{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T17:20:25Z","timestamp":1774545625769,"version":"3.50.1"},"reference-count":77,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Recent research has revealed an alarming prevalence of click fraud in online advertising systems. In this article, we present a comprehensive study on the usage and impact of bots in performing click fraud in the realm of digital advertising. Specifically, we first provide an in-depth investigation of different known categories of Web-bots along with their malicious activities and associated threats. We then ask a series of questions to distinguish between the important behavioral characteristics of bots versus humans in conducting click fraud within modern-day ad platforms. Subsequently, we provide an overview of the current detection and threat mitigation strategies pertaining to click fraud as discussed in the literature, and we categorize the surveyed techniques based on which specific actors within a digital advertising system are most likely to deploy them. We also offer insights into some of the best-known real-world click bots and their respective ad fraud campaigns observed to date. According to our knowledge, this paper is the most comprehensive research study of its kind, as it examines the problem of click fraud both from a theoretical as well as practical perspective.<\/jats:p>","DOI":"10.3390\/computers10120164","type":"journal-article","created":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T05:02:36Z","timestamp":1638334956000},"page":"164","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Click Fraud in Digital Advertising: A Comprehensive Survey"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0045-657X","authenticated-orcid":false,"given":"Shadi","family":"Sadeghpour","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, York University, Toronto, ON M3J 1P3, Canada"}]},{"given":"Natalija","family":"Vlajic","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, York University, Toronto, ON M3J 1P3, Canada"}]}],"member":"1968","published-online":{"date-parts":[[2021,12,1]]},"reference":[{"key":"ref_1","unstructured":"Fourberg, N., Serpil, T., Wiewiorra, L., Godlovitch, I., De Streel, A., Jacquemin, H., Jordan, H., Madalina, N., Jacques, F., and Ledger, M. (2021, October 27). Online Advertising: The Impact of Targeted Advertising on Advertisers, Market Access and Consumer Choice. Available online: https:\/\/www.europarl.europa.eu\/thinktank\/en\/document.html?reference=IPOL_STU%282021%29662913."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2494","DOI":"10.1109\/COMST.2021.3118271","article-title":"Online Advertising Security: Issues, Taxonomy, and Future Directions","volume":"23","author":"Pooranian","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_3","unstructured":"Cavazos, P.R. (2021, October 27). The Economic Cost of Invalid Clicks in Paid Search and Paid Social Campaigns. 9. Available online: https:\/\/cdn2.hubspot.net\/hubfs\/5228455\/UniBaltimore%20PPC%20Fraud-1.pdf."},{"key":"ref_4","unstructured":"Mirtaheri, S.M., Din\u00e7kt\u00fcrk, M.E., Hooshmand, S., Bochmann, G.V., Jourdan, G.-V., and Onut, I.V. (2014). A Brief History of Web Crawlers. arXiv."},{"key":"ref_5","unstructured":"(2021, October 27). Managing and Mitigating Bots: The Automated Threat Guide\u2014Netacea. Available online: https:\/\/www.netacea.com\/managing-and-mitigating-bots-guide\/."},{"key":"ref_6","unstructured":"(2021, October 27). Bot Attacks: Top Threats and Trends. Barracuda. Available online: https:\/\/assets.barracuda.com\/assets\/docs\/dms\/Bot_Attacks_report_vol1_EN.pdf."},{"key":"ref_7","unstructured":"(2021, October 27). Bad Bot Report 2020: Bad Bots Strike Back | Imperva. Available online: https:\/\/www.imperva.com\/blog\/bad-bot-report-2020-bad-bots-strike-back\/."},{"key":"ref_8","unstructured":"(2021, October 27). Ultimate Guide to Bot Management. [E-book] Radware. Available online: https:\/\/blog.radware.com\/wp-content\/uploads\/2019\/09\/Radware_UltimateGuideBotManagement_Final.pdf."},{"key":"ref_9","unstructured":"(2021, October 27). Everything You Need to Know about Bots in 2020. Netacea. Available online: https:\/\/www.netacea.com\/evolving-threat-guide-2020\/."},{"key":"ref_10","unstructured":"(2021, October 27). What\u2019s the Difference between a Bot and a Botnet?. Available online: https:\/\/www.radwarebotmanager.com\/bots-vs-botnets\/."},{"key":"ref_11","unstructured":"(2021, October 27). Digital Education: The Cyberrisks of the Online Classroom. Available online: https:\/\/securelist.com\/digital-education-the-cyberrisks-of-the-online-classroom\/98380\/."},{"key":"ref_12","unstructured":"(2021, October 27). Differences between Marketplaces and Classifieds Portals. MarketplaceGuru. Available online: http:\/\/marketplaceguru.de\/differences-marketplaces-classifieds\/."},{"key":"ref_13","unstructured":"(2021, October 27). Industry Report: Bad Bot Landscape 2019\u2014The Bot Arms Race Continues. Available online: https:\/\/www.globaldots.com\/resources\/blog\/industry-report-bad-bot-landscape-2019-the-bot-arms-race-continues\/."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Dave, V., Guha, S., and Zhang, Y. (2013, January 4\u20138). Viceroi: Catching Click-Spam in Search Ad Networks. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany.","DOI":"10.1145\/2508859.2516688"},{"key":"ref_15","unstructured":"(2021, October 27). What Is an Ad Tag and How to Generate It [Examples Inside]. Available online: https:\/\/epom.com\/blog\/ad-server\/what-is-an-ad-tag."},{"key":"ref_16","unstructured":"(2021, October 27). About Bidding Features in Display Campaigns\u2013Google Ads Help. Available online: https:\/\/support.google.com\/google-ads\/answer\/2947304?visit_id=637427097783271992-4033346762&rd=1."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3298789","article-title":"A Large-Scale Behavioural Analysis of Bots and Humans on Twitter","volume":"13","author":"Gilani","year":"2019","journal-title":"ACM Trans. Web"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Xu, H., Liu, D., Koehl, A., Wang, H., and Stavrou, A. (2014). Click Fraud Detection on the Advertiser Side. European Symposium on Research in Computer Security, Springer.","DOI":"10.1007\/978-3-319-11212-1_24"},{"key":"ref_19","first-page":"100016","article-title":"A Hybrid and Effective Learning Approach for Click Fraud Detection","volume":"3","author":"Thejas","year":"2021","journal-title":"Mach. Learn. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1080\/15567280601015598","article-title":"Badvertisements: Stealthy Click-Fraud with Unwitting Accessories","volume":"1","author":"Gandhi","year":"2006","journal-title":"J. Digit. Forensic Pract."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Metwally, A., Agrawal, D., El Abbad, A., and Zheng, Q. (2007, January 22\u201329). On Hit Inflation Techniques and Detection in Streams of Web Advertising Networks. Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS\u201907), Toronto, ON, Canada.","DOI":"10.1109\/ICDCS.2007.124"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1016\/j.is.2011.04.001","article-title":"CATCH: A Detecting Algorithm for Coalition Attacks of Hit Inflation in Internet Advertising","volume":"36","author":"Kim","year":"2011","journal-title":"Inf. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1016\/S1389-1286(99)00023-7","article-title":"On the Security of Pay-Per-Click and Other Web Advertising Schemes","volume":"31","author":"Mayer","year":"1999","journal-title":"Comput. Netw."},{"key":"ref_24","unstructured":"Neal, A., Kouwenhoven, S., and Sa, O. (2015). Quantifying Online Advertising Fraud: Ad-Click Bots vs Humans. Techincal Report, Oxford Bio Chronometrics."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., and Maykov, A. (2007, January 8). A Taxonomy of JavaScript Redirection Spam. Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web, Banff, AB, Canada.","DOI":"10.1145\/1244408.1244423"},{"key":"ref_26","unstructured":"(2021, October 27). How to Simulate a Click by Using x, y Coordinates in JavaScript?. The Web Dev., Available online: https:\/\/thewebdev.info\/2021\/05\/02\/how-to-simulate-a-mouse-click-using-javascript\/."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.14778\/1454159.1454161","article-title":"Sleuth: Single-Publisher Attack Detection Using Correlation Hunting","volume":"1","author":"Metwally","year":"2008","journal-title":"Proc. VLDB Endow."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/S1353-4858(03)00908-5","article-title":"Spyware & Adware: The Risks Facing Businesses","volume":"2003","author":"Shaw","year":"2003","journal-title":"Netw. Secur."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ding, X. (2010). A Hybrid Method to Detect Deflation Fraud in Cost-per-Action Online Advertising. International Conference on Applied Cryptography and Network Security, Springer.","DOI":"10.1007\/978-3-642-13708-2_32"},{"key":"ref_30","unstructured":"Reiter, M.K., Anupam, V., and Mayer, A.J. (September, January 31). Detecting Hit Shaving in Click-Through Payment Schemes. Proceedings of the USENIX Workshop on Electronic Commerce, Boston, MA, USA."},{"key":"ref_31","first-page":"34","article-title":"Collaborative Click Fraud Detection and Prevention System (Ccfdp) Improves Monitoring of Software-Based Click Fraud","volume":"2005","author":"Ge","year":"2005","journal-title":"E-COMMERCE"},{"key":"ref_32","unstructured":"Juels, A., Stamm, S., and Jakobsson, M. (2007, January 6\u201310). Combating Click Fraud via Premium Clicks. Proceedings of the USENIX Security Symposium, Boston, MA, USA."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Zhang, L., and Guan, Y. (2008, January 17\u201320). Detecting Click Fraud in Pay-per-Click Streams of Online Advertising Networks. Proceedings of the 2008 the 28th International Conference on Distributed Computing Systems, Beijing, China.","DOI":"10.1109\/ICDCS.2008.98"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/1764873.1764877","article-title":"Fighting Online Click-Fraud Using Bluff Ads","volume":"40","author":"Haddadi","year":"2010","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Kantardzic, M., Walgampaya, C., Yampolskiy, R., and Woo, R.J. (2010, January 5\u20137). Click Fraud Prevention via Multimodal Evidence Fusion by Dempster-Shafer Theory. Proceedings of the 2010 IEEE Conference on Multisensor Fusion and Integration, Salt Lake City, UT, USA.","DOI":"10.1109\/MFI.2010.5604480"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Dave, V., Guha, S., and Zhang, Y. (2012, January 13\u201317). Measuring and Fingerprinting Click-Spam in Ad Networks. Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Helsinki, Finland.","DOI":"10.1145\/2342356.2342394"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Kitts, B., Zhang, J.Y., Roux, A., and Mills, R. (2013, January 4\u20137). Click Fraud Detection with Bot Signatures. Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, Seattle, WA, USA.","DOI":"10.1109\/ISI.2013.6578805"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Iqbal, M.S., Zulkernine, M., Jaafar, F., and Gu, Y. (2016, January 7\u20139). Fcfraud: Fighting Click-Fraud from the User Side. Proceedings of the 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE), Washington, DC, USA.","DOI":"10.1109\/HASE.2016.17"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"27","DOI":"10.17648\/jisc.v5i1.71","article-title":"Click Fraud Detection and Prevention System for Ad Networks","volume":"5","author":"Almeida","year":"2018","journal-title":"J. Inf. Secur. Cryptogr."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Thejas, G.S., Soni, J., Boroojeni, K.G., Iyengar, S.S., Srivastava, K., Badrinath, P., Sunitha, N.R., Prabakar, N., and Upadhyay, H.A. (2019, January 20\u201321). Multi-Time-Scale Time Series Analysis for Click Fraud Forecasting Using Binary Labeled Imbalanced Dataset. Proceedings of the 2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS), Bengaluru, India.","DOI":"10.1109\/CSITSS47250.2019.9031036"},{"key":"ref_41","first-page":"693","article-title":"A Study on Machine Learning Approach using Ensemble Learners for Click Fraud Detection in Online Advertisement","volume":"21","author":"Kar","year":"2019","journal-title":"J. Gujarat Res. Soc."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1950150","DOI":"10.1142\/S0217979219501509","article-title":"User Click Fraud Detection Method Based on Top-Rank-k Frequent Pattern Mining","volume":"33","author":"Pan","year":"2019","journal-title":"Int. J. Mod. Phys. B"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Minastireanu, E.-A., and Mesnita, G. (2019). Light Gbm Machine Learning Algorithm to Online Click Fraud Detection. J. Inform. Assur. Cybersecur., Available online: https:\/\/www.researchgate.net\/profile\/Gabriela-Mesnita\/publication\/332268924_Light_GBM_Machine_Learning_Algorithm_to_Online_Click_Fraud_Detection\/links\/5cab2156299bf118c4ba99c4\/Light-GBM-Machine-Learning-Algorithm-to-Online-Click-Fraud-Detection.pdf.","DOI":"10.5171\/2019.263928"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Nagaraja, S., and Shah, R. (2019, January 17\u201319). Clicktok: Click Fraud Detection Using Traffic Analysis. Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, Miami, FL, USA.","DOI":"10.1145\/3317549.3323407"},{"key":"ref_45","first-page":"99","article-title":"Detecting Click Fraud in Online Advertising: A Data Mining Approach","volume":"15","author":"Oentaryo","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/978-3-319-99972-2_36","article-title":"Data Analysis Algorithm for Click Fraud Recognition","volume":"Volume 920","year":"2018","journal-title":"Information and Software Technologies"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","article-title":"SMOTE: Synthetic Minority over-Sampling Technique","volume":"16","author":"Chawla","year":"2002","journal-title":"J. Artif. Intell. Res."},{"key":"ref_48","unstructured":"He, H., Bai, Y., Garcia, E.A., and Li, S. (2006, January 1\u20136). ADASYN: Adaptive Synthetic Sampling Approach for Imbalanced Learning. Proceedings of the 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), Hong Kong."},{"key":"ref_49","unstructured":"Fuller, W.A. (2009). Introduction to Statistical Time Series, John Wiley & Sons."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/0304-4076(92)90104-Y","article-title":"Testing the Null Hypothesis of Stationarity against the Alternative of a Unit Root: How Sure Are We That Economic Time Series Have a Unit Root?","volume":"54","author":"Kwiatkowski","year":"1992","journal-title":"J. Econom."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1006\/jcss.1997.1504","article-title":"A Decision-Theoretic Generalization of on-Line Learning and an Application to Boosting","volume":"55","author":"Freund","year":"1997","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random Forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10994-006-6226-1","article-title":"Extremely Randomized Trees","volume":"63","author":"Geurts","year":"2006","journal-title":"Mach. Learn."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Chen, T., and Guestrin, C. (2016, January 13\u201317). Xgboost: A Scalable Tree Boosting System. Proceedings of the 22nd ACM Sigkdd International Conference on Knowledge Discovery and Data Mining, San Franciso, CA, USA.","DOI":"10.1145\/2939672.2939785"},{"key":"ref_55","unstructured":"(2021, October 27). Oli. A Short History of Ad Click Bots & PPC Fraud. Available online: https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/."},{"key":"ref_56","unstructured":"Daswani, N., and Stoppelman, M. (2007, January 10). The Anatomy of Clickbot. A. Proceedings of the First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA, USA."},{"key":"ref_57","unstructured":"Staff, S.C. (2021, October 27). TDL-4 Variant Spreads Click-Fraud Campaign. Available online: https:\/\/www.scmagazine.com\/news\/security-news\/tdl-4-variant-spreads-click-fraud-campaign."},{"key":"ref_58","unstructured":"(2021, October 27). Rent-a-Bot Networks Tied to TDSS Botnet\u2014Krebs on Security. Available online: https:\/\/krebsonsecurity.com\/2011\/09\/rent-a-bot-networks-tied-to-tdss-botnet\/."},{"key":"ref_59","unstructured":"(2021, October 27). Microsoft, Symantec Hijack \u2018Bamital\u2019 Botnet\u2014Krebs on Security. Available online: https:\/\/krebsonsecurity.com\/2013\/02\/microsoft-symantec-hijack-bamital-botnet\/."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Holz, T., and Bos, H. (2011). What\u2019s Clicking What? Techniques and Innovations of Today\u2019s Clickbots. Detection of Intrusions and Malware, and Vulnerability Assessment, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-642-22424-9"},{"key":"ref_61","unstructured":"(2021, October 27). Stantinko Botnet Was Undetected for at Least 5 Years While Infecting Half a Million Systems. Available online: https:\/\/securityaffairs.co\/wordpress\/61250\/malware\/stantinko-botnet.html."},{"key":"ref_62","unstructured":"(2021, October 27). StantinkoTeddy Bear Surfing Out of Sight. Available online: https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/07\/Stantinko.pdf."},{"key":"ref_63","unstructured":"(2021, October 27). How Stantiko Click-Fraud Bot Butchers CPA\u2019s. C3 Metrics. Available online: https:\/\/c3metrics.com\/stantiko-click-fraud-bot-butchers-cpas\/."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Pearce, P., Dave, V., Grier, C., Levchenko, K., Guha, S., McCoy, D., Paxson, V., Savage, S., and Voelker, G.M. (2014, January 3\u20137). Characterizing Large-Scale Click Fraud in ZeroAccess. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA.","DOI":"10.1145\/2660267.2660369"},{"key":"ref_65","unstructured":"(2021, October 27). The Click Fraud Malware: How MIUREF Turns Users into Cybercriminal Accomplices\u2013Threat Encyclopedia. Available online: https:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/web-attack\/133\/the-click-fraud-malware-how-miuref-turns-users-into-cybercriminal-accomplices."},{"key":"ref_66","unstructured":"(2021, October 27). Malware Spotlight: What Is Click Fraud?-Infosec Resources. Available online: https:\/\/resources.infosecinstitute.com\/topic\/malware-spotlight-what-is-click-fraud\/#gref."},{"key":"ref_67","unstructured":"(2021, October 27). Ramdo Click-Fraud Malware Continues to Evolve | SecurityWeek.Com. Available online: https:\/\/www.securityweek.com\/ramdo-click-fraud-malware-continues-evolve."},{"key":"ref_68","unstructured":"(2021, October 27). Boaxxe Adware: \u2018A Good ad Sells the Product without Drawing Attention to Itself\u2019\u2014Pt 1. Available online: https:\/\/www.welivesecurity.com\/2014\/01\/14\/boaxxe-adware-a-good-ad-sells-the-product-without-drawing-attention-to-itself-pt-1\/."},{"key":"ref_69","unstructured":"(2021, October 27). spider.io\u2014Discovered: Botnet Costing Display Advertisers over Six Million Dollars per Month. Available online: http:\/\/www.spider.io\/blog\/2013\/03\/chameleon-botnet\/."},{"key":"ref_70","unstructured":"White Ops (2021, October 27). The Methbot Operation. White Ops, Available online: https:\/\/cdn2.hubspot.net\/hubfs\/3400937\/WO_Methbot_Operation_WP_01.pdf."},{"key":"ref_71","unstructured":"(2021, October 27). Digital Video Ad Serving Template (VAST). Available online: https:\/\/www.iab.com\/guidelines\/vast\/."},{"key":"ref_72","unstructured":"(2021, October 27). \u201cBiggest Ad Fraud Ever\u201d: Hackers Make $5M A Day by Faking 300M Video Views. Available online: https:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/12\/20\/methbot-biggest-ad-fraud-busted\/?sh=50a126324899."},{"key":"ref_73","unstructured":"(2021, October 27). Eight People Are Facing Charges as A Result of The FBI\u2019s Biggest-Ever Ad Fraud Investigation. Available online: https:\/\/www.buzzfeednews.com\/article\/craigsilverman\/3ve-botnet-ad-fraud-fbi-takedown."},{"key":"ref_74","unstructured":"(2021, October 27). How AdformDiscovered HyphBot. Available online: https:\/\/site.adform.com\/media\/85132\/hyphbot_whitepaper_.pdf."},{"key":"ref_75","unstructured":"(2021, October 27). What Is Ads.txt and How Does It Work?. Available online: https:\/\/clearcode.cc\/blog\/ads-txt\/."},{"key":"ref_76","unstructured":"(2021, October 27). Oli. Click Fraud Hall of Fame: HyphBot. Available online: https:\/\/www.clickcease.com\/blog\/click-fraud-hall-of-fame-hyphbot\/."},{"key":"ref_77","unstructured":"(2021, October 27). Intent-Based Deep Behavioral Analysis: A Proprietary Bot Detection Technology. Available online: https:\/\/www.radwarebotmanager.com\/web\/wp-content\/uploads\/IDBA_WP.pdf."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/12\/164\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:38:23Z","timestamp":1760168303000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/12\/164"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,1]]},"references-count":77,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["computers10120164"],"URL":"https:\/\/doi.org\/10.3390\/computers10120164","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,1]]}}}