Affiliation:
1. Department of Computer Science & Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Avadi, Chennai, Tamil Nadu, India
Abstract
Mobile ads are tormented with deceitful clicks that may be an important test for the advertising network. Albeit documented promotion systems utilize various methods to acknowledge click fraud, they don’t shield the client from conceivable intrigue among distributors and advertisement systems. What’s additional, promotion systems can’t screen the client’s action for click fraud location once they're entertained to the advertising web content following clicking the ad, i.e., in a web site there will be focuses or some specific spots after we click on the actual spot it'll be entertained to the advertising web site. We propose another publically support-based mostly framework referred to as Click Fraud Crowdsourcing (CFC) that works in conjunction with the two promoters and advertisement organizes therefore as to defend the two gatherings from any conceivable click dishonorable acts. The framework profits by each a worldwide view, wherever it accumulates various promotion demands examining to various advertising organize distributer publicist blends, and a nearby read, wherever it will follow the clients’ commitment in every advertising website.
Reference5 articles.
1. Asdemir, Kursad; Yurtseven, O¨ zden; Yahya, Mon (2008).”An Economic Model of Click Fraud in Publisher Networks”.
2. Schonfeld, Erick (October 8, 2009; The Evolution Of Click Fraud: Massive Chinese Operation DormRing1 Uncovered”. TechCrunch. [3] Badhe, Anup (April 2016). ”Click Fraud Detection in mobile ads served in programmatic exchanges” (PDF). International Journal of Scientific Technology Research. 05: 1.
3. Majumdar, Saugat; Kulkarni, Dhananjay; Ravishankar, Chinya (2007). ”Addressing Click Fraud in Content Delivery Systems” (PDF). Infocom. IEEE.
4. Google click fraud, http://www.law.com/jsp/article.jsp?id=1153213525 657.
5. N. Kshetri. The economics of click fraud. IEEE Security & Privacy,8(3):45–53, May 2010
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献