{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:47:20Z","timestamp":1757623640512,"version":"3.44.0"},"reference-count":42,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1816908"],"award-info":[{"award-number":["CNS-1816908"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1016\/j.hcc.2022.100086","type":"journal-article","created":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T22:08:03Z","timestamp":1667340483000},"page":"100086","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"title":["SubStop: An analysis on subscription email bombing attack and machine learning based mitigation"],"prefix":"10.1016","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8130-4297","authenticated-orcid":false,"given":"Aurobinda","family":"Laha","sequence":"first","affiliation":[]},{"given":"Md Tahmid","family":"Yasar","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2022.100086_bib0001","unstructured":"R. Tomlinson, http:\/\/www.computinghistory.org.uk\/det\/6116\/First-e-mail-sent-by-Ray-Tomlinson\/, 1971."},{"key":"10.1016\/j.hcc.2022.100086_bib0002","series-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security","first-page":"179","article-title":"An effective defense against email spam laundering","author":"Xie","year":"2006"},{"key":"10.1016\/j.hcc.2022.100086_bib0003","unstructured":"GARTNER, Gartner Survey Shows Phishing Attacks Escalated in 2007, 2007. Public Report, Available at http:\/\/www.gartner.com\/it\/page.jsp?id=565125."},{"key":"10.1016\/j.hcc.2022.100086_bib0004","series-title":"Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems","first-page":"1","article-title":"Facts and stories in phishing training: A replication and extension","author":"Marsden","year":"2020"},{"key":"10.1016\/j.hcc.2022.100086_bib0005","unstructured":"C. for Internet Security, MS-ISAC Security Primer-Email Bombs, 2018. Available at https:\/\/www.cisecurity.org\/white-papers\/ms-isac-security-primer-email-bombs\/."},{"key":"10.1016\/j.hcc.2022.100086_bib0006","unstructured":"M. McLuhan, This is Marshall McLuhan: The medium is the message., December 2004. Public Report, Available at http:\/\/www.messagelabs.com\/intelligence\/2004report."},{"key":"10.1016\/j.hcc.2022.100086_bib0007","series-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems","first-page":"1","article-title":"Why johnny can\u2019t unsubscribe: Barriers to stopping unwanted email","author":"Dev","year":"2020"},{"key":"10.1016\/j.hcc.2022.100086_bib0008","series-title":"2018 APWG Symposium on Electronic Crime Research (eCrime)","first-page":"1","article-title":"A layered approach to defending against list-linking email bombs","author":"Houle","year":"2018"},{"key":"10.1016\/j.hcc.2022.100086_bib0009","series-title":"Computing Conference, 2017","first-page":"149","article-title":"Employing machine learning techniques for detection and classification of phishing emails","author":"Moradpoor","year":"2017"},{"key":"10.1016\/j.hcc.2022.100086_bib0010","series-title":"2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA\/IUCC)","first-page":"1054","article-title":"Phishing emails detection using cs-svm","author":"Niu","year":"2017"},{"key":"10.1016\/j.hcc.2022.100086_bib0011","series-title":"Proceedings of the 8th International Conference on Security of Information and Networks","first-page":"271","article-title":"Machine learning approach for filtering spam emails","author":"George","year":"2015"},{"key":"10.1016\/j.hcc.2022.100086_bib0012","series-title":"Proceedings of the 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence","first-page":"457","article-title":"Active learning for spam email classification","author":"Chen","year":"2019"},{"key":"10.1016\/j.hcc.2022.100086_bib0013","unstructured":"C.D.C.M. University, Email Bombing and Spamming, 2017. Available at https:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/2002_019_001_496605.pdf."},{"key":"10.1016\/j.hcc.2022.100086_bib0014","unstructured":"D. Services, How to mitigate email bombing, 2020. Available at https:\/\/services.dartmouth.edu\/TDClient\/1806\/Portal\/KB\/ArticleDet?ID=82545."},{"key":"10.1016\/j.hcc.2022.100086_bib0015","unstructured":"R. Anderson, Email Spam Detection Using Python & Machine Learning, 2019. Available at https:\/\/medium.com\/@randerson112358\/email-spam-detection-using-python-machine-learning-abe38c889855."},{"key":"10.1016\/j.hcc.2022.100086_bib0016","series-title":"Learning for Text Categorization: Papers from the 1998 workshop","first-page":"98","article-title":"A bayesian approach to filtering junk e-mail","volume":"volume\u00a062","author":"Sahami","year":"1998"},{"issue":"5","key":"10.1016\/j.hcc.2022.100086_bib0017","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/72.788645","article-title":"Support vector machines for spam categorization","volume":"10","author":"Drucker","year":"1999","journal-title":"IEEE Trans. Neural Networks"},{"key":"10.1016\/j.hcc.2022.100086_bib0018","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.neucom.2019.01.078","article-title":"Bidirectional lstm with attention mechanism and convolutional layer for text classification","volume":"337","author":"Liu","year":"2019","journal-title":"Neurocomputing"},{"key":"10.1016\/j.hcc.2022.100086_sbref0019","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1016\/j.procs.2021.03.107","article-title":"Spam email detection using deep learning techniques","volume":"184","author":"AbdulNabi","year":"2021","journal-title":"Procedia Comput Sci"},{"key":"10.1016\/j.hcc.2022.100086_bib0020","unstructured":"Mailbait, MailBait: Fill Your Inbox, 2020. Available at http:\/\/mailbait.info\/index.html."},{"issue":"2","key":"10.1016\/j.hcc.2022.100086_bib0021","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/65.681925","article-title":"E-mail bombs and countermeasures: cyber attacks on availability and brand integrity","volume":"12","author":"Bass","year":"1998","journal-title":"IEEE Netw"},{"key":"10.1016\/j.hcc.2022.100086_bib0022","unstructured":"G. Van Rossum, F.L. Drake, Python language reference manual (2003)."},{"key":"10.1016\/j.hcc.2022.100086_bib0023","article-title":"Untraceable email cluster bombs: on agent-based distributed denial of service","author":"Jakobsson","year":"2003","journal-title":"arXiv preprint cs\/0305042"},{"key":"10.1016\/j.hcc.2022.100086_bib0024","unstructured":"Messaging, Malware Mobile Anti-Abuse Working Group, M3AAWG: M3AAWG Recommendation on Web Form Signup Attacks, 2017. Available at http:\/\/www.m3aawg.org\/WebFormAttacks."},{"key":"10.1016\/j.hcc.2022.100086_bib0025","unstructured":"Unroll.me, https:\/\/unroll.me\/, June 2012."},{"key":"10.1016\/j.hcc.2022.100086_bib0026","unstructured":"Google, Mark or unmark Spam in Gmail, 2020. Available at https:\/\/support.google.com\/mail\/answer\/1366858#report_spam."},{"key":"10.1016\/j.hcc.2022.100086_bib0027","unstructured":"spameo.com, Spameo Anti Spam Filter (Gmail), 2018. Google Chrome Extension."},{"key":"10.1016\/j.hcc.2022.100086_bib0028","unstructured":"BlockSender.io, Anti Spam 2014 (Gmail and Google Apps), 2014. Google Chrome Extension."},{"key":"10.1016\/j.hcc.2022.100086_bib0029","series-title":"Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence","first-page":"71","article-title":"Understanding the time-series behavioral characteristics of evolutionally advanced email spammers","author":"Sawaya","year":"2012"},{"key":"10.1016\/j.hcc.2022.100086_bib0030","series-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","first-page":"450","article-title":"Security by any other name: On the effectiveness of provider based email security","author":"Foster","year":"2015"},{"key":"10.1016\/j.hcc.2022.100086_bib0031","series-title":"Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering","first-page":"73","article-title":"Email feedback: A policy-based approach to overcoming false positives","author":"Kaushik","year":"2005"},{"issue":"4","key":"10.1016\/j.hcc.2022.100086_bib0032","doi-asserted-by":"crossref","first-page":"2070","DOI":"10.1109\/SURV.2013.030713.00020","article-title":"A survey of phishing email filtering techniques","volume":"15","author":"Almomani","year":"2013","journal-title":"IEEE communications surveys & tutorials"},{"key":"10.1016\/j.hcc.2022.100086_bib0033","series-title":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","first-page":"628","article-title":"Profiling phishing email based on clustering approach","author":"Hamid","year":"2013"},{"key":"10.1016\/j.hcc.2022.100086_bib0034","series-title":"2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","first-page":"415","article-title":"A content-based phishing email detection method","author":"Che","year":"2017"},{"key":"10.1016\/j.hcc.2022.100086_bib0035","series-title":"2017 International Conference on Computer Science and Engineering (UBMK)","first-page":"707","article-title":"Email phishing detection and prevention by using data mining techniques","author":"\u015eent\u00fcrk","year":"2017"},{"key":"10.1016\/j.hcc.2022.100086_bib0036","unstructured":"EBay, eBay Toolbar, 2004. Available at http:\/\/download.cnet.com\/eBay-Toolbar\/3000-125124-10153544.html?tag=contentMain;downloadLinks."},{"key":"10.1016\/j.hcc.2022.100086_bib0037","unstructured":"N. Chou, R. Ledesma, Y. Teraguchi, J.C. Mitchell, Client-side defense against web-based identity theft, Computer Science Department, Stanford University. Available: http:\/\/crypto.stanford.edu\/SpoofGuard\/webspoof.pdf (2004)."},{"key":"10.1016\/j.hcc.2022.100086_bib0038","unstructured":"Microsoft, IP Phishing Filter, 2016. Available at http:\/\/support.microsoft.com\/kb\/930168."},{"key":"10.1016\/j.hcc.2022.100086_bib0039","unstructured":"CallingID, Your Protection from Identity Theft, Fraud, Scams and Malware, 2004. Available at https:\/\/www.israeldefense.co.il\/en\/company\/calling-id."},{"key":"10.1016\/j.hcc.2022.100086_bib0040","unstructured":"Netcraft, Netcraft Toolbar, 2006. Available at http:\/\/toolbar.netcraft.com\/."},{"key":"10.1016\/j.hcc.2022.100086_bib0041","unstructured":"Jordan Ritter, CloudMark, September 2001. Available at http:\/\/www.cloudmark.com\/en\/products\/cloudmark-desktopone\/index."},{"key":"10.1016\/j.hcc.2022.100086_bib0042","series-title":"Proceedings of the ACMSE 2018 Conference","article-title":"Phishing e-mail detection by using deep learning algorithms","author":"Hassanpour","year":"2018"}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295222000381?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295222000381?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T08:40:10Z","timestamp":1757407210000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295222000381"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["S2667295222000381"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2022.100086","relation":{},"ISSN":["2667-2952"],"issn-type":[{"type":"print","value":"2667-2952"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SubStop: An analysis on subscription email bombing attack and machine learning based mitigation","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2022.100086","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100086"}}