{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:58:36Z","timestamp":1730343516042,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,2]]},"DOI":"10.23919\/icac50006.2021.9594223","type":"proceedings-article","created":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T22:53:16Z","timestamp":1637016796000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["The Price Scraping Bot Threat on E-commerce Store Using Custom XPATH Technique"],"prefix":"10.23919","author":[{"given":"Rida","family":"Yaqoob","sequence":"first","affiliation":[]},{"family":"Sanaa","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Haris","sequence":"additional","affiliation":[]},{"family":"Samadyar","sequence":"additional","affiliation":[]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCET.2018.8537333"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICITEE49829.2020.9271770"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343218"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2019.8822022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2991\/icoiese-18.2019.50"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.08.237"},{"key":"ref16","first-page":"371","article-title":"On the effectiveness of machine and deep learning for cybersecurity","author":"apruzzese","year":"2018","journal-title":"IEEE"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA48467.2019.00021"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01220-y"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-5348-0.ch006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity49315.2020.9138856"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0074-7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102577"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-018-1233-7"},{"year":"2019","key":"ref7","article-title":"Bad Bot Report"},{"key":"ref2","article-title":"Good bot vs. bad bot: Opportunities and consequences of using automated software in corporate communications","volume":"22","author":"godulla","year":"2021"},{"journal-title":"Technical Report","article-title":"Bad Bot Report","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005594"}],"event":{"name":"2021 26th International Conference on Automation and Computing (ICAC)","start":{"date-parts":[[2021,9,2]]},"location":"Portsmouth, United Kingdom","end":{"date-parts":[[2021,9,4]]}},"container-title":["2021 26th International Conference on Automation and Computing (ICAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9594055\/9594061\/09594223.pdf?arnumber=9594223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T21:01:54Z","timestamp":1646686914000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9594223\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,2]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/icac50006.2021.9594223","relation":{},"subject":[],"published":{"date-parts":[[2021,9,2]]}}}