{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:20Z","timestamp":1750220060038,"version":"3.41.0"},"reference-count":72,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2022,10,30]]},"abstract":"<jats:p>Over the years, web content has evolved from simple text and static images hosted on a single server to a complex, interactive and multimedia-rich content hosted on different servers. As a result, a modern website during its loading time fetches content not only from its owner's domain but also from a range of third-party domains providing additional functionalities and services. Here, we infer the network of the third-party domains by observing the domains' interactions within users' browsers from all over the globe. We find that this network possesses structural properties commonly found in complex networks, such as power-law degree distribution, strong clustering, and small-world property. These properties imply that a hyperbolic geometry underlies the ecosystem's topology. We use statistical inference methods to find the domains' coordinates in this geometry, which abstract how popular and similar the domains are. The hyperbolic map we obtain is meaningful, revealing the large-scale organization of the ecosystem. Furthermore, we show that it possesses predictive power, providing us the likelihood that third-party domains are co-hosted; belong to the same legal entity; or merge under the same entity in the future in terms of company acquisition. We also find that complementarity instead of similarity is the dominant force driving future domains' merging. These results provide a new perspective on understanding the ecosystem's organization and performing related inferences and predictions.<\/jats:p>","DOI":"10.1145\/3577929.3577932","type":"journal-article","created":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T23:33:37Z","timestamp":1671492817000},"page":"12-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Topology and Geometry of the Third-Party Domains Ecosystem"],"prefix":"10.1145","volume":"52","author":[{"given":"Costas","family":"Iordanou","sequence":"first","affiliation":[{"name":"Cyprus University of Technology"}]},{"given":"Fragkiskos","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"Cyprus University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2022,12,19]]},"reference":[{"key":"e_1_2_2_1_1","volume-title":"Proc. of the SIGSAC conference on Computer & communications security CCS'13","author":"Acar G.","year":"2013","unstructured":"G. Acar , M. Ju\u00e1rez , N. Nikiforakis , C. D\u00edaz , S. F. G\u00fcrses , F. Piessens , and B. Preneel . 2013. FPDetective: dusting the web for fingerprinters . In Proc. of the SIGSAC conference on Computer & communications security CCS'13 , 13 ( 2013 ), 1129--1140. G. Acar, M. Ju\u00e1rez, N. Nikiforakis, C. D\u00edaz, S. F. G\u00fcrses, F. Piessens, and B. Preneel. 2013. FPDetective: dusting the web for fingerprinters. In Proc. of the SIGSAC conference on Computer & communications security CCS'13, 13 (2013), 1129--1140."},{"volume-title":"Appen - Leading technology platform. https:\/\/appen.com\/. Accessed","year":"2021","key":"e_1_2_2_2_1","unstructured":"Appen. 2021. Appen - Leading technology platform. https:\/\/appen.com\/. Accessed July 2021 . Appen. 2021. Appen - Leading technology platform. https:\/\/appen.com\/. Accessed July 2021."},{"key":"e_1_2_2_3_1","volume-title":"Regular Contents: Dissecting the Web Hosting Ecosystem. In Proc. of the IFIP Networking","author":"Bangera P.","year":"2017","unstructured":"P. Bangera and S. Gorinsky . 2017 . Ads versus Regular Contents: Dissecting the Web Hosting Ecosystem. In Proc. of the IFIP Networking . IEEE , Stockholm, Sweden , 1--9. P. Bangera and S. Gorinsky. 2017. Ads versus Regular Contents: Dissecting the Web Hosting Ecosystem. In Proc. of the IFIP Networking. IEEE, Stockholm, Sweden, 1--9."},{"volume-title":"Proc. of the Workshop on Technology and Consumer Protection. ACM","author":"Bashir M. A.","key":"e_1_2_2_4_1","unstructured":"M. A. Bashir , S. Arshad , E. Kirda , W. Robertson , and C. Wilson . 2018. How Tracking Companies Circumvent Ad Blockers Using WebSockets . In Proc. of the Workshop on Technology and Consumer Protection. ACM , Boston, MA, 471--477. M. A. Bashir, S. Arshad, E. Kirda, W. Robertson, and C. Wilson. 2018. How Tracking Companies Circumvent Ad Blockers Using WebSockets. In Proc. of the Workshop on Technology and Consumer Protection. ACM, Boston, MA, 471--477."},{"volume-title":"Proc. of the 25th USENIX Conference on Security Symposium","author":"Bashir M. A.","key":"e_1_2_2_5_1","unstructured":"M. A. Bashir , S. Arshad , W. Robertson , and C. Wilson . 2016. Tracing Information Flows between Ad Exchanges Using Retargeted Ads . In Proc. of the 25th USENIX Conference on Security Symposium ( Austin, TX, USA) (SEC'16). USENIX Association, USA, 481--496. M. A. Bashir, S. Arshad, W. Robertson, and C. Wilson. 2016. Tracing Information Flows between Ad Exchanges Using Retargeted Ads. In Proc. of the 25th USENIX Conference on Security Symposium (Austin, TX, USA) (SEC'16). USENIX Association, USA, 481--496."},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0033"},{"volume-title":"Proc. of the 10th Conference on Web Science. ACM","author":"Binns R.","key":"e_1_2_2_7_1","unstructured":"R. Binns , U. Lyngs , M. Van Kleek , J. Zhao , T. Libert , and N. Shadbolt . 2018. Third Party Tracking in the Mobile Ecosystem . In Proc. of the 10th Conference on Web Science. ACM , Amsterdam, Netherlands, 23--31. R. Binns, U. Lyngs, M. Van Kleek, J. Zhao, T. Libert, and N. Shadbolt. 2018. Third Party Tracking in the Mobile Ecosystem. In Proc. of the 10th Conference on Web Science. ACM, Amsterdam, Netherlands, 23--31."},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2810186"},{"key":"e_1_2_2_9_1","first-page":"3","article-title":"Network geometry","volume":"1","author":"Bogu\u00f1\u00e1 M.","year":"2021","unstructured":"M. Bogu\u00f1\u00e1 , I. Bonamassa , M. De Domenico , S. Havlin , D. Krioukov , and M. Serrano . 2021 . Network geometry . Nature Reviews Physics 1 , 3 (Jan. 2021), 114--135. M. Bogu\u00f1\u00e1, I. Bonamassa, M. De Domenico, S. Havlin, D. Krioukov, and M. Serrano. 2021. Network geometry. Nature Reviews Physics 1, 3 (Jan. 2021), 114--135.","journal-title":"Nature Reviews Physics"},{"key":"e_1_2_2_10_1","first-page":"1","article-title":"Navigability of complex networks","volume":"5","author":"Bogu\u00f1\u00e1 M.","year":"2008","unstructured":"M. Bogu\u00f1\u00e1 , D. Krioukov , and K. C. Claffy . 2008 . Navigability of complex networks . Nature Physics 5 , 1 (Nov. 2008), 74--80. M. Bogu\u00f1\u00e1, D. Krioukov, and K. C. Claffy. 2008. Navigability of complex networks. Nature Physics 5, 1 (Nov. 2008), 74--80.","journal-title":"Nature Physics"},{"key":"e_1_2_2_11_1","doi-asserted-by":"crossref","unstructured":"M. Bogu\u00f1\u00e1 F. Papadopoulos and D. Krioukov. 2010. Sustaining the Internet with hyperbolic mapping. Nature communications 1 (2010) 62.  M. Bogu\u00f1\u00e1 F. Papadopoulos and D. Krioukov. 2010. Sustaining the Internet with hyperbolic mapping. Nature communications 1 (2010) 62.","DOI":"10.1038\/ncomms1063"},{"key":"e_1_2_2_12_1","doi-asserted-by":"crossref","unstructured":"G. Brajnik and S. Gabrielli. 2010. A Review of Online Advertising Effects on the User Experience. International Journal of Human-Computer Interaction 26 (09 2010) 971--997.  G. Brajnik and S. Gabrielli. 2010. A Review of Online Advertising Effects on the User Experience. International Journal of Human-Computer Interaction 26 (09 2010) 971--997.","DOI":"10.1080\/10447318.2010.502100"},{"key":"e_1_2_2_13_1","volume-title":"Interactive Advertising Bureau: Open-RTB (Real-Time Bidding). https:\/\/www.iab.com\/guidelines\/real-time-bidding-rtb-project\/. Accessed","author":"Interactive Advertising Bureau","year":"2021","unstructured":"Interactive Advertising Bureau . 2021. Interactive Advertising Bureau: Open-RTB (Real-Time Bidding). https:\/\/www.iab.com\/guidelines\/real-time-bidding-rtb-project\/. Accessed July 2021 . Interactive Advertising Bureau. 2021. Interactive Advertising Bureau: Open-RTB (Real-Time Bidding). https:\/\/www.iab.com\/guidelines\/real-time-bidding-rtb-project\/. Accessed July 2021."},{"volume-title":"Proc. of the Internet Measurement Conference","author":"Butkiewicz M.","key":"e_1_2_2_14_1","unstructured":"M. Butkiewicz , H. V. Madhyastha , and V. Sekar . 2011. Understanding Website Complexity: Measurements, Metrics, and Implications . In Proc. of the Internet Measurement Conference ( Berlin, Germany) (IMC'11). ACM, New York, NY, USA, 313--328. M. Butkiewicz, H. V. Madhyastha, and V. Sekar. 2011. Understanding Website Complexity: Measurements, Metrics, and Implications. In Proc. of the Internet Measurement Conference (Berlin, Germany) (IMC'11). ACM, New York, NY, USA, 313--328."},{"volume-title":"Proc. of the Conference on Emerging Networking Experiments and Technologies. ACM","author":"Carrascosa J. M.","key":"e_1_2_2_15_1","unstructured":"J. M. Carrascosa , J. Mikians , R. Cuevas , V. Erramilli , and N. Laoutaris . 2015. I Always Feel Like Somebody's Watching Me: Measuring Online Behavioural Advertising . In Proc. of the Conference on Emerging Networking Experiments and Technologies. ACM , Heidelberg, Germany, 1--13. J. M. Carrascosa, J. Mikians, R. Cuevas, V. Erramilli, and N. Laoutaris. 2015. I Always Feel Like Somebody's Watching Me: Measuring Online Behavioural Advertising. In Proc. of the Conference on Emerging Networking Experiments and Technologies. ACM, Heidelberg, Germany, 1--13."},{"key":"e_1_2_2_16_1","volume-title":"What happens to ad tech post-GDPR. https:\/\/iapp.org\/news\/a\/no-seriously-what-happens-to-ad-tech-post-gdpr\/. Accessed","author":"Carson A.","year":"2021","unstructured":"A. Carson . 2021. What happens to ad tech post-GDPR. https:\/\/iapp.org\/news\/a\/no-seriously-what-happens-to-ad-tech-post-gdpr\/. Accessed October 2021 . A. Carson. 2021. What happens to ad tech post-GDPR. https:\/\/iapp.org\/news\/a\/no-seriously-what-happens-to-ad-tech-post-gdpr\/. Accessed October 2021."},{"volume-title":"Proc. of the Web Conference","author":"Chen Q.","key":"e_1_2_2_17_1","unstructured":"Q. Chen , P. Ilia , M. Polychronakis , and A. Kapravelos . 2021. Cookie Swap Party: Abusing First-Party Cookies for Web Tracking . In Proc. of the Web Conference ( Ljubljana, Slovenia) (WWW'21). ACM, New York, NY, USA, 2117--2129. Q. Chen, P. Ilia, M. Polychronakis, and A. Kapravelos. 2021. Cookie Swap Party: Abusing First-Party Cookies for Web Tracking. In Proc. of the Web Conference (Ljubljana, Slovenia) (WWW'21). ACM, New York, NY, USA, 2117--2129."},{"key":"e_1_2_2_18_1","volume-title":"House Judiciary Committee","author":"The","year":"2019","unstructured":"The U.S. House Judiciary Committee . 2019 . Investigation of competition in digital markets. Available: https:\/\/judiciary.house.gov\/uploadedfiles\/competition_in_digital_markets.pdf. The U.S. House Judiciary Committee. 2019. Investigation of competition in digital markets. Available: https:\/\/judiciary.house.gov\/uploadedfiles\/competition_in_digital_markets.pdf."},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.132"},{"volume-title":"Disconnect - The Tracker Protection lists. https:\/\/github.com\/disconnectme\/disconnect-tracking-protection. Accessed","year":"2021","key":"e_1_2_2_20_1","unstructured":"disconnect.me. 2021. Disconnect - The Tracker Protection lists. https:\/\/github.com\/disconnectme\/disconnect-tracking-protection. Accessed July 2021 . disconnect.me. 2021. Disconnect - The Tracker Protection lists. https:\/\/github.com\/disconnectme\/disconnect-tracking-protection. Accessed July 2021."},{"volume-title":"Lectures on Complex Networks","author":"Dorogovtsev S. N.","key":"e_1_2_2_21_1","unstructured":"S. N. Dorogovtsev . 2010. Lectures on Complex Networks . Oxford University Press , Oxford . S. N. Dorogovtsev. 2010. Lectures on Complex Networks. Oxford University Press, Oxford."},{"volume-title":"Proc. of the CCS'16","author":"Englehardt S.","key":"e_1_2_2_22_1","unstructured":"S. Englehardt and A. Narayanan . 2016. Online Tracking: A 1-million-site Measurement and Analysis . In Proc. of the CCS'16 . ACM, Korea, 1388--1401. S. Englehardt and A. Narayanan. 2016. Online Tracking: A 1-million-site Measurement and Analysis. In Proc. of the CCS'16. ACM, Korea, 1388--1401."},{"volume-title":"Proc. of the 24th International Conference on World Wide Web. ACM","author":"Englehardt S.","key":"e_1_2_2_23_1","unstructured":"S. Englehardt , D. Reisman , C. Eubank , P. Zimmerman , J. Mayer , A. Narayanan , and E. Felten . 2015. Cookies That Give You Away: The Surveillance Implications of Web Tracking . In Proc. of the 24th International Conference on World Wide Web. ACM , Florence, Italy, 289--299. S. Englehardt, D. Reisman, C. Eubank, P. Zimmerman, J. Mayer, A. Narayanan, and E. Felten. 2015. Cookies That Give You Away: The Surveillance Implications of Web Tracking. In Proc. of the 24th International Conference on World Wide Web. ACM, Florence, Italy, 289--299."},{"volume-title":"Proc. of the European Symposium on Security and Privacy Workshops (EuroS PW). IEEE","author":"Eskandari S.","key":"e_1_2_2_24_1","unstructured":"S. Eskandari , A. Leoutsarakos , T. Mursch , and J. Clark . 2018. A First Look at Browser-Based Cryptojacking . In Proc. of the European Symposium on Security and Privacy Workshops (EuroS PW). IEEE , London, UK, 58--66. S. Eskandari, A. Leoutsarakos, T. Mursch, and J. Clark. 2018. A First Look at Browser-Based Cryptojacking. In Proc. of the European Symposium on Security and Privacy Workshops (EuroS PW). IEEE, London, UK, 58--66."},{"key":"e_1_2_2_25_1","unstructured":"EU. 2016. The EU General Data Protection Regulation. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679&qid=1490179745294&from=en. Accessed August 2021.  EU. 2016. The EU General Data Protection Regulation. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679&qid=1490179745294&from=en. Accessed August 2021."},{"key":"e_1_2_2_26_1","first-page":"1","volume-title":"Passive DNS Replication. 17th Annual FIRST Conference 1","author":"Weimer","year":"2005","unstructured":"Weimer F. 2005 . Passive DNS Replication. 17th Annual FIRST Conference 1 , 1 (2005), 1--13. Weimer F. 2005. Passive DNS Replication. 17th Annual FIRST Conference 1, 1 (2005), 1--13."},{"key":"e_1_2_2_27_1","unstructured":"M. Falahrastegar H. Haddadi S. Uhlig and R. Mortier. 2014. Anatomy of the Third-Party Web Tracking Ecosystem. arXiv:1409.1066 [cs.SI]  M. Falahrastegar H. Haddadi S. Uhlig and R. Mortier. 2014. Anatomy of the Third-Party Web Tracking Ecosystem. arXiv:1409.1066 [cs.SI]"},{"volume-title":"Proc. of the Passive and Active Measurement. Springer, Cham, 30--41","author":"Falahrastegar M.","key":"e_1_2_2_28_1","unstructured":"M. Falahrastegar , H. Haddadi , S. Uhlig , and R. Mortier . 2016. Tracking Personal Identifiers Across the Web . In Proc. of the Passive and Active Measurement. Springer, Cham, 30--41 . M. Falahrastegar, H. Haddadi, S. Uhlig, and R. Mortier. 2016. Tracking Personal Identifiers Across the Web. In Proc. of the Passive and Active Measurement. Springer, Cham, 30--41."},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/ab57d2"},{"key":"e_1_2_2_30_1","unstructured":"G. Garc\u00eda-P\u00e9rez A. Allard M. A. Serrano and M. Bogu\u00f1\u00e1. 2020. Mercator Embedding Code. Available: https:\/\/github.com\/networkgeometry\/mercator.  G. Garc\u00eda-P\u00e9rez A. Allard M. A. Serrano and M. Bogu\u00f1\u00e1. 2020. Mercator Embedding Code. Available: https:\/\/github.com\/networkgeometry\/mercator."},{"key":"e_1_2_2_31_1","volume-title":"Proc. of the European Symposium on Research in Computer Security. ESORICS 1","author":"Gervais A.","year":"2017","unstructured":"A. Gervais , A. Filios , V. Lenders , and S. Capkun . 2017. Quantifying Web Adblocker Privacy , In Proc. of the European Symposium on Research in Computer Security. ESORICS 1 , 2017 , 21--42. A. Gervais, A. Filios, V. Lenders, and S. Capkun. 2017. Quantifying Web Adblocker Privacy, In Proc. of the European Symposium on Research in Computer Security. ESORICS 1, 2017, 21--42."},{"key":"e_1_2_2_32_1","volume-title":"Learn about tracking technologies, market structure and data-sharing on the web. https:\/\/whotracks.me\/. Accessed","author":"Cliqz","year":"2021","unstructured":"Cliqz GmbH. 2021. Learn about tracking technologies, market structure and data-sharing on the web. https:\/\/whotracks.me\/. Accessed July 2021 . Cliqz GmbH. 2021. Learn about tracking technologies, market structure and data-sharing on the web. https:\/\/whotracks.me\/. Accessed July 2021."},{"key":"e_1_2_2_33_1","volume-title":"Proc. of the IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies 1","author":"Gomer R. C.","year":"2013","unstructured":"R. C. Gomer , E. M. Rodrigues , N. Milic-Frayling , and M. Schraefel . 2013. Network Analysis of Third Party Tracking: User Exposure to Tracking Cookies through Search . In Proc. of the IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies 1 ( 2013 ), 549--556. R. C. Gomer, E. M. Rodrigues, N. Milic-Frayling, and M. Schraefel. 2013. Network Analysis of Third Party Tracking: User Exposure to Tracking Cookies through Search. In Proc. of the IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies 1 (2013), 549--556."},{"volume-title":"Google Chrome API - webNavigation. https:\/\/developer.chrome.com\/docs\/extensions\/reference\/webNavigation\/. Accessed","year":"2021","key":"e_1_2_2_34_1","unstructured":"Google. 2021. Google Chrome API - webNavigation. https:\/\/developer.chrome.com\/docs\/extensions\/reference\/webNavigation\/. Accessed October 2021 . Google. 2021. Google Chrome API - webNavigation. https:\/\/developer.chrome.com\/docs\/extensions\/reference\/webNavigation\/. Accessed October 2021."},{"volume-title":"Google Chrome API - webRequest. https:\/\/developer.chrome.com\/docs\/extensions\/reference\/webRequest\/. Accessed","year":"2021","key":"e_1_2_2_35_1","unstructured":"Google. 2021. Google Chrome API - webRequest. https:\/\/developer.chrome.com\/docs\/extensions\/reference\/webRequest\/. Accessed October 2021 . Google. 2021. Google Chrome API - webRequest. https:\/\/developer.chrome.com\/docs\/extensions\/reference\/webRequest\/. Accessed October 2021."},{"volume-title":"Google Chrome Web store. https:\/\/chrome.google.com\/webstore\/category\/extensions. Accessed","year":"2021","key":"e_1_2_2_36_1","unstructured":"Google. 2021. Google Chrome Web store. https:\/\/chrome.google.com\/webstore\/category\/extensions. Accessed July 2021 . Google. 2021. Google Chrome Web store. https:\/\/chrome.google.com\/webstore\/category\/extensions. Accessed July 2021."},{"key":"e_1_2_2_37_1","volume-title":"Discover innovative companies and the people behind them. https:\/\/www.crunchbase.com\/. Accessed","author":"Crunchbase Inc. 2021.","year":"2021","unstructured":"Crunchbase Inc. 2021. Discover innovative companies and the people behind them. https:\/\/www.crunchbase.com\/. Accessed July 2021 . Crunchbase Inc. 2021. Discover innovative companies and the people behind them. https:\/\/www.crunchbase.com\/. Accessed July 2021."},{"volume-title":"Proc. of the 15th International Conference on Emerging Networking Experiments And Technologies","author":"Iordanou C.","key":"e_1_2_2_38_1","unstructured":"C. Iordanou , N. Kourtellis , J. M. Carrascosa , C. Soriente , R. Cuevas , and N. Laoutaris . 2019. Beyond Content Analysis: Detecting Targeted Ads via Distributed Counting . In Proc. of the 15th International Conference on Emerging Networking Experiments And Technologies ( Orlando, Florida) (CoNEXT'19). ACM, New York, NY, USA, 110--122. C. Iordanou, N. Kourtellis, J. M. Carrascosa, C. Soriente, R. Cuevas, and N. Laoutaris. 2019. Beyond Content Analysis: Detecting Targeted Ads via Distributed Counting. In Proc. of the 15th International Conference on Emerging Networking Experiments And Technologies (Orlando, Florida) (CoNEXT'19). ACM, New York, NY, USA, 110--122."},{"key":"e_1_2_2_39_1","doi-asserted-by":"crossref","unstructured":"C. Iordanou and F. Papadopoulos. 2022. Topology and Geometry of the Third-Party Domains Ecosystem: Measurement and Applications - Artifacts Repository. Available upon publication: https:\/\/github.com\/cosior\/TPDs_ecosystem.  C. Iordanou and F. Papadopoulos. 2022. Topology and Geometry of the Third-Party Domains Ecosystem: Measurement and Applications - Artifacts Repository. Available upon publication: https:\/\/github.com\/cosior\/TPDs_ecosystem.","DOI":"10.1145\/3577929.3577932"},{"volume-title":"Proc. of the Internet Measurement Conference. ACM","author":"Iordanou C.","key":"e_1_2_2_40_1","unstructured":"C. Iordanou , G. Smaragdakis , I. Poese , and N. Laoutaris . 2018. Tracing Cross Border Web Tracking . In Proc. of the Internet Measurement Conference. ACM , Boston, MA, USA, 329--342. C. Iordanou, G. Smaragdakis, I. Poese, and N. Laoutaris. 2018. Tracing Cross Border Web Tracking. In Proc. of the Internet Measurement Conference. ACM, Boston, MA, USA, 329--342."},{"key":"e_1_2_2_41_1","unstructured":"Doh-Shin Jeon. 2021. Market Power and Transparency in Open Display Advertising - A Case Study. http:\/\/publications.ut-capitole.fr\/43644\/. Accessed January 2021.  Doh-Shin Jeon. 2021. Market Power and Transparency in Open Display Advertising - A Case Study. http:\/\/publications.ut-capitole.fr\/43644\/. Accessed January 2021."},{"key":"e_1_2_2_42_1","unstructured":"A. Karaj S. Macbeth R. Berson and J. M. Pujol. 2018. WhoTracks.Me: Shedding light on the opaque world of online tracking. arXiv:1804.08959 [cs.CY]  A. Karaj S. Macbeth R. Berson and J. M. Pujol. 2018. WhoTracks.Me: Shedding light on the opaque world of online tracking. arXiv:1804.08959 [cs.CY]"},{"key":"e_1_2_2_43_1","volume-title":"Regulating digital ecosystems: bridging the gap between competition policy and data protection. Industrial and Corporate Change 30, 5 (08","author":"Kira Beatriz","year":"2021","unstructured":"Beatriz Kira , Vikram Sinha , and Sharmadha Srinivasan . 2021. Regulating digital ecosystems: bridging the gap between competition policy and data protection. Industrial and Corporate Change 30, 5 (08 2021 ), 1337--1360. Beatriz Kira, Vikram Sinha, and Sharmadha Srinivasan. 2021. Regulating digital ecosystems: bridging the gap between competition policy and data protection. Industrial and Corporate Change 30, 5 (08 2021), 1337--1360."},{"volume-title":"Proc. of the SIGSAC Conference on Computer and Communications Security","author":"Konothdhesh R. K.","key":"e_1_2_2_44_1","unstructured":"R. K. Konothdhesh , E. Vineti , V. Moonsamy , M. Lindorfer , C. Kruegel , H. Bos , and G. Vigna . 2018. MineSweeper: An In-Depth Look into Drive-by Cryptocurrency Mining and Its Defense . In Proc. of the SIGSAC Conference on Computer and Communications Security ( Toronto, Canada) (CCS'18). ACM, New York, NY, USA, 1714--1730. R. K. Konothdhesh, E. Vineti, V. Moonsamy, M. Lindorfer, C. Kruegel, H. Bos, and G. Vigna. 2018. MineSweeper: An In-Depth Look into Drive-by Cryptocurrency Mining and Its Defense. In Proc. of the SIGSAC Conference on Computer and Communications Security (Toronto, Canada) (CCS'18). ACM, New York, NY, USA, 1714--1730."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.82.036106"},{"volume-title":"International Conference on Inventive Computing and Informatics (ICICI). IEEE","author":"Kumar S.","key":"e_1_2_2_46_1","unstructured":"S. Kumar , S. S. Rautaray , and M. Pandey . 2017. Malvertising: A case study based on analysis of possible solutions . In International Conference on Inventive Computing and Informatics (ICICI). IEEE , Coimbatore, India, 288--291. S. Kumar, S. S. Rautaray, and M. Pandey. 2017. Malvertising: A case study based on analysis of possible solutions. In International Conference on Inventive Computing and Informatics (ICICI). IEEE, Coimbatore, India, 288--291."},{"volume-title":"Proc. of the USENIX Security Symposium. USENIX","author":"Lerner A.","key":"e_1_2_2_47_1","unstructured":"A. Lerner , A. Kornfeld Simpson , T. Kohno , and F. Roesner . 2016. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 . In Proc. of the USENIX Security Symposium. USENIX , Austin. TX, USA, 997--1013. A. Lerner, A. Kornfeld Simpson, T. Kohno, and F. Roesner. 2016. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. In Proc. of the USENIX Security Symposium. USENIX, Austin. TX, USA, 997--1013."},{"volume-title":"Proc. of the Internet Measurement Conference. ACM","author":"Leung C.","key":"e_1_2_2_48_1","unstructured":"C. Leung , J. Ren , D. Choffnes , and C. Wilson . 2016. Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services . In Proc. of the Internet Measurement Conference. ACM , New York, NY, USA, 365--372. C. Leung, J. Ren, D. Choffnes, and C. Wilson. 2016. Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services. In Proc. of the Internet Measurement Conference. ACM, New York, NY, USA, 365--372."},{"volume-title":"Same-origin policy (SOP). https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy. Accessed","year":"2021","key":"e_1_2_2_49_1","unstructured":"Mozilla. 2021. Same-origin policy (SOP). https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy. Accessed July 2021 . Mozilla. 2021. Same-origin policy (SOP). https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy. Accessed July 2021."},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-017-01825-5"},{"key":"e_1_2_2_51_1","volume-title":"California Consumer Privacy Act - Assembly Bill No. 375.","author":"State of California. 2018.","year":"2021","unstructured":"State of California. 2018. California Consumer Privacy Act - Assembly Bill No. 375. Available at https:\/\/leginfo.legislature.ca.gov. Accessed June 2021 . State of California. 2018. California Consumer Privacy Act - Assembly Bill No. 375. Available at https:\/\/leginfo.legislature.ca.gov. Accessed June 2021."},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.92.022807"},{"key":"e_1_2_2_53_1","doi-asserted-by":"crossref","unstructured":"F. Papadopoulos M. Kitsak M. Serrano M. Bogu\u00f1\u00e1 and D. Krioukov. 2012. Popularity versus Similarity in Growing Networks. Nature 489 (09 2012) 537--40.  F. Papadopoulos M. Kitsak M. Serrano M. Bogu\u00f1\u00e1 and D. Krioukov. 2012. Popularity versus Similarity in Growing Networks. Nature 489 (09 2012) 537--40.","DOI":"10.1038\/nature11459"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2294052"},{"volume-title":"Annoyed Users: Ads and Ad-Block Usage in the Wild. In In Proc. of the Internet Measurement Conference. ACM","author":"Pujol E.","key":"e_1_2_2_55_1","unstructured":"E. Pujol , O. Hohlfeld , and A. Feldmann . 2015 . Annoyed Users: Ads and Ad-Block Usage in the Wild. In In Proc. of the Internet Measurement Conference. ACM , Tokyo, Japan, 93--106. E. Pujol, O. Hohlfeld, and A. Feldmann. 2015. Annoyed Users: Ads and Ad-Block Usage in the Wild. In In Proc. of the Internet Measurement Conference. ACM, Tokyo, Japan, 93--106."},{"volume-title":"Proc. of the Network and Distributed System Security Symposium. NDSS","author":"Razaghpanah A.","key":"e_1_2_2_56_1","unstructured":"A. Razaghpanah , R. Nithyanand , N. Vallina-Rodriguez , S. Sundaresan , M. Allman , C. Kreibich , and P. Gill . 2018. Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem . In Proc. of the Network and Distributed System Security Symposium. NDSS , San Diego, CA, USA, 1. A. Razaghpanah, R. Nithyanand, N. Vallina-Rodriguez, S. Sundaresan, M. Allman, C. Kreibich, and P. Gill. 2018. Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem. In Proc. of the Network and Distributed System Security Symposium. NDSS, San Diego, CA, USA, 1."},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0021"},{"volume-title":"Proc. of the Internet Measurement Conference","author":"R\u00fcth J.","key":"e_1_2_2_58_1","unstructured":"J. R\u00fcth , T. Zimmermann , K. Wolsing , and O. Hohlfeld . 2018. Digging into Browser-Based Crypto Mining . In Proc. of the Internet Measurement Conference ( Boston, MA, USA) (IMC'18). ACM, New York, NY, USA, 70--76. J. R\u00fcth, T. Zimmermann, K. Wolsing, and O. Hohlfeld. 2018. Digging into Browser-Based Crypto Mining. In Proc. of the Internet Measurement Conference (Boston, MA, USA) (IMC'18). ACM, New York, NY, USA, 70--76."},{"key":"e_1_2_2_59_1","doi-asserted-by":"crossref","unstructured":"A. Schelter and J. Kunegis. 2016. On the Ubiquity of Web Tracking: Insights from a Billion-Page Web Crawl. Journal of Web Science 4 (07 2016).  A. Schelter and J. Kunegis. 2016. On the Ubiquity of Web Tracking: Insights from a Billion-Page Web Crawl. Journal of Web Science 4 (07 2016).","DOI":"10.1561\/106.00000014"},{"volume-title":"In Proc. of the 26th IASTED International Conference on Artificial Intelligence and Applications. ACTA Press","author":"Siddiqui M.","key":"e_1_2_2_60_1","unstructured":"M. Siddiqui , M. Wang , and J. Lee . 2008. Data mining methods for malware detection using instruction sequences . In In Proc. of the 26th IASTED International Conference on Artificial Intelligence and Applications. ACTA Press , Innsbruck, Austria, 358--363. M. Siddiqui, M. Wang, and J. Lee. 2008. Data mining methods for malware detection using instruction sequences. In In Proc. of the 26th IASTED International Conference on Artificial Intelligence and Applications. ACTA Press, Innsbruck, Austria, 358--363."},{"volume-title":"Proc. of the Network Traffic Measurement and Analysis Conference. TMA","author":"Solomos K.","key":"e_1_2_2_61_1","unstructured":"K. Solomos , P. Ilia , S. Ioannidis , and N. Kourtellis . 2019. Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem . In Proc. of the Network Traffic Measurement and Analysis Conference. TMA , Berlin, Germany, 10. K. Solomos, P. Ilia, S. Ioannidis, and N. Kourtellis. 2019. Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem. In Proc. of the Network Traffic Measurement and Analysis Conference. TMA, Berlin, Germany, 10."},{"key":"e_1_2_2_62_1","doi-asserted-by":"crossref","unstructured":"A. Sood and R. J. Enbody. 2011. Malvertising - Exploiting web advertising. Computer Fraud & Security 2011 (04 2011) 11--16.  A. Sood and R. J. Enbody. 2011. Malvertising - Exploiting web advertising. Computer Fraud & Security 2011 (04 2011) 11--16.","DOI":"10.1016\/S1361-3723(11)70041-0"},{"key":"e_1_2_2_63_1","first-page":"55","article-title":"Why Google dominates advertising markets","volume":"24","author":"Srinivasan Dina","year":"2020","unstructured":"Dina Srinivasan . 2020 . Why Google dominates advertising markets . Stan. Tech. L. Rev. 24 (2020), 55 . Dina Srinivasan. 2020. Why Google dominates advertising markets. Stan. Tech. L. Rev. 24 (2020), 55.","journal-title":"Stan. Tech. L. Rev."},{"volume-title":"Proc. Of the Annual International Conference on Privacy, Security and Trust. IEEE","author":"Takano Y.","key":"e_1_2_2_64_1","unstructured":"Y. Takano , S. Ohta , T. Takahashi , R. Ando , and T. Inoue . 2014. MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking . In Proc. Of the Annual International Conference on Privacy, Security and Trust. IEEE , Toronto, Canada, 48--56. Y. Takano, S. Ohta, T. Takahashi, R. Ando, and T. Inoue. 2014. MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking. In Proc. Of the Annual International Conference on Privacy, Security and Trust. IEEE, Toronto, Canada, 48--56."},{"volume-title":"Proc. of The Web Conference","author":"Urban T.","key":"e_1_2_2_65_1","unstructured":"T. Urban , M. Degeling , T. Holz , and N. Pohlmann . 2020. Beyond the Front Page: Measuring Third Party Dynamics in the Field . In Proc. of The Web Conference ( Taipei, Taiwan) (WWW'20). ACM, New York, NY, USA, 1275--1286. T. Urban, M. Degeling, T. Holz, and N. Pohlmann. 2020. Beyond the Front Page: Measuring Third Party Dynamics in the Field. In Proc. of The Web Conference (Taipei, Taiwan) (WWW'20). ACM, New York, NY, USA, 1275--1286."},{"key":"e_1_2_2_66_1","volume-title":"Children's Online Privacy Protection Act (COPPA). https:\/\/www.ftc.gov\/enforcement\/rules\/rulemaking-regulatory-reform-proceedings\/childrens-online-privacy-protection-rule. Accessed","author":"US.","year":"2021","unstructured":"US. 1998. Children's Online Privacy Protection Act (COPPA). https:\/\/www.ftc.gov\/enforcement\/rules\/rulemaking-regulatory-reform-proceedings\/childrens-online-privacy-protection-rule. Accessed September 2021 . US. 1998. Children's Online Privacy Protection Act (COPPA). https:\/\/www.ftc.gov\/enforcement\/rules\/rulemaking-regulatory-reform-proceedings\/childrens-online-privacy-protection-rule. Accessed September 2021."},{"volume-title":"Proc. of the HotNets Workshop. ACM","author":"Venkatadri G.","key":"e_1_2_2_67_1","unstructured":"G. Venkatadri , A. Mislove , and K. P. Gummadi . 2018. Treads: Transparency-Enhancing Ads . In Proc. of the HotNets Workshop. ACM , New York, NY, USA, 169--175. G. Venkatadri, A. Mislove, and K. P. Gummadi. 2018. Treads: Transparency-Enhancing Ads. In Proc. of the HotNets Workshop. ACM, New York, NY, USA, 169--175."},{"volume-title":"Proc. of the Internet Measurement Conference. ACM","author":"Walls R. J.","key":"e_1_2_2_68_1","unstructured":"R. J. Walls , E. D. Kilmer , N. Lageman , and P. D. McDaniel . 2015. Measuring the Impact and Perception of Acceptable Advertisements . In Proc. of the Internet Measurement Conference. ACM , Tokyo, Japan, 107--120. R. J. Walls, E. D. Kilmer, N. Lageman, and P. D. McDaniel. 2015. Measuring the Impact and Perception of Acceptable Advertisements. In Proc. of the Internet Measurement Conference. ACM, Tokyo, Japan, 107--120."},{"volume-title":"webXray - A tool to identifying the companies which collect user data. https:\/\/github.com\/timlib\/webXray. Accessed","year":"2021","key":"e_1_2_2_69_1","unstructured":"webxray.org. 2021. webXray - A tool to identifying the companies which collect user data. https:\/\/github.com\/timlib\/webXray. Accessed July 2021 . webxray.org. 2021. webXray - A tool to identifying the companies which collect user data. https:\/\/github.com\/timlib\/webXray. Accessed July 2021."},{"volume-title":"All the data WhatsApp and Instagram send to Facebook. https:\/\/www.wired.co.uk\/article\/whatsapp-instagram-facebook-data. Accessed","year":"2021","key":"e_1_2_2_70_1","unstructured":"wired.co.uk. 2021. All the data WhatsApp and Instagram send to Facebook. https:\/\/www.wired.co.uk\/article\/whatsapp-instagram-facebook-data. Accessed July 2021 . wired.co.uk. 2021. All the data WhatsApp and Instagram send to Facebook. https:\/\/www.wired.co.uk\/article\/whatsapp-instagram-facebook-data. Accessed July 2021."},{"key":"e_1_2_2_71_1","doi-asserted-by":"crossref","unstructured":"Z. Wu Z. Di Y. Fan and D. Shen. 2020. An Asymmetric Popularity-Similarity Optimization Method for Embedding Directed Networks into Hyperbolic Space. Complexity 2020 (Jan 2020) 16 pages.  Z. Wu Z. Di Y. Fan and D. Shen. 2020. An Asymmetric Popularity-Similarity Optimization Method for Embedding Directed Networks into Hyperbolic Space. Complexity 2020 (Jan 2020) 16 pages.","DOI":"10.1155\/2020\/8372928"},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3046746"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577929.3577932","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3577929.3577932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:41Z","timestamp":1750183721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577929.3577932"}},"subtitle":["Measurement and Applications"],"short-title":[],"issued":{"date-parts":[[2022,10,30]]},"references-count":72,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,10,30]]}},"alternative-id":["10.1145\/3577929.3577932"],"URL":"https:\/\/doi.org\/10.1145\/3577929.3577932","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2022,10,30]]},"assertion":[{"value":"2022-12-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}