-and-malware-disabled. [Accessed online: 11-September-2020].  2015. Bugat Botnet Administrator Arrested and Malware Disabled. https:\/\/www.justice.gov\/opa\/pr\/bugat-botnet-administrator-arrested-and-malware-disabled. [Accessed online: 11-September-2020]."},{"key":"e_1_3_2_1_10_1","unstructured":"2015. Cloud power disrupts global malware (Dorkbot). https:\/\/blogs.microsoft.com\/on-the-issues\/2015\/12\/17\/cloud-power-disrupts-global-malware\/. Section: Microsoft on the Issues.  2015. Cloud power disrupts global malware (Dorkbot). https:\/\/blogs.microsoft.com\/on-the-issues\/2015\/12\/17\/cloud-power-disrupts-global-malware\/. Section: Microsoft on the Issues."},{"key":"e_1_3_2_1_11_1","unstructured":"2015. Dorkbot botnets disruption. https:\/\/www.cert.pl\/en\/news\/single\/dorkbot-botnets-disruption\/. [Accessed online: 11-September-2020].  2015. Dorkbot botnets disruption. https:\/\/www.cert.pl\/en\/news\/single\/dorkbot-botnets-disruption\/. [Accessed online: 11-September-2020]."},{"key":"e_1_3_2_1_12_1","unstructured":"2015. News from the Dorkside: Dorkbot botnet disrupted. https:\/\/www.welivesecurity.com\/2015\/12\/03\/news-from-the-dorkside-dorkbot-botnet-disrupted\/. [Accessed online: 11-September-2020].  2015. News from the Dorkside: Dorkbot botnet disrupted. https:\/\/www.welivesecurity.com\/2015\/12\/03\/news-from-the-dorkside-dorkbot-botnet-disrupted\/. [Accessed online: 11-September-2020]."},{"key":"e_1_3_2_1_13_1","unstructured":"2018. Upatre Continued to Evolve with new Anti-Analysis Techniques. https:\/\/unit42.paloaltonetworks.com\/unit42-upatre-continues-evolve-new-anti-analysis-techniques\/. [Accessed online: 11-September-2020].  2018. Upatre Continued to Evolve with new Anti-Analysis Techniques. https:\/\/unit42.paloaltonetworks.com\/unit42-upatre-continues-evolve-new-anti-analysis-techniques\/. [Accessed online: 11-September-2020]."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177086"},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Security Symposium.","author":"Antonakakis Manos","year":"2012","unstructured":"Manos Antonakakis , Roberto Perdisci , Yacin Nadji , Nikolaos Vasiloglou , Saeed Abu-Nimeh , Wenke Lee , and David Dagon . 2012 . From throw-away traffic to bots: detecting the rise of DGA-based malware . In USENIX Security Symposium. Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, and David Dagon. 2012. From throw-away traffic to bots: detecting the rise of DGA-based malware. In USENIX Security Symposium."},{"key":"e_1_3_2_1_16_1","unstructured":"Ulrich Bayer Imam Habibi Davide Balzarotti Engin Kirda and Christopher Kruegel. 2009. A View on Current Malware Behaviors.. In LEET.  Ulrich Bayer Imam Habibi Davide Balzarotti Engin Kirda and Christopher Kruegel. 2009. A View on Current Malware Behaviors.. In LEET."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Hamad Binsalleeh Thomas Ormerod Amine Boukhtouta Prosenjit Sinha Amr Youssef Mourad Debbabi and Lingyu Wang. 2010. On the analysis of the zeus botnet crimeware toolkit. In Privacy Security and Trust (PST).  Hamad Binsalleeh Thomas Ormerod Amine Boukhtouta Prosenjit Sinha Amr Youssef Mourad Debbabi and Lingyu Wang. 2010. On the analysis of the zeus botnet crimeware toolkit. In Privacy Security and Trust (PST).","DOI":"10.1109\/PST.2010.5593240"},{"key":"e_1_3_2_1_18_1","unstructured":"Thomas Brewster. [n.d.]. Russian Cops Bust Key Members Of World\u2019s Busiest Cybercrime Gang: Sources (Dyre). https:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/02\/08\/russia-arrests-dyre-malware-masterminds\/. [Accessed online: 11-September-2020].  Thomas Brewster. [n.d.]. Russian Cops Bust Key Members Of World\u2019s Busiest Cybercrime Gang: Sources (Dyre). https:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/02\/08\/russia-arrests-dyre-malware-masterminds\/. [Accessed online: 11-September-2020]."},{"key":"e_1_3_2_1_19_1","unstructured":"Juan Caballero Chris Grier Christian Kreibich and Vern Paxson. 2011. Measuring pay-per-install: the commoditization of malware distribution.. In Usenix security symposium. 13\u201313.  Juan Caballero Chris Grier Christian Kreibich and Vern Paxson. 2011. Measuring pay-per-install: the commoditization of malware distribution.. In Usenix security symposium. 13\u201313."},{"key":"e_1_3_2_1_20_1","first-page":"551","article-title":"Robots, Pirates, and the Rise of the Automated Takedown Regime: Using the DMCA to Fight Piracy and Protect End-Users","volume":"39","author":"Carpou Zoe","year":"2015","unstructured":"Zoe Carpou . 2015 . Robots, Pirates, and the Rise of the Automated Takedown Regime: Using the DMCA to Fight Piracy and Protect End-Users . Colum. JL & Arts 39 (2015), 551 . Zoe Carpou. 2015. Robots, Pirates, and the Rise of the Automated Takedown Regime: Using the DMCA to Fight Piracy and Protect End-Users. Colum. JL & Arts 39(2015), 551.","journal-title":"Colum. JL & Arts"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime47957.2019.9037589"},{"key":"e_1_3_2_1_22_1","unstructured":"Ronald\u00a0V. Clarke (Ed.). 1997. Situational crime prevention: successful case studies (2. ed ed.). Harrow and Heston Guilderland NY. OCLC: 36877499.  Ronald\u00a0V. Clarke (Ed.). 1997. Situational crime prevention: successful case studies (2. ed ed.). Harrow and Heston Guilderland NY. OCLC: 36877499."},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of 6th CEAS","author":"Clayton Richard","year":"2009","unstructured":"Richard Clayton . 2009 . How much did shutting down McColo help . Proc. of 6th CEAS (2009). Richard Clayton. 2009. How much did shutting down McColo help. Proc. of 6th CEAS (2009)."},{"volume-title":"Presented as part of the 5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats.","author":"Dittrich David","key":"e_1_3_2_1_24_1","unstructured":"David Dittrich . 2012. So You Want to Take Over a Botnet .... In Presented as part of the 5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats. David Dittrich. 2012. So You Want to Take Over a Botnet.... In Presented as part of the 5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818010"},{"key":"e_1_3_2_1_26_1","volume-title":"Gearing up against crime: A dynamic framework to help designers keep up with the adaptive criminal in a changing world. 2 (Jan","author":"Ekblom Paul","year":"1997","unstructured":"Paul Ekblom . 1997. Gearing up against crime: A dynamic framework to help designers keep up with the adaptive criminal in a changing world. 2 (Jan . 1997 ), 249\u2013265. Paul Ekblom. 1997. Gearing up against crime: A dynamic framework to help designers keep up with the adaptive criminal in a changing world. 2 (Jan. 1997), 249\u2013265."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23237"},{"key":"e_1_3_2_1_28_1","unstructured":"Rene B\u00a0P Hesseling. [n.d.]. Displacement: A review of the empirical literature.([n.\u00a0d.]) 34.  Rene B\u00a0P Hesseling. [n.d.]. Displacement: A review of the empirical literature.([n.\u00a0d.]) 34."},{"key":"e_1_3_2_1_29_1","volume-title":"Measuring and Detecting Fast-Flux Service Networks. In Network and Distributed Systems Security Symposium (NDSS).","author":"Holz Thorsten","year":"2008","unstructured":"Thorsten Holz , Christian Gorecki , Konrad Rieck , and Felix\u00a0 C Freiling . 2008 . Measuring and Detecting Fast-Flux Service Networks. In Network and Distributed Systems Security Symposium (NDSS). Thorsten Holz, Christian Gorecki, Konrad Rieck, and Felix\u00a0C Freiling. 2008. Measuring and Detecting Fast-Flux Service Networks. In Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_1_30_1","unstructured":"Colin\u00a0C Ife Toby Davies Steven\u00a0J Murdoch and Gianluca Stringhini. 2019. Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime. arXiv preprint arXiv:1910.06380(2019).  Colin\u00a0C Ife Toby Davies Steven\u00a0J Murdoch and Gianluca Stringhini. 2019. Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime. arXiv preprint arXiv:1910.06380(2019)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329807"},{"key":"e_1_3_2_1_32_1","unstructured":"Brett Stone-Gross and Pallav\u00a0Khandhar Intelligence Dell SecureWorks Counter Threat Unit\u2122\u00a0Threat. [n.d.]. Dyre Banking Trojan Threat Analysis. https:\/\/www.secureworks.com\/research\/dyre-banking-trojan. [Accessed online: 11-September-2020].  Brett Stone-Gross and Pallav\u00a0Khandhar Intelligence Dell SecureWorks Counter Threat Unit\u2122\u00a0Threat. [n.d.]. Dyre Banking Trojan Threat Analysis. https:\/\/www.secureworks.com\/research\/dyre-banking-trojan. [Accessed online: 11-September-2020]."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813724"},{"key":"e_1_3_2_1_34_1","first-page":"237","article-title":"Microsoft the botnet hunter: the role of public-private partnerships in mitigating botnets","volume":"28","author":"Lerner Zach","year":"2014","unstructured":"Zach Lerner . 2014 . Microsoft the botnet hunter: the role of public-private partnerships in mitigating botnets . Harv. JL & Tech. 28 (2014), 237 . Zach Lerner. 2014. Microsoft the botnet hunter: the role of public-private partnerships in mitigating botnets. Harv. JL & Tech. 28(2014), 237.","journal-title":"Harv. JL & Tech."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.59"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516749"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2496176"},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Security Symposium.","author":"Nelms Terry","year":"2015","unstructured":"Terry Nelms , Roberto Perdisci , Manos Antonakakis , and Mustaque Ahamad . 2015 . WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths . In USENIX Security Symposium. Terry Nelms, Roberto Perdisci, Manos Antonakakis, and Mustaque Ahamad. 2015. WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths. In USENIX Security Symposium."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355585"},{"key":"e_1_3_2_1_40_1","volume-title":"USENIX Security Symposium.","author":"Plohmann Daniel","year":"2016","unstructured":"Daniel Plohmann , Khaled Yakdan , Michael Klatt , Johannes Bader , and Elmar Gerhards-Padilla . 2016 . A Comprehensive Measurement Study of Domain Generating Malware . In USENIX Security Symposium. Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, and Elmar Gerhards-Padilla. 2016. A Comprehensive Measurement Study of Domain Generating Malware. In USENIX Security Symposium."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Christian Rossow Christian Dietrich and Herbert Bos. 2013. Large-Scale Analysis of Malware Downloaders. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).  Christian Rossow Christian Dietrich and Herbert Bos. 2013. Large-Scale Analysis of Malware Downloaders. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).","DOI":"10.1007\/978-3-642-37300-8_3"},{"key":"e_1_3_2_1_42_1","volume-title":"AVclass: A Tool for Massive Malware Labeling. In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID).","author":"Sebasti\u00e1n Marcos","year":"2016","unstructured":"Marcos Sebasti\u00e1n , Richard Rivera , Platon Kotzias , and Juan Caballero . 2016 . AVclass: A Tool for Massive Malware Labeling. In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID). Marcos Sebasti\u00e1n, Richard Rivera, Platon Kotzias, and Juan Caballero. 2016. AVclass: A Tool for Massive Malware Labeling. In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID)."},{"key":"e_1_3_2_1_43_1","first-page":"4","article-title":"Defiance, Deterrence, and Irrelevance: A Theory of the Criminal Sanction","volume":"30","author":"E\u00a0W.","year":"1993","unstructured":"LAWRENC E\u00a0W. SHERMAN. 1993 . Defiance, Deterrence, and Irrelevance: A Theory of the Criminal Sanction . Journal of Research in Crime and Delinquency 30 , 4 (Nov. 1993), 445\u2013473. https:\/\/doi.org\/10.1177\/0022427893030004006 Publisher: SAGE Publications Inc. LAWRENCE\u00a0W. SHERMAN. 1993. Defiance, Deterrence, and Irrelevance: A Theory of the Criminal Sanction. Journal of Research in Crime and Delinquency 30, 4 (Nov. 1993), 445\u2013473. https:\/\/doi.org\/10.1177\/0022427893030004006 Publisher: SAGE Publications Inc.","journal-title":"Journal of Research in Crime and Delinquency"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/862"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.01.002"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"e_1_3_2_1_47_1","volume-title":"Workshop on lage-scale exploits and emerging threats (LEET).","author":"Stone-Gross Brett","year":"2011","unstructured":"Brett Stone-Gross , Thorsten Holz , Gianluca Stringhini , and Giovanni Vigna . 2011 . The Underground Economy of Spam: A Botmaster\u2019s Perspective of Coordinating Large-Scale Spam Campaigns .. In Workshop on lage-scale exploits and emerging threats (LEET). Brett Stone-Gross, Thorsten Holz, Gianluca Stringhini, and Giovanni Vigna. 2011. The Underground Economy of Spam: A Botmaster\u2019s Perspective of Coordinating Large-Scale Spam Campaigns.. In Workshop on lage-scale exploits and emerging threats (LEET)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590302"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134604"},{"key":"e_1_3_2_1_50_1","unstructured":"zemana.com. [n.d.]. What is Dyre and does Zemana protect me from it? - Zemana. https:\/\/www.zemana.com\/removal-guide\/dyre-malware-removal. [Accessed online: 11-September-2020].  zemana.com. [n.d.]. What is Dyre and does Zemana protect me from it? - Zemana. https:\/\/www.zemana.com\/removal-guide\/dyre-malware-removal. [Accessed online: 11-September-2020]."}],"event":{"name":"RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID '21","location":"San Sebastian Spain"},"container-title":["24th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471844","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471844","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:48Z","timestamp":1750195488000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471844"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":50,"alternative-id":["10.1145\/3471621.3471844","10.1145\/3471621"],"URL":"https:\/\/doi.org\/10.1145\/3471621.3471844","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}