{"created":"2021-03-01T06:18:29.211562+00:00","id":1894,"links":{},"metadata":{"_buckets":{"deposit":"2ca1b64b-3e7f-460a-9376-f50b3c37963c"},"_deposit":{"id":"1894","owners":[],"pid":{"revision_id":0,"type":"depid","value":"1894"},"status":"published"},"_oai":{"id":"oai:repository.dl.itc.u-tokyo.ac.jp:00001894"},"item_7_alternative_title_1":{"attribute_name":"\u305d\u306e\u4ed6\u306e\u30bf\u30a4\u30c8\u30eb","attribute_value_mlt":[{"subitem_alternative_title":"\u30a6\u30a7\u30d6\u30b9\u30d1\u30e0\u306e\u5883\u754c\u62bd\u51fa\u624b\u6cd5\u306b\u95a2\u3059\u308b\u7814\u7a76"}]},"item_7_biblio_info_7":{"attribute_name":"\u66f8\u8a8c\u60c5\u5831","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2008-03","bibliographicIssueDateType":"Issued"},"bibliographic_titles":[{}]}]},"item_7_date_granted_25":{"attribute_name":"\u5b66\u4f4d\u6388\u4e0e\u5e74\u6708\u65e5","attribute_value_mlt":[{"subitem_dategranted":"2008-03-24"}]},"item_7_degree_name_20":{"attribute_name":"\u5b66\u4f4d\u540d","attribute_value_mlt":[{"subitem_degreename":"\u4fee\u58eb(\u60c5\u5831\u7406\u5de5\u5b66)"}]},"item_7_description_5":{"attribute_name":"\u6284\u9332","attribute_value_mlt":[{"subitem_description":"As the search result ranking is getting important for attracting visitors and yielding profits, more and more people are now trying to mislead search engines in order to get higher ranking. Since link-based ranking algorithms are important tools for current search engines, web spammers are making a significant effort to manipulate the link structure of the Web, namely, link spamming. Link hijacking is one technique of link spamming. By hijacking links from normal sites to target spam sites, spammers can make search engines believe that normal sites endorse spam sites. In this research, we propose link analysis techniques for finding out link-hijacked sites using modified PageRank algorithms. We tested our methods on a large scale Japanese web archive and evaluated the accuracy.","subitem_description_type":"Abstract"}]},"item_7_full_name_3":{"attribute_name":"\u8457\u8005\u5225\u540d","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"5736","nameIdentifierScheme":"WEKO"}],"names":[{"name":"\u912d, \u5bb9\u6731"}]}]},"item_7_select_21":{"attribute_name":"\u5b66\u4f4d","attribute_value_mlt":[{"subitem_select_item":"master"}]},"item_7_subject_13":{"attribute_name":"\u65e5\u672c\u5341\u9032\u5206\u985e\u6cd5","attribute_value_mlt":[{"subitem_subject":"548","subitem_subject_scheme":"NDC"}]},"item_7_text_24":{"attribute_name":"\u7814\u7a76\u79d1\u30fb\u5c02\u653b","attribute_value_mlt":[{"subitem_text_value":"\u60c5\u5831\u7406\u5de5\u5b66\u7cfb\u7814\u7a76\u79d1\u96fb\u5b50\u60c5\u5831\u5b66\u5c02\u653b"}]},"item_7_text_4":{"attribute_name":"\u8457\u8005\u6240\u5c5e","attribute_value_mlt":[{"subitem_text_value":"\u5927\u5b66\u9662\u60c5\u5831\u7406\u5de5\u5b66\u7cfb\u7814\u7a76\u79d1\u96fb\u5b50\u60c5\u5831\u5b66\u5c02\u653b"},{"subitem_text_value":"Graduate School of Information Science and Technology Department of Information and Communication Engineering The University of Tokyo"}]},"item_creator":{"attribute_name":"\u8457\u8005","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Chung, Young joo"}],"nameIdentifiers":[{"nameIdentifier":"5735","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"\u30d5\u30a1\u30a4\u30eb\u60c5\u5831","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-05-31"}],"displaytype":"detail","filename":"48066450.pdf","filesize":[{"value":"2.8 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"48066450.pdf","url":"https://repository.dl.itc.u-tokyo.ac.jp/record/1894/files/48066450.pdf"},"version_id":"9d18b9f0-2d98-442d-bc35-62ee9ce2d65c"}]},"item_keyword":{"attribute_name":"\u30ad\u30fc\u30ef\u30fc\u30c9","attribute_value_mlt":[{"subitem_subject":"Web spam","subitem_subject_scheme":"Other"},{"subitem_subject":"Link analysis","subitem_subject_scheme":"Other"},{"subitem_subject":"Link hijacking","subitem_subject_scheme":"Other"},{"subitem_subject":"Information retrieval","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"\u8a00\u8a9e","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"\u8cc7\u6e90\u30bf\u30a4\u30d7","attribute_value_mlt":[{"resourcetype":"thesis","resourceuri":"http://purl.org/coar/resource_type/c_46ec"}]},"item_title":"A Study of Methods for Extracting the Boundaries of Web Spam","item_titles":{"attribute_name":"\u30bf\u30a4\u30c8\u30eb","attribute_value_mlt":[{"subitem_title":"A Study of Methods for Extracting the Boundaries of Web Spam"}]},"item_type_id":"7","owner":"1","path":["9/233/234","34/105/262"],"pubdate":{"attribute_name":"\u516c\u958b\u65e5","attribute_value":"2011-08-08"},"publish_date":"2011-08-08","publish_status":"0","recid":"1894","relation_version_is_last":true,"title":["A Study of Methods for Extracting the Boundaries of Web Spam"],"weko_creator_id":"1","weko_shared_id":null},"updated":"2021-03-02T08:12:19.618081+00:00"}