{"id":"https://openalex.org/W4308426300","doi":"https://doi.org/10.1145/3505270.3558329","title":"Cashflow Tracing: Detecting Online game bots leveraging financial analysis with Recurrent Neural Networks","display_name":"Cashflow Tracing: Detecting Online game bots leveraging financial analysis with Recurrent Neural Networks","publication_year":2022,"publication_date":"2022-11-02","ids":{"openalex":"https://openalex.org/W4308426300","doi":"https://doi.org/10.1145/3505270.3558329"},"language":"en","primary_location":{"id":"doi:10.1145/3505270.3558329","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3505270.3558329","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108853443","display_name":"Kyung Ho Park","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Kyung Ho Park","raw_affiliation_strings":["Graduate School of Information Security, Korea University, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-0760-8807","affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, Korea University, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024438179","display_name":"Eunjo Lee","orcid":"https://orcid.org/0000-0003-2673-7716"},"institutions":[{"id":"https://openalex.org/I4210135449","display_name":"NCSOFT (South Korea)","ror":"https://ror.org/03q4mza74","country_code":"KR","type":"company","lineage":["https://openalex.org/I4210135449"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Eunjo Lee","raw_affiliation_strings":["NCSoft, Republic of Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"NCSoft, Republic of Korea","institution_ids":["https://openalex.org/I4210135449"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091602017","display_name":"Huy Kang Kim","orcid":"https://orcid.org/0000-0002-0760-8807"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Huy Kang Kim","raw_affiliation_strings":["Graduate School of Information Security, Korea University, Republic of Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, Korea University, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108853443"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12483322,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"189","last_page":"195"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11197","display_name":"Digital Games and Media","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7325707077980042},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.6247662901878357},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.5075329542160034},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4672999382019043},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4646078944206238},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.43266889452934265},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38779786229133606},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1701779067516327},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16740462183952332}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7325707077980042},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.6247662901878357},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.5075329542160034},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4672999382019043},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4646078944206238},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.43266889452934265},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38779786229133606},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1701779067516327},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16740462183952332}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3505270.3558329","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3505270.3558329","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1754697193","https://openalex.org/W1998668407","https://openalex.org/W2063839866","https://openalex.org/W2187089797","https://openalex.org/W2548381605","https://openalex.org/W2576320326"],"related_works":["https://openalex.org/W2092530219","https://openalex.org/W2388464034","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W2105580438","https://openalex.org/W2057435755","https://openalex.org/W2888673113","https://openalex.org/W3121798572","https://openalex.org/W2018782216","https://openalex.org/W2212288070"],"abstract_inverted_index":{"Since":[0],"game":[1,16,122,128,186,243,254],"bots":[2,49,73,123,187,255],"and":[3,74,101,112,238,240,270],"Gold":[4],"Farmer":[5],"Group":[6],"(GFG)":[7],"create":[8],"critical":[9],"damage":[10],"toward":[11,95],"the":[12,56,62,107,147,167,170,194,202,221,226,248],"ecosystem":[13],"of":[14,37,58,64,69,118,155,174,185,197,205],"MMORPGs,":[15],"companies":[17],"have":[18,42],"struggled":[19],"to":[20,45,51,126,142],"detect":[21],"bot":[22,88,110,211],"characters":[23,111,114,151],"with":[24,214,220],"various":[25,153,161],"methods.":[26],"Primarily,":[27],"previous":[28],"researches":[29],"identified":[30],"GFGs":[31],"by":[32],"analyzing":[33],"particular":[34],"behavior":[35,70],"patterns":[36,71,117],"bots,":[38],"but":[39],"these":[40],"methods":[41],"become":[43],"easier":[44],"be":[46],"neutralized":[47],"as":[48,158,178],"started":[50],"mimic":[52],"normal":[53,113,150,191,257],"characters.":[54,206],"Moreover,":[55],"spread":[57],"mobile":[59,102,242,271],"MMORPGs":[60,97],"decreased":[61],"diversity":[63],"character":[65],"behavior;":[66],"thus,":[67],"classification":[68],"between":[72],"users":[75,159],"becomes":[76],"a":[77,87,210],"more":[78],"challenging":[79],"task.":[80],"To":[81],"address":[82],"this":[83],"problem,":[84],"we":[85,181,208,246],"propose":[86,176],"detection":[89,212,250,261],"method":[90],"which":[91],"is":[92,263],"generally":[93],"applicable":[94,265],"modern":[96],"in":[98,139,266],"both":[99,267],"PC":[100,233,268],"environment.":[103],"We":[104],"focused":[105],"on":[106],"analogy":[108],"that":[109],"show":[115,136],"different":[116,189],"financial":[119,140,156,183,198,203,223],"activities.":[120],"As":[121],"are":[124,188],"born":[125],"collect":[127],"assets":[129],"for":[130],"Real":[131],"Money":[132],"Trade":[133],"(RMT),":[134],"they":[135],"patterned":[137],"changes":[138],"status":[141],"maximize":[143],"its":[144],"efficiency.":[145],"On":[146],"other":[148],"hand,":[149],"take":[152],"types":[154],"activity":[157],"play":[160],"in-game":[162],"contents,":[163],"not":[164],"only":[165],"accumulate":[166],"asset.":[168],"Throughout":[169],"study,":[171],"our":[172,260],"series":[173],"analysis":[175],"contributions":[177],"follow.":[179],"First,":[180],"clarified":[182],"sequences":[184],"from":[190,231,256],"characters;":[192],"therefore,":[193],"sequential":[195],"form":[196],"features":[199],"precisely":[200],"describes":[201],"pattern":[204],"Second,":[207],"established":[209],"model":[213,251,262],"Recurrent":[215],"Neural":[216],"Networks":[217],"(RNN)":[218],"trained":[219],"aforementioned":[222],"sequences.":[224],"With":[225],"real-world":[227],"log":[228],"data":[229],"extracted":[230],"three":[232],"games":[234],"(Lineage,":[235],"Aion,":[236],"Blade":[237],"Soul),":[239],"one":[241],"(Lineage":[244],"M),":[245],"validated":[247],"proposed":[249],"effectively":[252],"identifies":[253],"users.":[258],"Lastly,":[259],"widely":[264],"MMORPG":[269],"MMORPG.":[272]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
