{"id":"https://openalex.org/W1984936212","doi":"https://doi.org/10.1145/2046707.2046761","title":"Fashion crimes","display_name":"Fashion crimes","publication_year":2011,"publication_date":"2011-10-17","ids":{"openalex":"https://openalex.org/W1984936212","doi":"https://doi.org/10.1145/2046707.2046761","mag":"1984936212"},"language":"en","primary_location":{"id":"doi:10.1145/2046707.2046761","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2046707.2046761","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073243028","display_name":"Tyler Moore","orcid":"https://orcid.org/0000-0002-8771-8191"},"institutions":[{"id":"https://openalex.org/I189731429","display_name":"Wellesley College","ror":"https://ror.org/01srpnj69","country_code":"US","type":"education","lineage":["https://openalex.org/I189731429"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tyler Moore","raw_affiliation_strings":["Wellesley College, Wellesley, MA, USA","Wellesley College , Wellesley , MA , USA"],"affiliations":[{"raw_affiliation_string":"Wellesley College, Wellesley, MA, USA","institution_ids":["https://openalex.org/I189731429"]},{"raw_affiliation_string":"Wellesley College , Wellesley , MA , USA","institution_ids":["https://openalex.org/I189731429"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082261492","display_name":"Nektarios Leontiadis","orcid":"https://orcid.org/0000-0001-5882-4502"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nektarios Leontiadis","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, PA, USA","Carnegie-Mellon University, Pittsburgh, Pa., USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"Carnegie-Mellon University, Pittsburgh, Pa., USA#TAB#","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078075278","display_name":"Nicolas Christin","orcid":"https://orcid.org/0000-0002-2506-8031"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nicolas Christin","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, PA, USA","Carnegie-Mellon University, Pittsburgh, Pa., USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"Carnegie-Mellon University, Pittsburgh, Pa., USA#TAB#","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073243028"],"corresponding_institution_ids":["https://openalex.org/I189731429"],"apc_list":null,"apc_paid":null,"fwci":15.3898,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.98661696,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"455","last_page":"466"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7440251111984253},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6936484575271606},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.632845401763916},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.558642566204071},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.521446168422699},{"id":"https://openalex.org/keywords/ranking","display_name":"Ranking (information retrieval)","score":0.5113961100578308},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.5036723017692566},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4501112997531891},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4423261880874634},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.32687926292419434},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16178709268569946},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15767356753349304}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7440251111984253},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6936484575271606},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.632845401763916},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.558642566204071},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.521446168422699},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.5113961100578308},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.5036723017692566},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4501112997531891},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4423261880874634},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.32687926292419434},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16178709268569946},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15767356753349304},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2046707.2046761","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2046707.2046761","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM conference on Computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.75}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W10754003","https://openalex.org/W205305182","https://openalex.org/W1491237615","https://openalex.org/W1565019088","https://openalex.org/W1597482600","https://openalex.org/W1680392829","https://openalex.org/W1843351773","https://openalex.org/W1981276164","https://openalex.org/W2008906462","https://openalex.org/W2091692346","https://openalex.org/W2095610745","https://openalex.org/W2108671511","https://openalex.org/W2121252355","https://openalex.org/W2127492100","https://openalex.org/W2132280055","https://openalex.org/W2152314154","https://openalex.org/W2161020477","https://openalex.org/W2165109377","https://openalex.org/W2165701072","https://openalex.org/W2168760655","https://openalex.org/W2257610725","https://openalex.org/W2405780168","https://openalex.org/W3125352989","https://openalex.org/W3201444869","https://openalex.org/W4239223658"],"related_works":["https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W2009938035","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W4253977752","https://openalex.org/W2942879794","https://openalex.org/W2964829536","https://openalex.org/W2904586340","https://openalex.org/W3120595989"],"abstract_inverted_index":{"Online":[0],"service":[1],"providers":[2],"are":[3],"engaged":[4],"in":[5,31,42,75,83],"constant":[6],"conflict":[7],"with":[8],"miscreants":[9,33,170],"who":[10],"try":[11],"to":[12,19,36,62,100,150,154],"siphon":[13],"a":[14],"portion":[15],"of":[16,27,70,164],"legitimate":[17],"traffic":[18],"make":[20],"illicit":[21],"profits.":[22],"We":[23,59,87,117],"study":[24],"the":[25,68,81,162,168],"abuse":[26],"\"trending\"":[28],"search":[29,44,77],"terms,":[30],"which":[32],"place":[34],"links":[35],"malware-distributing":[37],"or":[38],"ad-filled":[39,64,73,106,129],"web":[40,43],"sites":[41,74,107,130],"and":[45,50,72,79,96,105,112,126,131],"Twitter":[46],"results,":[47,78],"by":[48,123],"collecting":[49],"analyzing":[51],"measurements":[52,125],"over":[53],"nine":[54],"months":[55],"from":[56],"multiple":[57],"sources.":[58],"devise":[60],"heuristics":[61],"identify":[63],"sites,":[65,158],"report":[66],"on":[67,109,167],"prevalence":[69],"malware":[71,104,132],"trending-term":[76],"measure":[80],"success":[82],"blocking":[84],"such":[85],"content.":[86],"uncover":[88],"collusion":[89],"across":[90],"offending":[91],"domains":[92],"using":[93],"network":[94],"analysis,":[95],"use":[97],"regression":[98],"analysis":[99],"conclude":[101,127],"that":[102,128],"both":[103],"thrive":[108],"less":[110,113],"popular,":[111],"profitable":[114],"trending":[115],"terms.":[116],"build":[118],"an":[119],"economic":[120,136],"model":[121],"informed":[122],"our":[124,140],"distribution":[133],"may":[134],"be":[135],"substitutes.":[137],"Finally,":[138],"because":[139],"measurement":[141],"interval":[142],"spans":[143],"February":[144],"2011,":[145],"when":[146],"Google":[147],"announced":[148],"changes":[149],"its":[151],"ranking":[152],"algorithm":[153],"root":[155],"out":[156],"low-quality":[157],"we":[159],"can":[160,171],"assess":[161],"impact":[163],"search-engine":[165],"intervention":[166],"profits":[169],"achieve.":[172]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":5}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2016-06-24T00:00:00"}
