"Is It Legit, To You?". An Exploration of Players' Perceptions of Cheating in a Multiplayer Video Game: Making Sense of Uncertainty
Arianna Boldi, Amon Rapp
International Journal of Human–Computer Interaction, 2024, Vol. 40, No. 15, 4021-4041
Target: Third-party software cheats (wallhacks, aimbots, aimlock), game glitch exploitation, technological advantages (VPNs, expensive hardware)
Aim: Boldi, A., & Rapp, A. (2024). "Is It Legit, To You?". An Exploration of Players' Perceptions of Cheating in a Multiplayer Video Game: Making Sense of Uncertainty. International Journal of Human–Computer Interaction, 40(15), 4021-4041.
Recommendation: (Boldi & Rapp, 2024)
Addressing Cheating in Distributed MMOGs
Patric Kabus, Wesley W. Terpstra, Mariano Cilia, Alejandro P. Buchmann
ACM NetGames Conference 2005
Target: Item duplication, information leakage, state manipulation, general MMOG cheats
Aim: Kabus, P., Terpstra, W. W., Cilia, M., & Buchmann, A. P. (2005). Addressing cheating in distributed MMOGs. In Proceedings of the 4th ACM SIGCOMM workshop on Network and system support for games (pp. 1-6). ACM.
Recommendation: (Kabus et al., 2005)
Redefining the risks of kernel-level anti-cheat in online gaming
Anton Maario, Vinod Kumar Shukla, A. Ambikapathy, Purushottam Sharma
IEEE SPIN Conference 2021
Target: Multiple cheat types: aimbot, triggerbot, wallhack, ESP, mobility hacks, hardware cheats
Aim: Maario, A., Shukla, V. K., Ambikapathy, A., & Sharma, P. (2021). Redefining the risks of kernel-level anti-cheat in online gaming. In 2021 8th International Conference on Signal Processing and Integrated Networks (SPIN) (pp. 676-680).
Recommendation: (Maario et al., 2021)
Detecting Cheating in Computer Games using Data Mining Methods
Alexandre Philbert
American Journal of Computer Science and Information Technology, Vol. 6, No. 3, 2018
Target: Signature-based cheats, metamorphic/polymorphic cheats, malicious executables, aimbot, wall hack, no recoil, radar hack
Aim: Philbert, A. (2018). Detecting cheating in computer games using data mining methods. American Journal of Computer Science and Information Technology, 6(3), 26.
Recommendation: (Philbert, 2018)