{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"acsac.org","crawled_at":"2026-03-17T03:25:16.756452Z","gptbot_allowed":false,"claudebot_allowed":false,"ccbot_allowed":false,"google_extended_allowed":false,"googlebot_allowed":true,"raw_text_length":3954,"rendered_text_length":4162,"ghost_ratio":0.05000000074505806,"rendering_type":"SSR","word_count":444,"li_count":39,"tr_count":0,"th_count":0,"structure_score":8.779999732971191,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"proprietary","server_header":"","cdn":"","http_status":200,"load_time_ms":518,"total_html_bytes":20820,"useful_text_bytes":3954,"token_bloat_ratio":5.300000190734863,"images_total":13,"images_with_alt":13,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":0,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Annual Computer Security Applications Conference (ACSAC)","meta_description":"The Annual Computer Security Applications Conference (ACSAC) brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest discussions, and workshops, ACSAC continues its core mission of investigating practical solutions for computer and network security technology.","logo_url":"https://acsac.org/favicon.ico","crawl_blocked":false,"ai_readiness_score":15,"sub_bot_access":20,"sub_rendering":99,"sub_structure":54,"sub_schema":0,"sub_tech_stack":50,"extractability_score":60,"crawl_cost_score":10,"crawl_cost_label":"Low","blocklist_risk":4,"blocklist_risk_label":"Critical","gatekeeper_active":true,"acri_score":44,"acri_extractability":69,"acri_semantic_structure":36,"acri_content_integrity":35,"acri_retrieval_robustness":32,"acri_grade":"D","h1_text":"It's a wrap!A Hui Hou Kākou","h2_texts":"Mahalo for joining us in Hawaii! | Keynote | Hard Topic Theme: Automated Detection and Patching of Software Vulnerabilities","tranco_rank":654174,"title_length":56,"meta_desc_length":496,"has_canonical":false,"canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":3,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Annual Computer Security Applications Conference (ACSAC)","og_description":"The Annual Computer Security Applications Conference (ACSAC) brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest discussions, and workshops, ACSAC continues its core mission of investigating practical solutions for computer and network security technology.","og_image":"https://www.acsac.org/2025/ACSACcard2025.png","ttfb_ms":518,"dom_node_count":246,"html_payload_kb":20.3,"has_hsts":true,"has_csp":true,"sitemap_declared":false,"internal_links":38,"external_links":16,"tracker_scripts":0,"tracker_token_pct":0,"global_score":48,"seo_pillar":43,"geo_pillar":73,"perf_pillar":80,"arch_pillar":86,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":215284,"ai_trust_percentile":0,"inbound_ai_links":1,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-30T11:05:59.764014Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"ACSAC is an annual computer security conference attracting over 200 attendees, including industry professionals, researchers, and academics, focused on technical discussions and networking.","target_audience":"Researchers, engineers, security professionals, academics, conference attendees","pricing_model":"Registration fees vary based on attendee type and early registration discounts; conferencehip program for students covers registration and travel.","integration_partners":[],"compliance_standards":[],"competitive_moat":"Unique conference format fostering in-depth technical discussions and networking opportunities, distinct from typical conference structures.","content_depth_score":6,"key_pain_points":["Limited information on speaker guidelines and session chair responsibilities.","Lack of a structured FAQ schema."]}},"percentile":33,"similar_domains":[{"domain":"promet-split.hr","acri_score":54,"ai_readiness_score":69,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":7.099999904632568,"schema_count":0,"distance":14.03999991416931,"page_title":"Promet d.o.o. - Split","h1_text":""},{"domain":"futanarireview.com","acri_score":54,"ai_readiness_score":69,"tech_stack":"proprietary","category":"ecommerce","token_bloat_ratio":7.699999809265137,"schema_count":0,"distance":14.219999885559082,"page_title":"Futanari Porn Review | Free Pics Galleries","h1_text":""},{"domain":"laist.com","acri_score":54,"ai_readiness_score":58,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":4.5,"schema_count":1,"distance":14.24000005722046,"page_title":"Local and national news, NPR, things to do, food recommendations and guides to Los Angeles, Orange County and the Inland Empire | LAist","h1_text":""},{"domain":"worldfishingnetwork.com","acri_score":54,"ai_readiness_score":68,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":2.5999999046325684,"schema_count":0,"distance":14.310000085830689,"page_title":"World Fishing Network - World Fishing Network","h1_text":""},{"domain":"beritajakarta.id","acri_score":54,"ai_readiness_score":68,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":2.299999952316284,"schema_count":0,"distance":14.400000071525573,"page_title":"Beritajakarta.id","h1_text":""}]}
