{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T06:45:48Z","timestamp":1767422748103,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":105,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100016265","name":"Comcast Innovation Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016265","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1145\/3618257.3624812","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:19:52Z","timestamp":1698020392000},"page":"268-281","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Phishing in the Free Waters: A Study of Phishing Attacks Created using Free Website Building Services"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6444-2623","authenticated-orcid":false,"given":"Sayak","family":"Saha Roy","sequence":"first","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4809-7462","authenticated-orcid":false,"given":"Unique","family":"Karanjit","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0539-3742","authenticated-orcid":false,"given":"Shirin","family":"Nilizadeh","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Phishing attack abuses Microsoft Azure Google Sites to steal crypto. https:\/\/www.infoworld.com\/article\/3187346\/phishing-scammers-exploit-wix-web-hosting.html."},{"volume-title":"Drive-By Malware Uses Google Sites for Drive by Download Attacks. bit.ly\/3WJMC55","key":"e_1_3_2_1_2_1","unstructured":"2019. Drive-By Malware Uses Google Sites for Drive by Download Attacks. bit.ly\/3WJMC55."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Friends of PhishTank [Infographic]. https:\/\/www.phishtank.com\/friends.php."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. Google Safebrowsing. https:\/\/safebrowsing.google.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. PhishTank. https:\/\/www.phishtank.com\/faq.php."},{"key":"e_1_3_2_1_6_1","unstructured":"2020. Twitter Developer. https:\/\/https:\/\/developer.twitter.com\/en\/ docs."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. VirusTotal. https:\/\/www.virustotal.com\/gui\/home\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. Weaponizing Domain Names: how bulk registration aids global spam campaigns. bit.ly\/3OQwhcK."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. 2021 Cybersecurity threat trends: phishing crypto top the list. bit.ly\/ 3owhpWv."},{"key":"e_1_3_2_1_10_1","unstructured":"2021. Have Money for a Latte? Then You Too Can Buy a Phish Kit. https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/have-money- latte-then-you-too-can-buy-phish-kit."},{"key":"e_1_3_2_1_11_1","unstructured":"2021. How long does it take to get an SSL certificate? https: \/\/comodosslstore.com\/ssl-validation-process\/how-long-to-get-an-ssl-certificate."},{"key":"e_1_3_2_1_12_1","unstructured":"2022. Block Search indexing with noindex. https:\/\/developers.google.com\/ search\/docs\/crawling-indexing\/block-indexing."},{"key":"e_1_3_2_1_13_1","unstructured":"2022. Crowdtangle. https:\/\/www.crowdtangle.com\/."},{"key":"e_1_3_2_1_14_1","unstructured":"2022. Mcafee WebAdvisor. https:\/\/www.mcafee.com\/en-us\/safe-browser\/mcafee-webadvisor.html."},{"key":"e_1_3_2_1_15_1","unstructured":"2022. Phishing attack abuses Microsoft Azure Google Sites to steal crypto. bit.ly\/3C08gIY."},{"key":"e_1_3_2_1_16_1","unstructured":"2023. Community Standards - Cybersecurity. https:\/\/transparency.fb.com\/en-gb\/policies\/community-standards\/cybersecurity\/."},{"key":"e_1_3_2_1_17_1","unstructured":"2023. Phishing spam and malware links. https:\/\/help.twitter.com\/en\/safety-and-security\/phishing-spam-and-malware-links."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417233"},{"key":"e_1_3_2_1_19_1","volume-title":"These are the top-level domains threat actors like the most. BleepingComputer","author":"Abrams Lawrence","year":"2021","unstructured":"Lawrence Abrams. 2021. These are the top-level domains threat actors like the most. BleepingComputer (2021). https:\/\/www.bleepingcomputer.com\/news\/ security\/these-are-the-top-level-domains-threat-actors-like-the-most\/"},{"key":"e_1_3_2_1_20_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Acharya Bhupendra","year":"2021","unstructured":"Bhupendra Acharya and Phani Vadrevu. 2021. {PhishPrint}: Evading Phishing Detection Crawlers by Prior Profiling. In 30th USENIX Security Symposium (USENIX Security 21). 3775--3792."},{"key":"e_1_3_2_1_21_1","volume-title":"Phishzoo: Detecting phishing websites by looking at them. In 2011 IEEE fifth international conference on semantic computing","author":"Afroz Sadia","year":"2011","unstructured":"Sadia Afroz and Rachel Greenstadt. 2011. Phishzoo: Detecting phishing websites by looking at them. In 2011 IEEE fifth international conference on semantic computing. IEEE, 368--375."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23058"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375708.3380315"},{"key":"e_1_3_2_1_24_1","article-title":"Phishing websites detection based on phishing characteristics in the webpage source code","volume":"1","author":"Alkhozae Mona Ghotaish","year":"2011","unstructured":"Mona Ghotaish Alkhozae and Omar Abdullah Batarfi. 2011. Phishing websites detection based on phishing characteristics in the webpage source code. Inter- national Journal of Information and Communication Technology Research 1, 6 (2011).","journal-title":"Inter- national Journal of Information and Communication Technology Research"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76993-4_18"},{"key":"e_1_3_2_1_26_1","unstructured":"VirusTotal API. [n. d.]. https:\/\/developers.virustotal.com\/v3.0\/ reference#overview."},{"key":"e_1_3_2_1_27_1","unstructured":"APWG. [n. d.]. eCrimeX. https:\/\/apwg.org\/ecx\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517859"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373017.3373020"},{"key":"e_1_3_2_1_30_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Bijmans Hugo","year":"2021","unstructured":"Hugo Bijmans, Tim Booij, Anneke Schwedersky, Aria Nedgabat, and Rolf van Wegberg. 2021. Catching phishers by their bait: Investigating the dutch phishing landscape through phishing kit detection. In 30th USENIX Security Symposium (USENIX Security 21). 3757--3774."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/jip.1482"},{"key":"e_1_3_2_1_32_1","unstructured":"CircleID. [n. d.]. Which Domains Stand the Strongest Against Phishing Attacks? https:\/\/bit.ly\/3h0IkWr."},{"key":"e_1_3_2_1_33_1","unstructured":"Comodo. 2022. A DV vs EV Certificate - Why Should I Choose One Over the Other? https:\/\/comodosslstore.com\/resources\/a-dv-vs-ev-certificate-why-should-i-choose-one-over-the-other\/."},{"key":"e_1_3_2_1_34_1","first-page":"1","article-title":"There Is No Free Phish: An Analysis of \"Free\" and Live Phishing Kits","volume":"8","author":"Cova Marco","year":"2008","unstructured":"Marco Cova, Christopher Kruegel, and Giovanni Vigna. 2008. There Is No Free Phish: An Analysis of \"Free\" and Live Phishing Kits. WOOT 8 (2008), 1--8.","journal-title":"WOOT"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78375-4_11"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299019"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470111"},{"key":"e_1_3_2_1_38_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Drury Vincent","year":"2019","unstructured":"Vincent Drury and Ulrike Meyer. 2019. Certified phishing: taking a look at public key certificates of phishing websites. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 211--223."},{"key":"e_1_3_2_1_39_1","unstructured":"Let's Encrypt. 2023. A nonprofit Certificate Authority providing TLS certificates to 300 million websites. https:\/\/letsencrypt.org\/."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37231-6_18"},{"key":"e_1_3_2_1_41_1","unstructured":"Mozilla Firefox. [n. d.]. How does built-in Phishing and Malware Protection work? https:\/\/support.mozilla.org\/en-US\/kb\/how-does-phishing- and-malware-protection-work."},{"key":"e_1_3_2_1_42_1","unstructured":"Google. [n. d.]. Use Safe Browsing in Chrome. https:\/\/bit.ly\/3UYV1zF."},{"key":"e_1_3_2_1_43_1","unstructured":"GrowthBadger. 2021. Domain Extensions: .com vs .org .net .io & 4 Other TLDs (Study). https:\/\/growthbadger.com\/top-level-domains."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.4018\/JITR.2020040106"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2014.6963163"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978330"},{"volume-title":"Economics of information security and privacy","author":"Herley Cormac","key":"e_1_3_2_1_47_1","unstructured":"Cormac Herley and Dinei Flor\u00eancio. 2010. Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. In Economics of information security and privacy. Springer, 33--53."},{"key":"e_1_3_2_1_48_1","volume-title":"International Symposium on Foundations and Practice of Security. Springer, 194--207","author":"Huh Jun Ho","year":"2011","unstructured":"Jun Ho Huh and Hyoungshick Kim. 2011. Phishing detection with popular search engines: Simple and effective. In International Symposium on Foundations and Practice of Security. Springer, 194--207."},{"key":"e_1_3_2_1_49_1","unstructured":"Interisle. 2020. Phishing Landscape 2020. https:\/\/interisle.net\/ PhishingLandscape2020.pdf."},{"key":"e_1_3_2_1_50_1","unstructured":"Interisle. 2021. Phishing Landscape 2021. https:\/\/interisle.net\/ PhishingLandscape2021.pdf."},{"key":"e_1_3_2_1_51_1","unstructured":"Interisle. 2022. Phishing Landscape 2022. https:\/\/interisle.net\/ PhishingLandscape2022.pdf."},{"key":"e_1_3_2_1_52_1","unstructured":"Interisle. 2023. Phishing Landscape 2023. https:\/\/interisle.net\/ PhishingLandscape2023.pdf."},{"key":"e_1_3_2_1_53_1","volume-title":"Priming and warnings are not effective to prevent social engineering attacks. Computers in human behavior 66","author":"Junger Marianne","year":"2017","unstructured":"Marianne Junger, Lorena Montoya, and F-J Overink. 2017. Priming and warnings are not effective to prevent social engineering attacks. Computers in human behavior 66 (2017), 75--87."},{"key":"e_1_3_2_1_54_1","unstructured":"KrebsonSecurity. [n. d.]. https:\/\/krebsonsecurity.com\/2018\/11\/half-of-all-phishing-sites-now-have-the-padlock\/."},{"key":"e_1_3_2_1_55_1","volume-title":"URLNet: Learning a URL representation with deep learning for malicious URL detection. arXiv preprint arXiv:1802.03162","author":"Le Hung","year":"2018","unstructured":"Hung Le, Quang Pham, Doyen Sahoo, and Steven CH Hoi. 2018. URLNet: Learning a URL representation with deep learning for malicious URL detection. arXiv preprint arXiv:1802.03162 (2018)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2013.875221"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.004"},{"key":"e_1_3_2_1_58_1","unstructured":"BitDefender Traffic Light. [n. d.]. https:\/\/www.bitdefender.com\/solutions\/ trafficlight.html."},{"key":"e_1_3_2_1_59_1","volume-title":"Dinil Mon Divakaran, and Jin Song Dong.","author":"Liu Ruofan","year":"2022","unstructured":"Ruofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, and Jin Song Dong. 2022. Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach. In 30th {USENIX} Security Symposium ({USENIX} Security 21)."},{"key":"e_1_3_2_1_60_1","unstructured":"Security Magazine. [n. d.]. Phishing could have cost businesses $354m in poten- tial direct losses. bit.ly\/3OLwj5N."},{"key":"e_1_3_2_1_61_1","unstructured":"Mailchimp. 2023. Compare Marketing plans. https:\/\/mailchimp.com\/pricing\/marketing\/compare-plans\/."},{"key":"e_1_3_2_1_62_1","unstructured":"Mozilla. [n. d.]. https:\/\/blog.mozilla.org\/firefox\/6-tips-for-safe- online-shopping\/."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ATC.2013.6698185"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00049"},{"key":"e_1_3_2_1_65_1","volume-title":"Phishtime: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 379--396.","author":"Oest Adam","year":"2020","unstructured":"Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, and Adam Doup\u00e9. 2020. Phishtime: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 379--396."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376206"},{"key":"e_1_3_2_1_67_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Oest Adam","year":"2020","unstructured":"Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doup\u00e9, and Gail-Joon Ahn. 2020. Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale. In 29th USENIX Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207707"},{"key":"e_1_3_2_1_69_1","unstructured":"Openphish. [n. d.]. Phishing feed. \"https:\/\/openphish.com\/faq.html\"."},{"key":"e_1_3_2_1_70_1","unstructured":"OpenPhish. 2022. OpenPhish Monthly Brands List. https:\/\/openphish.com\/ monthly_brands_list.csv."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274710"},{"key":"e_1_3_2_1_72_1","unstructured":"VARN original research. [n. d.]. How your domain name could be damaging your business. https:\/\/varn.co.uk\/10\/27\/70-of-people-dont-trust-newer- website-domains\/."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2019.8728356"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355585"},{"key":"e_1_3_2_1_75_1","unstructured":"Richard Penman. [n. d.]. Python-WhoIS. https:\/\/pypi.org\/project\/python-whois\/."},{"key":"e_1_3_2_1_76_1","unstructured":"PhishLabs. 2021. Top 10 TLDs Abused. https:\/\/www.phishlabs.com\/blog\/top-10-tlds-abused\/."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"e_1_3_2_1_78_1","volume-title":"International Conference on Computing, Analytics and Networks. Springer, 72--80","author":"Rani Shama","year":"2017","unstructured":"Shama Rani and Jaiteg Singh. 2017. Enhancing Levenshtein's edit distance algorithm for evaluating document similarity. In International Conference on Computing, Analytics and Networks. Springer, 72--80."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3305-0"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.011"},{"key":"e_1_3_2_1_81_1","volume-title":"2014 Fourth International Conference on Advances in Computing and Communications. IEEE, 167--170","author":"Roopak S","year":"2014","unstructured":"S Roopak and Tony Thomas. 2014. A novel phishing page detection mecha- nism using html source code comparison and cosine similarity. In 2014 Fourth International Conference on Advances in Computing and Communications. IEEE, 167--170."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICATIECE45860.2019.9063824"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00077"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/WKDD.2010.108"},{"key":"e_1_3_2_1_86_1","unstructured":"Securelist. 2022. What are phishing kits? https:\/\/securelist.com\/phishing-kit-market-whats-inside-off-the-shelf-phishing-packages\/106149\/"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243779"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22510"},{"key":"e_1_3_2_1_89_1","unstructured":"Spamhaus. [n. d.]. The World's Most Abused TLDs. https:\/\/ www.spamhaus.org\/statistics\/tlds\/."},{"key":"e_1_3_2_1_90_1","first-page":"306","article-title":"Systems and methods for risk rating and pro-actively detecting malicious online ads","volume":"9","author":"Sreedharan Jayesh","year":"2016","unstructured":"Jayesh Sreedharan and Rahul Mohandas. 2016. Systems and methods for risk rating and pro-actively detecting malicious online ads. US Patent 9,306,968.","journal-title":"US Patent"},{"key":"e_1_3_2_1_91_1","unstructured":"SSL.com. 2022. DV OV IV and EV Certificates. https:\/\/www.ssl.com\/article\/dv-ov-and-ev-certificates\/."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13841-1_18"},{"key":"e_1_3_2_1_93_1","unstructured":"CNBC Tom Huddleston Jr. [n. d.]. How this scammer used phishing emails to steal over $100 million from Google and Facebook. bit.ly\/45qZXTM."},{"key":"e_1_3_2_1_94_1","unstructured":"Certificate Transparency. [n. d.]. Working together to detect maliciously or mistakenly issued certificates. https:\/\/certificate.transparency.dev."},{"key":"e_1_3_2_1_95_1","unstructured":"Twitter. [n. d.]. https:\/\/developer.twitter.com\/en."},{"key":"e_1_3_2_1_96_1","unstructured":"The Verge. 2023. Twitter is being rebranded as X. https: \/\/www.theverge.com\/2023\/7\/23\/23804629\/twitters-rebrand-to-x-may-actually-be-happening-soon."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699115"},{"key":"e_1_3_2_1_98_1","unstructured":"Vivaldi. [n. d.]. Privacy and Security Settings. https:\/\/help.vivaldi.com\/ desktop\/privacy\/privacy-settings\/."},{"key":"e_1_3_2_1_99_1","unstructured":"Norton Safe Web. [n. d.]. https:\/\/safeweb.norton.com\/."},{"key":"e_1_3_2_1_100_1","unstructured":"Weebly. 2023. TLS Certificate. https:\/\/www.weebly.com\/online-store\/tls- certificate."},{"key":"e_1_3_2_1_101_1","unstructured":"Wix. 2023. Wix homepage. https:\/\/www.wix.com\/."},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/2019599.2019606"},{"key":"e_1_3_2_1_103_1","unstructured":"ZeroSSL. 2023. Free SSL Certificates and SSL Tools - ZeroSSL. https:\/\/ zerossl.com\/."},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663758"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00021"}],"event":{"name":"IMC '23: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Montreal QC Canada","acronym":"IMC '23"},"container-title":["Proceedings of the 2023 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624812","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:17:08Z","timestamp":1755868628000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624812"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":105,"alternative-id":["10.1145\/3618257.3624812","10.1145\/3618257"],"URL":"https:\/\/doi.org\/10.1145\/3618257.3624812","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"2023-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}