{"created":"2021-03-01T06:18:29.211562+00:00","id":1894,"links":{},"metadata":{"_buckets":{"deposit":"2ca1b64b-3e7f-460a-9376-f50b3c37963c"},"_deposit":{"id":"1894","owners":[],"pid":{"revision_id":0,"type":"depid","value":"1894"},"status":"published"},"_oai":{"id":"oai:repository.dl.itc.u-tokyo.ac.jp:00001894","sets":["34:105:262","9:233:234"]},"item_7_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"ウェブスパムの境界抽出手法に関する研究"}]},"item_7_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2008-03","bibliographicIssueDateType":"Issued"},"bibliographic_titles":[{}]}]},"item_7_date_granted_25":{"attribute_name":"学位授与年月日","attribute_value_mlt":[{"subitem_dategranted":"2008-03-24"}]},"item_7_degree_name_20":{"attribute_name":"学位名","attribute_value_mlt":[{"subitem_degreename":"修士(情報理工学)"}]},"item_7_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"As the search result ranking is getting important for attracting visitors and yielding profits, more and more people are now trying to mislead search engines in order to get higher ranking. Since link-based ranking algorithms are important tools for current search engines, web spammers are making a significant effort to manipulate the link structure of the Web, namely, link spamming. Link hijacking is one technique of link spamming. By hijacking links from normal sites to target spam sites, spammers can make search engines believe that normal sites endorse spam sites. In this research, we propose link analysis techniques for finding out link-hijacked sites using modified PageRank algorithms. We tested our methods on a large scale Japanese web archive and evaluated the accuracy.","subitem_description_type":"Abstract"}]},"item_7_full_name_3":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"5736","nameIdentifierScheme":"WEKO"}],"names":[{"name":"鄭, 容朱"}]}]},"item_7_select_21":{"attribute_name":"学位","attribute_value_mlt":[{"subitem_select_item":"master"}]},"item_7_subject_13":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"548","subitem_subject_scheme":"NDC"}]},"item_7_text_24":{"attribute_name":"研究科・専攻","attribute_value_mlt":[{"subitem_text_value":"情報理工学系研究科電子情報学専攻"}]},"item_7_text_4":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"大学院情報理工学系研究科電子情報学専攻"},{"subitem_text_value":"Graduate School of Information Science and Technology Department of Information and Communication Engineering The University of Tokyo"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Chung, Young joo"}],"nameIdentifiers":[{"nameIdentifier":"5735","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-05-31"}],"displaytype":"detail","filename":"48066450.pdf","filesize":[{"value":"2.8 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"48066450.pdf","url":"https://repository.dl.itc.u-tokyo.ac.jp/record/1894/files/48066450.pdf"},"version_id":"9d18b9f0-2d98-442d-bc35-62ee9ce2d65c"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Web spam","subitem_subject_scheme":"Other"},{"subitem_subject":"Link analysis","subitem_subject_scheme":"Other"},{"subitem_subject":"Link hijacking","subitem_subject_scheme":"Other"},{"subitem_subject":"Information retrieval","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"thesis","resourceuri":"http://purl.org/coar/resource_type/c_46ec"}]},"item_title":"A Study of Methods for Extracting the Boundaries of Web Spam","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"A Study of Methods for Extracting the Boundaries of Web Spam"}]},"item_type_id":"7","owner":"1","path":["234","262"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-08-08"},"publish_date":"2011-08-08","publish_status":"0","recid":"1894","relation_version_is_last":true,"title":["A Study of Methods for Extracting the Boundaries of Web Spam"],"weko_creator_id":"1","weko_shared_id":null},"updated":"2022-12-19T03:43:24.502420+00:00"}