1 |
B. Keegan, M.A. Ahmad, D. Williams, J. Srivastava and N. Contractor, "What can gold farmers teach Us About criminal networks?," XRDS: Crossroads, vol. 17, pp. 11-15, 2011.
|
2 |
H. Itsuki, A. Takeuchi, A. Fujita, and H. Matsubara, "Exploiting MMORPG log data toward efficient RMT player detection," International Conference on Advances in Computer Entertainment Technology, pp. 118-119, Nov. 2010.
|
3 |
A.R. Kang, J. Woo, J. Park and H.K. Kim, "User Behavior Analysis for Online Game Bot Detection," Journal of The Korea Institute of information Security & Cryptology, vol. 22, no. 2, pp. 225-238, Apr. 2012.
|
4 |
A. Fujita, H. Itsuki and H. Matsubara, "Detecting Real Money Traders in MMORPG by Using Trading Network," AIIDE, Oct. 2011.
|
5 |
H. Kwon, K. Woo, H. Kim, C.K. Kim, and H.K. Kim, "Surgical strike: A novel approach to minimize collateral damage to game BOT detection," Annual Workshop on Network and Systems Support for Games, pp. 1-2, Dec. 2013.
|
6 |
Y. Chung, C.Y. Park, N.R. Kim, H. Cho, T. Yoon, H. Lee and J.H. Lee, "Game Bot Detection Approach Based on Behavior Analysis and Consideration of Various Play Styles," ETRI Journal, vol. 35, no. 6, pp. 1058-1067, Dec. 2013.
DOI
|
7 |
R. Thawonmas, Y. Kashifuji, and K.T. Chen, "Detection of MMORPG bots based on behavior analysis," International Conference on Advances in Computer Entertainment Technology, pp. 91-94, Dec. 2008.
|
8 |
I.X. Dominguez, A. Goel, D,L. Roberts and R.S Amant, "Detecting abnormal user behavior through pattern-mining input device analytics," the 2015 Symposium and Bootcamp on the Science of Security, p. 11, Apr. 2015.
|
9 |
Y. Mishima, K. Fukuda and H. Esaki, "An analysis of players and bots behaviors in MMORPG," Advanced Information Networking and Applications, pp. 870-876, Mar. 2013.
|
10 |
J. Lee, J. Lim, W. Cho and H.K. Kim, "I know what the BOTs did yesterday: full action sequence analysis using Naive Bayesian algorithm," Annual Workshop on Network and Systems Support for Games, pp. 1-2, Dec. 2013.
|
11 |
J. Lee, J. Lim, W. Cho and H.K. Kim, "In-Game Action Sequence Analysis for Game BOT Detection on the Big Data Analysis Platform," 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, vol. 2, pp. 403-414, Jan. 2015.
|
12 |
J. Woo, A.R. Kang and H.K. Kim, "Modeling of bot usage diffusion across social networks in MMORPGs," the Workshop at SIGGRAPH Asia, pp. 13-18, Nov. 2012.
|
13 |
S. Mitterhofer, C. Platzer, C. Kruegel and E. Kirda, "Server-side bot detection in massive multiplayer online games," IEEE Security and Privacy, pp.29-36, 2009.
|
14 |
R.V. Yampolskiy, and V. Govindaraju, "Embedded noninteractive continuous bot detection," Computers in Entertainment, vol. 5, no. 7, May. 2008.
|
15 |
P. Golle, and N. Ducheneaut, "Preventing bots from playing online games," Computers in Entertainment, vol. 3, pp. 3-3, Jul. 2005.
|
16 |
K.T. Chen, A. Liao, H.K.K. Pao and H.H. Chu, "Game bot detection based on avatar trajectory," Entertainment Computing-ICEC, vol. 5309, pp. 94-105, 2009.
|
17 |
M. van Kesteren, J. Langevoort, and F. Grootjen, "A step in the right direction: Botdetection in MMORPGs using movement analysis," the 21st Belgian-Dutch Conference on Artificial Intelligence, 2009.
|
18 |
K.T. Chen, H.K.K. Pao, and H.C. Chang, "Game bot identification based on manifold learning," ACM SIGCOMM Workshop on Network and System Support for Games, pp. 21-26, Oct. 2008.
|
19 |
K.T. Chen and L.W. Hong, "User Identification based on Game-Play Activity Patterns," ACM SIGCOMM workshop on Network and system support for games, pp. 7-12, 2007.
|
20 |
A.R. Kang, H.K. Kim and J. Woo, "Chatting pattern based game BOT detection: do they talk like us?," KSII Transactions on Internet and Information Systems, vol. 6, no. 11, pp. 2866-2879, Jun. 2013.
DOI
|
21 |
K. Woo, H. Kwon, H.C. Kim, C.K. Kim and H.K. Kim, "What can free money tell us on the virtual black market," ACM SIGCOMM, vol. 41, pp. 392-393, Aug. 2011.
DOI
|
22 |
M.A. Ahmad, B. Keegan, A. Roy, D. Williams, J. Srivastava and N. Contractor, "Guilt by association? Network based propagation approaches for gold farmer detection," Advances in Social Networks Analysis and Mining, pp.121-126, Aug. 2013.
|
23 |
T.K. Ho, "Random decision forests," Document Analysis and Recognition, vol. 1. pp. 278-282, 1995.
DOI
|
24 |
Y. Ki, J. Woo and H.K. Kim, "Identifying spreaders of malicious behaviors in online games," the 23rd international conference on World wide web companion, pp. 315-316, Apr. 2014.
|
25 |
J. Woo, A.R. Kang and H.K Kim, "The contagion of malicious behaviors in online games," ACM SIGCOMM Computer Communication Review, vol. 43, pp. 543-544, 2013.
DOI
|