{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T15:11:43Z","timestamp":1725635503047},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,1]]},"DOI":"10.1109\/ccnc.2009.4784952","type":"proceedings-article","created":{"date-parts":[[2009,2,19]],"date-time":"2009-02-19T23:13:08Z","timestamp":1235085188000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Comment Spam Injection Made Easy"],"prefix":"10.1109","author":[{"given":"Marco","family":"Ramilli","sequence":"first","affiliation":[]},{"given":"Marco","family":"Prandini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","first-page":"1","article-title":"exploiting redundancy in natural language to penetrate bayesian spam filters","author":"karlberger","year":"2007","journal-title":"WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies"},{"year":"0","key":"14"},{"key":"11","article-title":"trust is in the eye of the beholder","author":"dimitri do","year":"0","journal-title":"Technical Report UCDavis"},{"journal-title":"Wordpress - blog tool and weblog platform","year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242759"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357056"},{"journal-title":"Defensio - outsmarting evil spam","year":"0","key":"10"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"key":"5","first-page":"97","author":"lopresti","year":"2005","journal-title":"Leveraging the CAPTCHA Problem"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.47"},{"journal-title":"Akismet comment spam and trackback spam stopper","year":"0","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1145\/1321440.1321571","article-title":"comments-oriented blog summarization by sentence extraction","author":"hu","year":"2007","journal-title":"CIKM '07 Proceedings of the sixteenth ACM conference on Conference on information and knowledge management"}],"event":{"name":"2009 6th IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2009,1,10]]},"location":"Las Vegas, Nevada, USA","end":{"date-parts":[[2009,1,13]]}},"container-title":["2009 6th IEEE Consumer Communications and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4784683\/4784684\/04784952.pdf?arnumber=4784952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T16:57:12Z","timestamp":1497805032000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4784952\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2009.4784952","relation":{},"subject":[],"published":{"date-parts":[[2009,1]]}}}