{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:46:57Z","timestamp":1725518817546},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881919"},{"type":"electronic","value":"9783540881926"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88192-6_26","type":"book-chapter","created":{"date-parts":[[2008,9,29]],"date-time":"2008-09-29T04:05:59Z","timestamp":1222661159000},"page":"272-281","source":"Crossref","is-referenced-by-count":8,"title":["Using Data Mining Methods to Predict Personally Identifiable Information in Emails"],"prefix":"10.1007","author":[{"given":"Liqiang","family":"Geng","sequence":"first","affiliation":[]},{"given":"Larry","family":"Korba","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yunli","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hongyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yonghua","family":"You","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules. In: Proceedings of the 20th International Conference on Very Large Databases, Santiago, Chile, pp. 487\u2013499 (1994)"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: Proceedings of the ACM SIGMOD Conference on Management of Data, Dallas, Texas, pp. 439\u2013450 (2000)","DOI":"10.1145\/335191.335438"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Armour, Q., Elazmeh, W., El-Kadri, N., Japkowicz, N., Matwin, S.: Privacy Compliance Enforcement in Email. In: Canadian Conference on AI, pp. 194\u2013204 (2005)","DOI":"10.1007\/11424918_20"},{"key":"26_CR4","unstructured":"Boufaden, N., Elazmeh, W., Ma, Y., Matwin, S., El-Kadri, N., Japkowicz, N.: PEEP - An Information Extraction base approach for Privacy Protection in Email. In: CEAS (2005)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Carvalho, V.R., Cohen, W.W.: Preventing Information Leaks in Email. In: SDM (2007)","DOI":"10.1137\/1.9781611972771.7"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy Preserving Mining of Association Rules. In: Proceedings of 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) (2002)","DOI":"10.1145\/775047.775080"},{"key":"26_CR7","unstructured":"Han, H., Giles, C.L., Manavoglu, E., Zha, H., Zhang, Z., Fox, E.A.: Automatic Document Metadata Extraction Using Support Vector Machines. In: Proceedings of the 2003 Joint Conference o Digital Libraries (JDCL 2003), pp. 37\u201348 (2003)"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-74780-2_10","volume-title":"Cooperative Design, Visualization, and Engineering","author":"L. Korba","year":"2007","unstructured":"Korba, L., Song, R., Yee, G., Patrick, A., Buffett, S., Wang, Y., Geng, L.: Private Data Management in Collaborative Environments. In: Luo, Y. (ed.) CDVE 2007. LNCS, vol.\u00a04674, pp. 88\u201396. Springer, Heidelberg (2007)"},{"key":"26_CR9","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Micheline Kamber Publishers (2006)"},{"key":"26_CR10","volume-title":"Readings in Information Retrieval","author":"K.S. Jones","year":"1997","unstructured":"Jones, K.S., Willet, P.: Readings in Information Retrieval. Morgan Kaufmann, San Francisco (1997)"},{"key":"26_CR11","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"I.H. Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)","edition":"2"},{"key":"26_CR12","unstructured":"http:\/\/www.isi.edu\/~adibi\/Enron\/Enron.htm"},{"key":"26_CR13","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Luhn_algorithm"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88192-6_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:52:42Z","timestamp":1558266762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88192-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540881919","9783540881926"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88192-6_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}