-
1
Crowdsourcing for click fraud detection
Published 2019-07-01Subjects: “…Click fraud…”
Get full text
Article -
2
Click Fraud in Digital Advertising: A Comprehensive Survey
Published 2021-12-01“…Recent research has revealed an alarming prevalence of click fraud in online advertising systems. In this article, we present a comprehensive study on the usage and impact of bots in performing click fraud in the realm of digital advertising. …”
Get full text
Article -
3
CAT-RFE: ensemble detection framework for click fraud
Published 2022-10-01Subjects: “…click fraud detection…”
Get full text
Article -
4
A hybrid and effective learning approach for Click Fraud detection
Published 2021-03-01Subjects: “…Click Fraud…”
Get full text
Article -
5
Click fraud detection for online advertising using machine learning
Published 2023-07-01Subjects: “…Click fraud…”
Get full text
Article -
6
AI-Based Techniques for Ad Click Fraud Detection and Prevention: Review and Research Directions
Published 2022-12-01Subjects: “…click fraud…”
Get full text
Article -
7
An Ensemble Architecture Based on Deep Learning Model for Click Fraud Detection in Pay-Per-Click Advertisement Campaign
Published 2022-01-01Subjects: Get full text
Article -
8
-
9
Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks
Published 2012“…A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. …”
Get full text
Get full text
Article -
10
Smart Approach for Botnet Detection Based on Network Traffic Analysis
Published 2022-01-01“…Cybercriminals have exploited botnets for many illegal activities, including click fraud, DDOS attacks, and spam production. In this article, we suggest a method for identifying the behavior of data traffic using machine learning classifiers including genetic algorithm to detect botnet activities. …”
Get full text
Article -
11
AdSelector: A privacy-preserving advertisement selection mechanism for mobile devices
Published 2016“…In particular: (1) the user subscription mechanism helps users to identify their interests and subscribe to desirable categories of ads; (2) the two-stage ad selection process ensures that ad servers can only obtain coarse-grained user profiles, with fine-grained user profiles stored and used only on the mobile devices; and (3) the trustworthy billing system helps to report ad-clicks without revealing users' identities and assists in detecting click-fraud attacks. The performance of the mechanism is evaluated in the context of a prototype privacy-preserving targeted mobile advertising framework.…”
Journal article -
12
Blockchain Implications for Marketing; A Review and an Empirical Analysis
Published 2022-06-01“…This research was set out to investigate and evaluate six benefits of blockchain for marketing: fostering disintermediation, combating click fraud, reinforcing trust and transparency, enhancing privacy protection, empowering digital marketing security, and enabling creative loyalty programs. …”
Get full text
Article -
13
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
Published 2014“…The attackers use these botnets for criminal activities such as DDoS, click fraud, phishing, spamming, sniffing traffic and spreading new malware. …”
Get full text
Get full text
Conference or Workshop Item -
14
SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications.
Published 2016-01-01“…It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed Denial of Service (DDoS), disseminating other malwares and much more. …”
Get full text
Article -
15
How Blockchain Technology Can Benefit Marketing: Six Pending Research Areas
Published 2020-02-01“…Moreover, blockchain technology fosters disintermediation, aids in combatting click fraud, reinforces trust and transparency, enables enhanced privacy protection, empowers security, and enables creative loyalty programs. …”
Get full text
Article -
16
Multilayer framework for botnet detection using machine learning algorithms
Published 2021“…Botnet can perform massive cyber-attacks such as DDOS, SPAM, click-fraud, information, and identity stealing. The botnet also can avoid being detected by a security system. …”
Get full text
Article -
17
Unfair Competition Issues of Big Data in China
Published 2019-12-01“…Since 2015, more and more unfair competition cases concerning big data have occurred in China, such as masking advertisement, click fraud, malicious incompatibility, and gathering user’s personal data from competitors by unfair means, which can be categorized to unfair competition about illegal collection/use of competitors’ big data and about network traffic. …”
Get full text
Article -
18
AGCN-Domain: Detecting Malicious Domains with Graph Convolutional Network and Attention Mechanism
Published 2024-02-01“…Considering the foundation and openness of DNS, it is not surprising that adversaries register massive domains to enable multiple malicious activities, such as spam, command and control (C&C), malware distribution, click fraud, etc. Therefore, detecting malicious domains is a significant topic in security research. …”
Get full text
Article -
19
A Meta-Classification Model for Optimized ZBot Malware Prediction Using Learning Algorithms
Published 2023-06-01“…Botnets pose a real threat to cybersecurity by facilitating criminal activities like malware distribution, attacks involving distributed denial of service, fraud, click fraud, phishing, and theft identification. The methods currently used for botnet detection are only appropriate for specific botnet commands and control protocols; they do not endorse botnet identification in early phases. …”
Get full text
Article -
20
Multilayer Framework for Botnet Detection Using Machine Learning Algorithms
Published 2021-01-01“…Botnet can perform massive cyber-attacks such as DDOS, SPAM, click-fraud, information, and identity stealing. The botnet also can avoid being detected by a security system. …”
Get full text
Article