{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T00:58:00Z","timestamp":1648947480460},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,1,31]],"date-time":"2007-01-31T00:00:00Z","timestamp":1170201600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2007,6,18]]},"DOI":"10.1007\/s10489-006-0029-8","type":"journal-article","created":{"date-parts":[[2007,2,2]],"date-time":"2007-02-02T19:54:35Z","timestamp":1170446075000},"page":"39-47","source":"Crossref","is-referenced-by-count":0,"title":["An intelligent method to block e-mail bombs"],"prefix":"10.1007","volume":"27","author":[{"given":"Fengming M.","family":"Chang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,1,31]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Barber R (2001) Hackers profiled \u2013 who are they and what are their motivations. Comput Fraud Security (2):14\u201317","DOI":"10.1016\/S1361-3723(01)02017-6"},{"key":"29_CR2","doi-asserted-by":"crossref","first-page":"1140","DOI":"10.1109\/MILCOM.1997.644877","volume":"3","author":"T Bass","year":"1997","unstructured":"Bass T, Watt G (1997) A simple framework for filtering queued smtp mail (cyberwar countermeasures). IEEE MILCOM 97 Proc 3:1140\u20131144","journal-title":"IEEE MILCOM 97 Proc"},{"issue":"2","key":"29_CR3","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/65.681925","volume":"12","author":"T Bass","year":"1998","unstructured":"Bass T, Freyre A, Gruber D, Watt G (1998) E-mail bombs and countermeasures: cyber attacks on availability and brand integrity. IEEE Network 12(2):10\u201317","journal-title":"IEEE Network"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Chang FM (2005) An intelligent method for knowledge derived from limited data. In: Proceedings \u2013 2005 IEEE international conference on systems, man, and cybernetics. pp 566\u2013571","DOI":"10.1109\/ICSMC.2005.1571206"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Computer fraud & security (1996) E-mail bomb suspect arrested. Comput Fraud Security (2):3","DOI":"10.1016\/S1361-3723(97)82592-4"},{"key":"29_CR6","unstructured":"Icove D, Seger K, VonStorch W (1998) Computer Crime. O'Reilly"},{"issue":"3","key":"29_CR7","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1109\/21.256541","volume":"23","author":"JSR Jang","year":"1993","unstructured":"Jang, JSR (1993) ANFIS: adaptive-network-based fuzzy inference systems. IEEE Trans Syst Man Cybem 23(3):665\u2013685","journal-title":"IEEE Trans Syst Man Cybem"},{"key":"29_CR8","unstructured":"Jang JSR (1997) Fuzzy inference systems. Neuro-Fuzzy and Soft Computing, Prentice Hall, pp 75\u201377"},{"issue":"2","key":"29_CR9","first-page":"153","volume":"17","author":"S Jared","year":"1998","unstructured":"Jared S (1998) AOL users fall prey to hackers' dirty tricks. Comput Security 17(2):153","journal-title":"Comput Security"},{"key":"29_CR10","doi-asserted-by":"crossref","first-page":"1366","DOI":"10.1016\/S0140-3664(02)00038-5","volume":"25","author":"S Jha","year":"2002","unstructured":"Jha S, Hassan M (2002) Building agents for rule-based intrusion detection system. Comput Commun 25:1366\u20131373","journal-title":"Comput Commun"},{"issue":"1\u20134","key":"29_CR11","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.ins.2003.12.003","volume":"166","author":"Y Kadoya","year":"2004","unstructured":"Kadoya Y, Fuketa M, Atlam E, Morita K, Kashiji S, Aoe J (2004) An efficient e-mail filtering using time priority measurement. Inf Sci 166(1\u20134):213\u2013229","journal-title":"Inf Sci"},{"issue":"2","key":"29_CR12","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/3477.662757","volume":"28","author":"YH Kuo","year":"1998","unstructured":"Kuo YH, Hsu JP, Wang CW (1998) A parallel fuzzy inference model with distributed prediction scheme for reinforcement learning. IEEE Syst Man Cybern 28(2):160\u2013172","journal-title":"IEEE Syst Man Cybern"},{"issue":"4","key":"29_CR13","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1109\/TSMCB.2005.845397","volume":"35","author":"CS Lee","year":"2005","unstructured":"Lee CS, Guo SM, Hsu CY (2005) Genetic-based fuzzy image filter and its application to image processing. IEEE Trans Syst Man Cybern Part B 35(4):694\u2013711","journal-title":"IEEE Trans Syst Man Cybern Part B"},{"key":"29_CR14","first-page":"1131","volume":"176","author":"CS Lee","year":"2005","unstructured":"Lee CS, Jiang CC, Hsieh TC (2005) A genetic fuzzy agent using ontology model for meeting scheduling system. Inf Sci 176:1131\u20131155","journal-title":"Inf Sci"},{"issue":"3","key":"29_CR15","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1016\/S0165-0114(03)00201-X","volume":"142","author":"CS Lee","year":"2004","unstructured":"Lee CS, Pan CY (2004) An intelligent fuzzy agent for meeting scheduling decision support system. Fuzzy Set Syst 142(3):467\u2013488","journal-title":"Fuzzy Set Syst"},{"key":"29_CR16","unstructured":"Leinwand A, Conroy KF (1994) Network management: a practical perspective. Addison-Weslay Longman"},{"issue":"21","key":"29_CR17","doi-asserted-by":"crossref","first-page":"4491","DOI":"10.1080\/00207540600559849","volume":"44","author":"DC Li","year":"2006","unstructured":"Li DC, Wu CS, Chang FM (2006) Using data continualization and expansion to improve small data set learning accuracy for early FMS scheduling. Int J Prod Res 44(21):4491\u20134509","journal-title":"Int J Prod Res"},{"issue":"12","key":"29_CR18","doi-asserted-by":"crossref","first-page":"1320","DOI":"10.1109\/12.106218","volume":"40","author":"CT Lin","year":"1991","unstructured":"Lin CT, Lee CSG (1991) Neural-network-based fuzzy logic control and decision system. IEEE Comput 40(12):1320\u20131336","journal-title":"IEEE Comput"},{"key":"29_CR19","unstructured":"Oad T, White T (2003) Increasing the accuracy of a spam-detecting artificial immune system. 2003 Congr Evol Comput, pp. 390\u2013396"},{"key":"29_CR20","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.diin.2006.03.001","volume":"3","author":"MK Rogers","year":"2006","unstructured":"Rogers MK (2006) A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Invest 3:97\u2013102","journal-title":"Digital Invest"},{"key":"29_CR21","unstructured":"Stevens WR (1994) TCP\/IP illustrated volume I: the protocols. Addison-Weslay Longman"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Sumitomo T, Kadoya Y, Fuketa M, Morita K, Kashiji S, Aoe J (2004) An new e-mail filtering technique using time priority measurement. In: Proceedings-Ninth internation symposium on computers and communications, pp. 122\u2013127","DOI":"10.1109\/ISCC.2004.1358392"},{"key":"29_CR23","unstructured":"Wang JH, Deng PH, Fan YS, Jaw LJ, Liu, YC (2003) Virus detection using data mining techinques. In: Proceedings-IEEE 37th Annual 2003 internation carnahan conference on security technology, pp. 71\u201376"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Wood P (2006) The hacker's top five routes into the network (and how to block them). Network Security (2):5\u20139","DOI":"10.1016\/S1353-4858(06)70334-8"},{"key":"29_CR25","unstructured":"Yen J, Langari R (1999) Fuzzy logic\u2014intelligence, control, and information. Prentice Hall"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Zakariah R, Ehsan S (2006) Detecting junk mails by implementing statistical theory. In: Proceedings 20th internation conference on advanced inforamation networking and applications","DOI":"10.1109\/AINA.2006.143"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-006-0029-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-006-0029-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-006-0029-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T18:25:38Z","timestamp":1559154338000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-006-0029-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1,31]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,6,18]]}},"alternative-id":["29"],"URL":"https:\/\/doi.org\/10.1007\/s10489-006-0029-8","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,1,31]]}}}