{"id":"https://openalex.org/W2919990070","doi":"https://doi.org/10.1145/3317549.3323407","title":"Clicktok","display_name":"Clicktok","publication_year":2019,"publication_date":"2019-05-15","ids":{"openalex":"https://openalex.org/W2919990070","doi":"https://doi.org/10.1145/3317549.3323407","mag":"2919990070"},"language":"en","primary_location":{"id":"doi:10.1145/3317549.3323407","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3323407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089038143","display_name":"Shishir Nagaraja","orcid":"https://orcid.org/0000-0001-7272-0611"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shishir Nagaraja","raw_affiliation_strings":["University of Strathclyde"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Strathclyde","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033376002","display_name":"Ryan Shah","orcid":"https://orcid.org/0000-0003-1348-8423"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ryan Shah","raw_affiliation_strings":["University of Strathclyde"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Strathclyde","institution_ids":["https://openalex.org/I181647926"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089038143"],"corresponding_institution_ids":["https://openalex.org/I181647926"],"apc_list":null,"apc_paid":null,"fwci":4.1742,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.94913189,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"105","last_page":"116"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mimicry","display_name":"Mimicry","score":0.7939361333847046},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7366635799407959},{"id":"https://openalex.org/keywords/click-through-rate","display_name":"Click-through rate","score":0.7003991603851318},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.6552938222885132},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5270333886146545},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.43377673625946045},{"id":"https://openalex.org/keywords/revenue","display_name":"Revenue","score":0.4284575879573822},{"id":"https://openalex.org/keywords/online-advertising","display_name":"Online advertising","score":0.4179019033908844},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35427552461624146},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.31489330530166626},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1073724627494812},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10326045751571655},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07634082436561584}],"concepts":[{"id":"https://openalex.org/C7863114","wikidata":"https://www.wikidata.org/wiki/Q192627","display_name":"Mimicry","level":2,"score":0.7939361333847046},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7366635799407959},{"id":"https://openalex.org/C115174607","wikidata":"https://www.wikidata.org/wiki/Q1100934","display_name":"Click-through rate","level":2,"score":0.7003991603851318},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.6552938222885132},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5270333886146545},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.43377673625946045},{"id":"https://openalex.org/C195487862","wikidata":"https://www.wikidata.org/wiki/Q850210","display_name":"Revenue","level":2,"score":0.4284575879573822},{"id":"https://openalex.org/C512338625","wikidata":"https://www.wikidata.org/wiki/Q624902","display_name":"Online advertising","level":3,"score":0.4179019033908844},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35427552461624146},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.31489330530166626},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1073724627494812},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10326045751571655},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07634082436561584},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3317549.3323407","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3323407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4286756571","display_name":null,"funder_award_id":"EP/L022796/2","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1097054","https://openalex.org/W1568244855","https://openalex.org/W1977415353","https://openalex.org/W1979896142","https://openalex.org/W2001377641","https://openalex.org/W2005708967","https://openalex.org/W2008778571","https://openalex.org/W2012286502","https://openalex.org/W2016697314","https://openalex.org/W2025827699","https://openalex.org/W2056099894","https://openalex.org/W2082180526","https://openalex.org/W2094551647","https://openalex.org/W2096697338","https://openalex.org/W2097470225","https://openalex.org/W2099194763","https://openalex.org/W2099937944","https://openalex.org/W2108832274","https://openalex.org/W2117030266","https://openalex.org/W2132133059","https://openalex.org/W2135029798","https://openalex.org/W2142145056","https://openalex.org/W2144768538","https://openalex.org/W2150010379","https://openalex.org/W2162931300","https://openalex.org/W2165613200","https://openalex.org/W2168479832","https://openalex.org/W2592632184","https://openalex.org/W2618530766","https://openalex.org/W2621761654","https://openalex.org/W2787041335","https://openalex.org/W2814294926","https://openalex.org/W2909298984"],"related_works":["https://openalex.org/W3121555120","https://openalex.org/W4286419063","https://openalex.org/W175164097","https://openalex.org/W2100597815","https://openalex.org/W2143648166","https://openalex.org/W2380781062","https://openalex.org/W1977797174","https://openalex.org/W2106728444","https://openalex.org/W2162862818","https://openalex.org/W3120879483"],"abstract_inverted_index":{"Advertising":[0],"is":[1],"a":[2,16,45,131,137,175,198,212],"primary":[3],"means":[4],"for":[5,8],"revenue":[6],"generation":[7],"millions":[9],"of":[10,25,36,47,100,111,125,133,166,178,195,203],"websites":[11],"and":[12,77,104,197,206],"smartphone":[13],"apps.":[14],"Naturally,":[15],"fraction":[17],"abuse":[18],"ad":[19,51,115,127,154],"networks":[20,52],"to":[21,32,129],"systematically":[22],"defraud":[23],"advertisers":[24],"their":[26,69],"money.":[27],"Modern":[28],"defences":[29],"have":[30,42],"matured":[31],"overcome":[33],"some":[34],"forms":[35],"click":[37,65,102,112],"fraud":[38,66],"but":[39],"measurement":[40],"studies":[41],"reported":[43],"that":[44,94,159],"third":[46],"clicks":[48,135,147,168,208],"supplied":[49],"by":[50,108,152],"could":[53],"be":[54,149],"clickspam.":[55],"Our":[56,156],"work":[57],"develops":[58],"novel":[59],"inference":[60],"techniques":[61],"which":[62,79],"can":[63],"isolate":[64],"attacks":[67],"using":[68],"fundamental":[70],"properties.":[71],"We":[72],"propose":[73],"two":[74],"defences,":[75],"mimicry":[76,161],"bait-click,":[78],"provide":[80],"clickspam":[81,107,142],"detection":[82],"with":[83,174,193],"substantially":[84],"improved":[85],"results":[86],"over":[87,215],"current":[88,216],"approaches.":[89,217],"Mimicry":[90],"leverages":[91,121],"the":[92,98,122,145,153,160,185],"observation":[93],"organic":[95,141],"clickfraud":[96],"involves":[97],"reuse":[99,113],"legitimate":[101],"traffic,":[103],"thus":[105],"isolates":[106],"detecting":[109],"patterns":[110],"within":[114],"network":[116,128],"clickstreams.":[117],"The":[118],"bait-click":[119,186],"defence":[120,162,187],"vantage":[123],"point":[124],"an":[126],"inject":[130],"pattern":[132],"bait":[134,146],"into":[136],"user's":[138],"device.":[139],"Any":[140],"generated":[143],"involving":[144],"will":[148],"subsequently":[150],"recognisable":[151],"network.":[155],"experiments":[157],"show":[158],"detects":[163],"around":[164],"81%":[165],"fake":[167],"in":[169,191,200],"stealthy":[170],"(low":[171],"rate)":[172],"attacks,":[173],"false-positive":[176,201],"rate":[177],"110":[179],"per":[180,209],"hundred":[181],"thousand":[182],"clicks.":[183],"Similarly,":[184],"enables":[188],"further":[189],"improvements":[190],"detection,":[192],"rates":[194,202],"95%":[196],"reduction":[199],"between":[204],"0":[205],"30":[207],"million":[210],"-":[211],"substantial":[213],"improvement":[214]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2}],"updated_date":"2026-05-09T13:55:54.758798","created_date":"2019-03-11T00:00:00"}
