{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:12:52Z","timestamp":1720717972525},"reference-count":18,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T00:00:00Z","timestamp":1401321600000},"content-version":"vor","delay-in-days":148,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2014]]},"DOI":"10.1016\/j.procs.2014.05.363","type":"journal-article","created":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T09:31:00Z","timestamp":1401355860000},"page":"1084-1091","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":16,"special_numbering":"C","title":["Analysis and Detection of Bogus Behavior in Web Crawler Measurement"],"prefix":"10.1016","volume":"31","author":[{"given":"Quan","family":"Bai","sequence":"first","affiliation":[]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Longtao","family":"He","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2014.05.363_bib0005","unstructured":"Pinkerton B. Finding what people want: Experiences with the WebCrawler. Proceedings of the Second International World Wide Web Conference. 1994, 94, p. 17-20."},{"key":"10.1016\/j.procs.2014.05.363_bib0010","unstructured":"Sun Li-wei, He Guo-hui, Wu Li-fa. Research on the Web Crawler. Computer Knowledge and Technology, 2010, 6(15): 4112-4113."},{"key":"10.1016\/j.procs.2014.05.363_bib0015","unstructured":"Zhou Li-Zhu, Lin Ling. Survey on the Research of Focused Crawling Technique. Computer Applications, 2005, 25(9): 1965-1969. (in Chinese)."},{"key":"10.1016\/j.procs.2014.05.363_bib0020","unstructured":"Zeng Wei-hui, Li Miao. Survey on Research of Deep Web Crawler. Computer Applications, 2008, 17(5): 122-125."},{"key":"10.1016\/j.procs.2014.05.363_bib0025","unstructured":"Bhushan R, Nath R. Web Crawler\u2013A Review. International Journal of Advanced Research in Computer Science and Software Engineering. 2013, 8(3): 54-57."},{"key":"10.1016\/j.procs.2014.05.363_bib0030","unstructured":"Yang W, Qu S. The legal nature of the crawler protocol. Journal of Law Application, 2013 (4): 30-34. (in Chinese)."},{"key":"10.1016\/j.procs.2014.05.363_bib0035","doi-asserted-by":"crossref","unstructured":"Thelwall M, Stuart D. Web crawling ethics revisited: Cost, privacy, and denial of service. Journal of the American Society for Information Science and Technology, 2006, 57(13): 1771-1779.","DOI":"10.1002\/asi.20388"},{"key":"10.1016\/j.procs.2014.05.363_bib0040","doi-asserted-by":"crossref","unstructured":"Giles C L, Sun Y, Councill I G. Measuring the web crawler ethics. Proceedings of the 19th international conference on World Wide Web. ACM, 2010, p. 1101-1102.","DOI":"10.1145\/1772690.1772824"},{"key":"10.1016\/j.procs.2014.05.363_bib0045","doi-asserted-by":"crossref","unstructured":"Stevanovic D, An A, Vlajic N. Feature evaluation for web crawler detection with data mining techniques. Expert Systems with Applications, 2012, 39(10): 8707-8717.","DOI":"10.1016\/j.eswa.2012.01.210"},{"key":"10.1016\/j.procs.2014.05.363_bib0050","doi-asserted-by":"crossref","unstructured":"Aghamohammadi A, Eydgahi A. A novel defense mechanism against web crawlers intrusion. Electronics, Computer and Computation (ICECCO), 2013 International Conference on. IEEE, 2013, p. 269-272.","DOI":"10.1109\/ICECCO.2013.6718280"},{"key":"10.1016\/j.procs.2014.05.363_bib0055","unstructured":"Bomhardt C, Gaul W, Schmidt-Thieme L. Web robot detection-preprocessing web logfiles for robot detection. Springer Berlin Heidelberg, 2005."},{"key":"10.1016\/j.procs.2014.05.363_bib0060","doi-asserted-by":"crossref","unstructured":"Fan Chun-long, Yuan Bin Yu Zhao-hua, et al. Spider detection based on tap techniques. Journal of Computer Applications, 2010, 30(7): 1782-1784.(in Chinese).","DOI":"10.3724\/SP.J.1087.2010.01782"},{"key":"10.1016\/j.procs.2014.05.363_bib0065","doi-asserted-by":"crossref","unstructured":"Guo W, Zhong Y, Xie J. A Web Crawler Detection Algorithm Based on Web Page Member List. Intelligent Human-Machine Systems and Cybernetics (IHMSC), 2012 4th International Conference on. IEEE, 2012, 1, p. 189-192.","DOI":"10.1109\/IHMSC.2012.54"},{"key":"10.1016\/j.procs.2014.05.363_bib0070","doi-asserted-by":"crossref","unstructured":"Tan P N, Kumar V. Discovery of web robot sessions based on their navigational patterns. Intelligent Technologies for Information Analysis. Springer Berlin Heidelberg, 2004, p. 193-222.","DOI":"10.1007\/978-3-662-07952-2_9"},{"key":"10.1016\/j.procs.2014.05.363_bib0075","doi-asserted-by":"crossref","unstructured":"Stassopoulou, Athena, and Marios D. Dikaiakos. \u201cWeb robot detection: A probabilistic reasoning approach.\u201d Computer Networks 53.3 (2009): 265-278.","DOI":"10.1016\/j.comnet.2008.09.021"},{"key":"10.1016\/j.procs.2014.05.363_bib0080","doi-asserted-by":"crossref","unstructured":"Lu W Z, Yu S Z. Web robot detection based on hidden Markov model. Communications, Circuits and Systems Proceedings, 2006 International Conference on. IEEE, 2006, 3, p. 1806-1810.","DOI":"10.1109\/ICCCAS.2006.285024"},{"key":"10.1016\/j.procs.2014.05.363_bib0085","unstructured":"Song Ting. Research and Implement of Web Crawler Detection Based on SVM. Tianjin University, 2010.(in Chinese)."},{"key":"10.1016\/j.procs.2014.05.363_bib0090","doi-asserted-by":"crossref","unstructured":"Brin, Sergey, and Lawrence Page. \u201cThe anatomy of a large-scale hypertextual Web search engine.\u201d Computer networks and ISDN systems30.1 (1998): 107-117.","DOI":"10.1016\/S0169-7552(98)00110-X"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050914005407?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050914005407?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T10:47:22Z","timestamp":1636109242000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050914005407"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":18,"alternative-id":["S1877050914005407"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2014.05.363","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Analysis and Detection of Bogus Behavior in Web Crawler Measurement","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2014.05.363","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}