{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:48:21Z","timestamp":1725706101266},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346002"},{"type":"electronic","value":"9783642346019"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34601-9_19","type":"book-chapter","created":{"date-parts":[[2012,11,16]],"date-time":"2012-11-16T02:04:18Z","timestamp":1353031458000},"page":"248-262","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Spammers via Aggregated Historical Data Set"],"prefix":"10.1007","author":[{"given":"Eitan","family":"Menahem","sequence":"first","affiliation":[]},{"given":"Rami","family":"Pusiz","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Alperovitch, D., Judge, P., Krasser, S.: Taxonomy of email reputation systems. In: ICDCS Workshops 2007 (2007)","DOI":"10.1109\/ICDCSW.2007.78"},{"issue":"5670","key":"19_CR2","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1126\/science.1095845","volume":"304","author":"J. Balthrop","year":"2004","unstructured":"Balthrop, J., Forrest, S., Newman, M.E.J., Williamson, M.M.: Technological networks and the spread of computer viruses. Science\u00a0304(5670), 527\u2013529 (2004)","journal-title":"Science"},{"key":"19_CR3","unstructured":"Beverly, R., Sollins, K.: Exploiting the transport-level characteristics of am. In: 5th Conference on Email and Anti-Spam, CEAS (2008)"},{"issue":"4","key":"19_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MC.2005.132","volume":"38","author":"P. Boykin","year":"2005","unstructured":"Boykin, P., Roychowdhury, V.: Leveraging social networks to fight spam. IEEE Computer\u00a038(4), 61\u201368 (2005)","journal-title":"IEEE Computer"},{"key":"19_CR5","unstructured":"Eleven. expurgate (June 2010), \n                    \n                      http:\/\/www.eleven.de\/overview-antispam.html"},{"key":"19_CR6","unstructured":"Golbeck, J., Hendler, J.: Reputation network analysis for email filtering. In: First Conference on Email and Anti-Spam, Mountain View, California, USA (2004)"},{"issue":"1","key":"19_CR7","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M. Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. SIGKDD Explorations\u00a011(1), 10\u201318 (2009)","journal-title":"SIGKDD Explorations"},{"key":"19_CR8","unstructured":"Hao, S., Syed, N.A., Feamster, N., Gray, A.G., Krasser, S.: Detecting spammers with snare: Spatiotemporal network-level automated reputation engine. In: 18th USENIX Security Symposium (2009)"},{"issue":"10","key":"19_CR9","doi-asserted-by":"publisher","first-page":"2167","DOI":"10.1016\/j.ins.2006.12.005","volume":"177","author":"I. Koprinska","year":"2007","unstructured":"Koprinska, I., Poon, J., Clark, J., Chan, J.: Learning to classify email. Inf. Sci.\u00a0177(10), 2167\u20132187 (2007)","journal-title":"Inf. Sci."},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Liu, W.: Identifying and addressing rogue servers in countering internet email misuse. In: IEEE SADFE, pp. 13\u201324 (2010)","DOI":"10.1109\/SADFE.2010.12"},{"key":"19_CR11","unstructured":"McAfee. Trustedsource, \n                    \n                      http:\/\/www.trustedsource.org\/"},{"key":"19_CR12","unstructured":"Namestnikova, M.: Securelist spam report (December 2011), \n                    \n                      http:\/\/www.securelist.com\/en\/analysis\/204792212\/Spam_report_December_2011"},{"key":"19_CR13","unstructured":"Qian, Z., Mao, Z.M., Xie, Y., Yu, F.: On network-level clusters for spam detection. In: NDSS (2010)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. In: ACM SIGCOMM, Pisa, Italy (2006)","DOI":"10.1145\/1159913.1159947"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N., Vempala, S.: Filtering spam with behavioral blacklisting. In: ACM CCS, pp. 342\u2013351 (2007)","DOI":"10.1145\/1315245.1315288"},{"issue":"2","key":"19_CR16","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/65.912716","volume":"15","author":"M.A. Ruiz-Sanchez","year":"2001","unstructured":"Ruiz-Sanchez, M.A., Biersack, E.W.: Survey and taxonomy of ip address lookup algorithms. IEEE Network\u00a015(2), 8\u201323 (2001)","journal-title":"IEEE Network"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Soldo, F., Le, A., Markopoulou, A.: Predictive blacklisting as an implicit recommendation system. In: IEEE INFOCOM, pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5461982"},{"key":"19_CR18","unstructured":"SORBS, \n                    \n                      http:\/\/www.au.sorbs.net\/"},{"key":"19_CR19","unstructured":"SpamCop, \n                    \n                      http:\/\/www.spamcop.net\/bl.shtml"},{"key":"19_CR20","unstructured":"Spamhaus, \n                    \n                      http:\/\/www.spamhaus.org"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Tang, Y., Krasser, S., Judge, P., Zhang, Y.-Q.: Fast and effective spam sender detection with granular svm on highly imbalanced mail server havior data. In: CollaborateCom, Atlanta, Georgia, USA (2006)","DOI":"10.1109\/COLCOM.2006.361856"},{"key":"19_CR22","unstructured":"West, A.G., Aviv, A.J., Chang, J., Lee, I.: Preventing malicious behavior using spatio-temporal reputation. In: ACM EUROSYS 2010 (2010)"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Youn, S., McLeod, D.: Improved spam filtering by extraction of information from text embedded image email. In: ACM SAC, New York, USA, pp. 1754\u20131755 (2009)","DOI":"10.1145\/1529282.1529677"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34601-9_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:00:21Z","timestamp":1620133221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34601-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346002","9783642346019"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34601-9_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}