{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T04:17:35Z","timestamp":1765081055885,"version":"3.37.3"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T00:00:00Z","timestamp":1563753600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T00:00:00Z","timestamp":1563753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Telus Corporation, Canada"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13635-019-0095-1","type":"journal-article","created":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T13:03:26Z","timestamp":1563800606000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Crowdsourcing for click fraud detection"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7272-0002","authenticated-orcid":false,"given":"Riwa","family":"Mouawi","sequence":"first","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,22]]},"reference":[{"key":"95_CR1","unstructured":"AppBrain, \u201cDistribution of free vs. paid Android apps\u201d, [Online]. Available: \n                    http:\/\/www.appbrain.com\/stats\/free-and-paid-android-applications\n                    \n                  Accessed 29 Mar 2019."},{"key":"95_CR2","unstructured":"Statistica, \u201cWorldwide mobile app store revenues in 2015, 2016 and 2020 (in billion U.S. dollars) \u201d, [Online]. Available: \n                    https:\/\/www.statista.com\/statistics\/220186\/total-global-in-app-revenue-forecast\/\n                    \n                  Accessed 29 Mar 2019."},{"issue":"4","key":"95_CR3","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/2377677.2377715","volume":"42","author":"Vacha Dave","year":"2012","unstructured":"V. Dave, S. Guha and Y. Zhang, 'Measuring and fingerprinting click-spam in ad networks', ACM SIGCOMM Computer Communication Review, vol.42, no. 4, p. 175, 2012, Helsinki, Finland.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"95_CR4","unstructured":"dmnews, \u201cBots Mobilize\u201d, [Online]. Available: \n                    http:\/\/www.dmnews.com\/mobile-marketing\/bots-mobilize\/article\/291566\/\n                    \n                  Accessed 29 Mar 2019."},{"key":"95_CR5","unstructured":"\u201cThe Alleged $7.5 Billion Fraud in Online Advertising\u201d, Online. Available: \n                    https:\/\/moz.com\/blog\/online-advertising-fraud\n                    \n                  Accessed 29 Mar 2019."},{"key":"95_CR6","volume-title":"An empirical study of click fraud in mobile advertising networks\u2019, in Availability, Reliability and Security (ARES), 2015 10th International Conference on (pp 382-388)","author":"G Cho","year":"2015","unstructured":"G. Cho, J. Cho, Y. Song, H. Kim, An empirical study of click fraud in mobile advertising networks\u2019, in Availability, Reliability and Security (ARES), 2015 10th International Conference on (pp 382-388) (IEEE, Toulouse, France, 2015)"},{"key":"95_CR7","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391","volume-title":"\u2018MAdFraud: Investigating ad fraud in android applications\u2019, in Proceedings of the 12th annual international conference on Mobile systems, applications, and services (pp 123-134)","author":"J Crussell","year":"2014","unstructured":"J. Crussell, R. Stevens, H. Chen (2014). \u2018MAdFraud: Investigating ad fraud in android applications\u2019, in Proceedings of the 12th annual international conference on Mobile systems, applications, and services (pp 123-134), Bretton Woods, NH, USA, ACM."},{"key":"95_CR8","volume-title":"\u2018Click-fraud monetizing malware: A survey and case study\u2019, in Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on (pp 67-72)","author":"T Blizard","year":"2012","unstructured":"T. Blizard,, N. Livic, (2012). \u2018Click-fraud monetizing malware: A survey and case study\u2019, in Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on (pp 67-72), Puerto Rico, USA, IEEE."},{"key":"95_CR9","first-page":"21","volume-title":"Dissecting ghost clicks: Ad fraud via misdirected human clicks\u2019, in Proceedings of the 28th Annual Computer Security Applications Conference","author":"SA Alrwais","year":"2012","unstructured":"SA Alrwais, A Gerber, CW Dunn, O Spatscheck, M Gupta, E Osterweil (2012). Dissecting ghost clicks: Ad fraud via misdirected human clicks\u2019, in Proceedings of the 28th Annual Computer Security Applications Conference (pp 21-30), Florida, USA, ACM."},{"key":"95_CR10","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1145\/2068816.2068843","volume-title":"Understanding fraudulent activities in online ad exchanges\u2019, in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference","author":"B Stone-Gross","year":"2011","unstructured":"B. Stone-Gross, R. Stevens, A. Zarras, R. Kemmerer, C. Kruegel, G. Vigna, Understanding fraudulent activities in online ad exchanges\u2019, in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (ACM, Berlin, Germany, 2011), pp. 279\u2013294"},{"key":"95_CR11","first-page":"141","volume-title":"Characterizing large-scale click fraud in zeroaccess\u2019, in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","author":"P Pearce","year":"2014","unstructured":"P. Pearce, V. Dave, C. Grier, K. Levchenko, S. Guha, D. McCoy, G.M. Voelker, Characterizing large-scale click fraud in zeroaccess\u2019, in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (ACM, Arizona, USA, 2014), pp. 141\u2013152"},{"key":"95_CR12","first-page":"164","volume-title":"What\u2019s clicking what? techniques and innovations of today\u2019s clickbots\u2019, in Detection of Intrusions and Malware, and Vulnerability Assessment","author":"B Miller","year":"2011","unstructured":"B. Miller, P. Pearce, C. Grier, C. Kreibich, V. Paxson, What\u2019s clicking what? techniques and innovations of today\u2019s clickbots\u2019, in Detection of Intrusions and Malware, and Vulnerability Assessment (Berlin Heidelberg, Amsterdam, The Netherlands, Springer, 2011), pp. 164\u2013183"},{"key":"95_CR13","volume-title":"DECAF: detecting and characterizing ad fraud in mobile apps","author":"B Liu","year":"2014","unstructured":"B. Liu, S. Nath, R. Govindan, J. Liu, DECAF: detecting and characterizing ad fraud in mobile apps (Proc. of NSDI, Seattle, WA, USA, 2014)"},{"key":"95_CR14","first-page":"1","volume-title":"Combating Click Fraud via Premium Clicks","author":"A Juels","year":"2007","unstructured":"A. Juels, S. Stamm, M. Jakobsson, Combating Click Fraud via Premium Clicks (USENIX Security, Santa Clara, CA, USA, 2007), pp. 1\u201310"},{"key":"95_CR15","volume-title":"Data Mining Approach to Filter Click-spam in Mobile Ad Networks\u2019, in Int'l Conference on Computer Science, Data Mining & Mechanical Engg. (ICCDMME\u20192015) April 20-21, 2015 Bangkok (Thailand)","author":"D Vasumati","year":"2015","unstructured":"D. Vasumati, M.S. Vani, R. Bhramaramba, O.Y. Babu, Data Mining Approach to Filter Click-spam in Mobile Ad Networks\u2019, in Int'l Conference on Computer Science, Data Mining & Mechanical Engg. (ICCDMME\u20192015) April 20-21, 2015 Bangkok (Thailand) (2015)"},{"key":"95_CR16","first-page":"75","volume-title":"\u2018AdAttester: Secure Online Mobile Advertisement Attestation Using TrustZone\u2019, in Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services","author":"W Li","year":"2015","unstructured":"W.Li, H. Li, H. Chen, Y. Xia (2015). \u2018AdAttester: Secure Online Mobile Advertisement Attestation Using TrustZone\u2019, in Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. 75-88), Florence, Italy, ACM."},{"key":"95_CR17","first-page":"21","volume-title":"Fighting online click-fraud using bluff ads","author":"H Haddadi","year":"2010","unstructured":"H. Haddadi (2010). \u2018Fighting online click-fraud using bluff ads\u2019,ACM SIGCOMM Computer Communication Review, 40(2), 21-25, New Delhi, India."},{"key":"95_CR18","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/978-3-319-11212-1_24","volume-title":"\u2018Click Fraud Detection on the Advertiser Side\u2019, in Computer Security-ESORICS 2014","author":"H Xu","year":"2014","unstructured":"H. Xu, D. Liu, A. Koehl, H. Wang, A. Stavrou (2014). \u2018Click Fraud Detection on the Advertiser Side\u2019, in Computer Security-ESORICS 2014. 419-438), Wroclaw, Poland, Springer International Publishing."},{"issue":"III","key":"95_CR19","first-page":"Part I","volume":"VIII","author":"M Vani","year":"2014","unstructured":"M. Vani, R. Bhramaramba, D. Vasumati, O.Y. Babu, A Node-Tag Prediction Algorithm for Touch Spam Detection in Mobile Ad Networks. Int. J. Comput. Eng. Appl VIII(III), Part I (2014)","journal-title":"Int. J. Comput. Eng. Appl"},{"key":"95_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13708-2_32","volume-title":"A hybrid method to detect deflation fraud in cost-per-action online advertising","author":"X Ding","year":"2010","unstructured":"X. Ding, A hybrid method to detect deflation fraud in cost-per-action online advertising (Applied Cryptography and Network Security, Springer Berlin Heidelberg, 2010)"},{"key":"95_CR21","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1145\/1367497.1367522","volume-title":"Proceedings of the 17th international conference on World Wide Web","author":"H Nazerzadeh","year":"2008","unstructured":"H. Nazerzadeh, A. Saberi, R. Vohra, in Proceedings of the 17th international conference on World Wide Web. Dynamic cost-per-action mechanisms and applications to online advertising (ACM, New York, 2008), pp. 179\u2013188"},{"key":"95_CR22","unstructured":"L.M. Pechu\u00e1n, E.M. Ballester, J.M.G. Carrasco, Online Advertising and the CPA Model: Challenges and Opportunities. Int. J. Eng. Manage. Res. 4(3) (2014)"},{"issue":"2","key":"95_CR23","doi-asserted-by":"publisher","first-page":"113","DOI":"10.2753\/JEC1086-4415130205","volume":"13","author":"M Mahdian","year":"2008","unstructured":"M. Mahdian, K. Tomak, Pay-per-action model for on-line advertising. Int. J. Electronic. Commerce. 13(2), 113\u2013128 (2008)","journal-title":"Int. J. Electronic. Commerce."},{"key":"95_CR24","doi-asserted-by":"crossref","unstructured":"Rosales, R\u00f3mer, Haibin Cheng, and Eren Manavoglu. \"Post-click conversion modeling and analysis for non-guaranteed delivery display advertising.\" Proceedings of the fifth ACM international conference on Web search and data mining. ACM, 2012.","DOI":"10.1145\/2124295.2124333"},{"key":"95_CR25","doi-asserted-by":"crossref","unstructured":"Hu, Yu, Jiwoong Shin, and Zhulei Tang. \"Incentive Problems in Performance-Based Online Advertising Pricing: Cost per Click vs. Cost per Action.\" Manag. Sci. (2015).","DOI":"10.1287\/mnsc.2015.2223"},{"key":"95_CR26","unstructured":"K. Ross, K. Fridgeirsdottir, Cost-Per-Impression and Cost-Per-Action Pricing in Display Advertising with Risk Preferences. Manuf. Serv. Oper. Manage. (2011)"},{"issue":"6","key":"95_CR27","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1287\/mnsc.1110.1474","volume":"58","author":"C Dellarocas","year":"2012","unstructured":"C. Dellarocas, Double marginalization in performance-based advertising: Implications and solutions. Manag. Sci. 58(6), 1178\u20131195 (2012)","journal-title":"Manag. Sci."},{"key":"95_CR28","volume-title":"Pricing of online advertising: Cost-per-click-through Vs. cost-per-action. In System Sciences (HICSS), 2010 43rd Hawaii International Conference on (pp. 1-9), Hawaii IEEE","author":"YJ Hu","year":"2010","unstructured":"Y.J. Hu, J. Shin, Z. Tang, Pricing of online advertising: Cost-per-click-through Vs. cost-per-action. In System Sciences (HICSS), 2010 43rd Hawaii International Conference on (pp. 1-9), Hawaii IEEE (2010)"},{"issue":"2","key":"95_CR29","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1257\/aer.99.2.441","volume":"99","author":"Nikhil Agarwal","year":"2009","unstructured":"N. Agarwal, S. Athey, D. Yang, Skewed bidding in pay-per-action auctions for online advertising. Am. Econ. Rev., 441\u2013447 (2009)","journal-title":"American Economic Review"},{"key":"95_CR30","unstructured":"\u201cProguard\u201d, [Online]. Available: \n                    http:\/\/developer.android.com\/tools\/help\/proguard.html\n                    \n                  Accessed 29 Mar 2019."},{"key":"95_CR31","unstructured":"\u201cJava Decompiler\u201d, [Online]. Available: \n                    http:\/\/jd.benow.ca\/\n                    \n                  Accessed 29 Mar 2019."},{"key":"95_CR32","unstructured":"\u201cipify\u201d, [Online]. Available: \n                    https:\/\/api.ipify.org\/\n                    \n                  Accessed 29 Mar 2019."},{"key":"95_CR33","unstructured":"AdMob, \u201cMonetize, Promote and Analyze your apps with AdMob\u201d [Online]. Available: \n                    http:\/\/www.google.com\/ads\/admob\/\n                    \n                  Accessed 29 Mar 2019."},{"issue":"3","key":"95_CR34","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MSP.2010.88","volume":"8","author":"N Kshetri","year":"2010","unstructured":"N. Kshetri, The economics of click fraud. IEEE. Secur. Priv. 8(3), 45\u201353 (2010)","journal-title":"IEEE. Secur. Priv."},{"key":"95_CR35","doi-asserted-by":"crossref","unstructured":"Faou, Matthieu, et al. \"Follow the traffic: Stopping click fraud by disrupting the value chain.\" Privacy, Security and Trust (PST), 2016 14th Annual Conference on. IEEE, 2016.","DOI":"10.1109\/PST.2016.7907001"},{"issue":"2","key":"95_CR36","doi-asserted-by":"publisher","first-page":"91","DOI":"10.2753\/JEC1086-4415130204","volume":"13","author":"V Midha","year":"2008","unstructured":"V. Midha, The glitch in on-line advertising: a study of click fraud in pay-per-click advertising programs. Int. J. Electronic. Commerce. 13(2), 91\u2013112 (2008)","journal-title":"Int. J. Electronic. Commerce."},{"issue":"2","key":"95_CR37","doi-asserted-by":"publisher","first-page":"61","DOI":"10.2753\/JEC1086-4415130203","volume":"13","author":"K Asdemir","year":"2008","unstructured":"K. Asdemir, \u00d6. Yurtseven, M.A. Yahya, An economic model of click fraud in publisher networks. Int. J. Electron. Commerce. 13(2), 61\u201390 (2008)","journal-title":"Int. J. Electron. Commerce."},{"issue":"2","key":"95_CR38","doi-asserted-by":"publisher","first-page":"29","DOI":"10.2753\/JEC1086-4415130202","volume":"13","author":"T Dinev","year":"2008","unstructured":"T. Dinev, Q. Hu, A. Yayla, Is there an on-line advertisers' dilemma? A study of click fraud in the pay-per-click model. Int. J. Electro. Commerce. 13(2), 29\u201360 (2008)","journal-title":"Int. J. Electro. Commerce."},{"issue":"2","key":"95_CR39","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/s10115-015-0827-6","volume":"46","author":"D Berrar","year":"2016","unstructured":"D. Berrar, Learning from automatically labeled data: case study on click fraud prediction. Knowl. Inf. Syst. 46(2), 477\u2013490 (2016)","journal-title":"Knowl. Inf. Syst."},{"key":"95_CR40","doi-asserted-by":"crossref","unstructured":"X. Zhu, H. Tao, Z. Wu, J. Cao, K. Kalish, J. Kayne, in Fraud Prevention in Online Digital Advertising. Ad Fraud Categorization and Detection Methods (Springer International Publishing, 2017), pp. 25\u201338","DOI":"10.1007\/978-3-319-56793-8_4"},{"key":"95_CR41","doi-asserted-by":"crossref","unstructured":"Q. Zhang, W. Feng, in Mathematical and Computational Approaches in Advancing Modern Science and Engineering. Detecting Coalition Frauds in Online-Advertising (Springer International Publishing, 2016), pp. 595\u2013605","DOI":"10.1007\/978-3-319-30379-6_54"},{"key":"95_CR42","volume-title":"High Assurance Systems Engineering (HASE), 2016 IEEE 17th International Symposium on (pp. 157-164). IEEE","author":"MS Iqbal","year":"2016","unstructured":"M.S. Iqbal, M. Zulkernine, F. Jaafar, Y. Gu, in High Assurance Systems Engineering (HASE), 2016 IEEE 17th International Symposium on (pp. 157-164). IEEE. Fcfraud: Fighting click-fraud from the user side (2016)"},{"key":"95_CR43","doi-asserted-by":"crossref","unstructured":"X. Zhu, H. Tao, Z. Wu, J. Cao, K. Kalish, J. Kayne, Fraud Prevention in Online Digital Advertising (Springer, 2017)","DOI":"10.1007\/978-3-319-56793-8"},{"key":"95_CR44","doi-asserted-by":"crossref","unstructured":"W. Jianyu, W. Chunming, J. Shouling, G. Qinchen, L. Zhao, Fraud Detection via Coding Nominal Attributes. In Proceedings of the 2017 2nd International Conference on Multimedia Systems and Signal Processing (pp. 42-45) (ACM, 2017)","DOI":"10.1145\/3145511.3145514"},{"key":"95_CR45","doi-asserted-by":"crossref","unstructured":"M.S. Iqbal, M. Zulkernine, F. Jaafar, Y. Gu, Protecting Internet users from becoming victimized attackers of click-fraud (Journal of Software: Evolution and Process, 2016)","DOI":"10.1002\/smr.1871"},{"issue":"1","key":"95_CR46","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/s13635-015-0027-7","volume":"2016","author":"G Cho","year":"2016","unstructured":"G. Cho, J. Cho, Y. Song, D. Choi, H. Kim, Combating online fraud attacks in mobile-based advertising. EURASIP. J. Inf. Secur. 2016(1), 2 (2016)","journal-title":"EURASIP. J. Inf. Secur."},{"key":"95_CR47","unstructured":"\u201cAd fraud loss slides to $6.5 billion worldwide\u201d, [Online]. Available: \n                    https:\/\/www.zdnet.com\/article\/ad-fraud-loss-plummets-to-6-5-billion-worldwide\/\n                    \n                  Accessed 29 Mar 2019."},{"key":"95_CR48","doi-asserted-by":"crossref","unstructured":"Mouawi, R., Awad, M., Chehab, A., El Hajj, I. H., & Kayssi, A. (2018). Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing. In 2018 International Conference on Innovations in Information Technology (IIT) (pp. 88-92). IEEE.","DOI":"10.1109\/INNOVATIONS.2018.8605973"},{"key":"95_CR49","doi-asserted-by":"crossref","unstructured":"Wen, E., Cao, J., Shen, J., & Liu, X. (2018). Fraus: Launching Cost-efficient and Scalable Mobile Click Fraud Has Never Been So Easy. In 2018 IEEE Conference on Communications and Network Security (CNS) (pp. 1-9). IEEE.","DOI":"10.1109\/CNS.2018.8433126"},{"key":"95_CR50","doi-asserted-by":"crossref","unstructured":"M. Gabryel, Data Analysis Algorithm for Click Fraud Recognition. In International Conference on Information and Software Technologies (pp. 437-446). (Springer, Cham, 2018)","DOI":"10.1007\/978-3-319-99972-2_36"},{"key":"95_CR51","first-page":"13812","volume-title":"A Survey on Online Click Fraud Execution and Analysis In International Journal of Applied Engineering Research","author":"R Kayalvizhi","year":"2018","unstructured":"R. Kayalvizhi, K. Khattar, P. Mishra, A Survey on Online Click Fraud Execution and Analysis In International Journal of Applied Engineering Research (2018), pp. 13812\u201313816"},{"key":"95_CR52","doi-asserted-by":"crossref","unstructured":"Liang, Y. S., Chen, X., Chen, Y., & Xiao, P. (2018). Ad Fraud Under the Vertical Contract Structure. Xinlei and Chen, Yuxin and Xiao, Ping, Ad Fraud Under the Vertical Contract Structure (October 31, 2018).","DOI":"10.2139\/ssrn.3275958"},{"issue":"2","key":"95_CR53","first-page":"63","volume":"10","author":"M Fallah","year":"2018","unstructured":"M. Fallah, S. Zarifzadeh, Practical Detection of Click Spams Using Efficient Classification-Based Algorithms. Int. J. Inf. Commun. Technol. Res. 10(2), 63\u201371 (2018)","journal-title":"Int. J. Inf. Commun. Technol. Res."},{"key":"95_CR54","unstructured":"Nagaraja, S., & Shah, R. (2019). Clicktok: Click Fraud Detection using Traffic Analysis. arXiv preprint arXiv:1903.00733."},{"key":"95_CR55","doi-asserted-by":"crossref","unstructured":"N. Kshetri, S. Voas, Online Advertising Fraud (Published by the IEEE Computer Society, 2019)","DOI":"10.1109\/MC.2018.2887322"},{"issue":"1","key":"95_CR56","doi-asserted-by":"publisher","first-page":"27","DOI":"10.17648\/jisc.v5i1.71","volume":"5","author":"PS Almeida","year":"2019","unstructured":"P.S. Almeida, J.J. Gondim, Click Fraud Detection and Prevention System for Ad Networks. J. Inf. Secur. Cryptography. (Enigma) 5(1), 27\u201339 (2019)","journal-title":"J. Inf. Secur. Cryptography. (Enigma)"},{"key":"95_CR57","doi-asserted-by":"crossref","unstructured":"F. Dong, H. Wang, L. Li, Y. Guo, T.F. Bissyand\u00e9, T. Liu, et al., Frauddroid: Automated ad fraud detection for android apps. In Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 257-268) (ACM, 2018)","DOI":"10.1145\/3236024.3236045"},{"key":"95_CR58","volume-title":"Springer Nature Switzerland AG","author":"P Dmytro","year":"2019","unstructured":"P. Dmytro, C. Oleg, in Springer Nature Switzerland AG. How Click-Fraud Shapes Traffic: A Case Study (2019)"},{"key":"95_CR59","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.jnca.2018.02.021","volume":"112","author":"CMR Haider","year":"2018","unstructured":"C.M.R. Haider, A. Iqbal, A.H. Rahman, M.S. Rahman, An ensemble learning based approach for impression fraud detection in mobile advertising. J. Netw. Comput. Appl. 112, 126\u2013141 (2018)","journal-title":"J. Netw. Comput. Appl."}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-019-0095-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13635-019-0095-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-019-0095-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T23:10:14Z","timestamp":1595286614000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-019-0095-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,22]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["95"],"URL":"https:\/\/doi.org\/10.1186\/s13635-019-0095-1","relation":{},"ISSN":["2510-523X"],"issn-type":[{"type":"electronic","value":"2510-523X"}],"subject":[],"published":{"date-parts":[[2019,7,22]]},"assertion":[{"value":"8 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"11"}}