{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:53:42Z","timestamp":1725533622953},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642029172"},{"type":"electronic","value":"9783642029189"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02918-9_3","type":"book-chapter","created":{"date-parts":[[2009,6,26]],"date-time":"2009-06-26T14:15:11Z","timestamp":1246025711000},"page":"38-47","source":"Crossref","is-referenced-by-count":1,"title":["Towards Proactive Spam Filtering (Extended Abstract)"],"prefix":"10.1007","author":[{"given":"Jan","family":"G\u00f6bel","sequence":"first","affiliation":[]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[]},{"given":"Philipp","family":"Trinius","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Andreolini, M., Bulgarelli, A., Colajanni, M., Mazzoni, F.: HoneySpam: Honeypots Fighting Spam at the Source. In: Proceedings of the SRUTI 2005 (2005)","key":"3_CR1"},{"unstructured":"Androutsopoulos, I., Koutsias, J., Chandrinos, K.V., Paliouras, G., Spyropoulos, C.D.: An Evaluation of Naive Bayesian Anti-Spam Filtering. In: Workshop on Machine Learning in the New Information Age (2000)","key":"3_CR2"},{"issue":"5","key":"3_CR3","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/72.788645","volume":"10","author":"H. Drucker","year":"1999","unstructured":"Drucker, H., Wu, D., Vapnik, V.: Support vector machines for spam categorization. IEEE Transactions on Neural Networks\u00a010(5), 1048\u20131054 (1999)","journal-title":"IEEE Transactions on Neural Networks"},{"unstructured":"Honeynet Project. Know Your Enemy Lite: Proxy Threats \u2013 Port v666 (2008), \n                    \n                      http:\/\/honeynet.org\/papers\/proxy\/index.html","key":"3_CR4"},{"unstructured":"John, J.P., Moshchuk, A., Gribble, S.D., Krishnamurthy, A.: Studying Spamming Botnets Using Botlab. In: Proceedings of NSDI 2009 (2009)","key":"3_CR5"},{"doi-asserted-by":"crossref","unstructured":"Jung, J., Sit, E.: An Empirical Study of Spam Traffic and the Use of DNS Black Lists. In: Proceedings of the 4th ACM Conference on Internet Measurement (2004)","key":"3_CR6","DOI":"10.1145\/1028788.1028838"},{"doi-asserted-by":"crossref","unstructured":"Kim, J., Chung, K., Choi, K.: Spam Filtering With Dynamically Updated URL Statistics. IEEE Security and Privacy\u00a05(4) (2007)","key":"3_CR7","DOI":"10.1109\/MSP.2007.95"},{"unstructured":"Kreibich, C., Kanich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: On the spam campaign trail. In: Proceedings of LEET 2008 (2008)","key":"3_CR8"},{"unstructured":"Lemos, R.: McColo Takedown Nets Massive Drop in Spam (2008), \n                    \n                      http:\/\/www.securityfocus.com\/brief\/855","key":"3_CR9"},{"unstructured":"Pathak, A., Hu, Y.C., Mao, Z.M.: Peeking into Spammer Behavior from a Unique Vantage Point. In: Proceedings of LEET 2008 (2008)","key":"3_CR10"},{"unstructured":"Provos, N., McNamee, D., Mavrommatis, P., Wang, K., Modadugu, N.: The Ghost in the Browser Analysis of Web-based Malware. In: Proceedings of HotBots 2007 (2007)","key":"3_CR11"},{"issue":"4","key":"3_CR12","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1145\/1151659.1159947","volume":"36","author":"A. Ramachandran","year":"2006","unstructured":"Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. SIGCOMM Comput. Commun. Rev.\u00a036(4), 291\u2013302 (2006)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"unstructured":"Ramachandran, A., Feamster, N., Dagon, D.: Revealing Botnet Membership Using DNSBL Counter-Intelligence. In: Proceedings of the SRUTI 2006 (2006)","key":"3_CR13"},{"unstructured":"Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A Bayesian Approach to Filtering Junk E-Mail. In: Learning for Text Categorization. AAAI Technical Report WS-98-05 (1998)","key":"3_CR14"},{"unstructured":"Stewart, J.: Top Spam Botnets Exposed (April 2008), \n                    \n                      http:\/\/secureworks.com\/research\/threats\/topbotnets\/","key":"3_CR15"},{"unstructured":"Stewart, J.: Spam Botnets to Watch in 2009 (January 2009), \n                    \n                      http:\/\/secureworks.com\/research\/threats\/botnets2009\/","key":"3_CR16"},{"unstructured":"Venkataraman, S., Sen, S., Spatscheck, O., Haffner, P., Song, D.: Exploiting Network Structure for Proactive Spam Mitigation. In: Proceedings of 16th USENIX Security Symposium (2007)","key":"3_CR17"},{"unstructured":"Wang, Y.-M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S.T.: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In: Proceedings of NDSS 2006 (2006)","key":"3_CR18"},{"doi-asserted-by":"crossref","unstructured":"Willems, C., Holz, T., Freiling, F.: CWSandbox: Towards Automated Dynamic Binary Analysis. IEEE Security and Privacy\u00a05(2) (2007)","key":"3_CR19","DOI":"10.1109\/MSP.2007.45"},{"doi-asserted-by":"crossref","unstructured":"Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming Botnets: Signatures and Characteristics. In: Proceedings of SIGCOMM 2008 (2008)","key":"3_CR20","DOI":"10.1145\/1402958.1402979"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02918-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T05:38:16Z","timestamp":1547789896000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02918-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642029172","9783642029189"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02918-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}