{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:24:11Z","timestamp":1730215451438,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,29]]},"DOI":"10.1109\/ecai58194.2023.10193949","type":"proceedings-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T17:33:22Z","timestamp":1690997602000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Preliminary Architecture and a Pilot Implementation for a Malicious Emails Detection Solution"],"prefix":"10.1109","author":[{"given":"Cosmina","family":"Stalidi","sequence":"first","affiliation":[{"name":"POLITEHNICA University of Bucharest, BEIA Consult International,Faculty of Electronics, Telecommunications, and Information Technology,Telecommunications Dept., R&#x0026;D Department,Bucharest,Romania"}]},{"given":"Eduard-Cristian","family":"Popovici","sequence":"additional","affiliation":[{"name":"POLITEHNICA University of Bucharest Project Manager MICRO ART CONSULT SRL,Faculty of Electronics, Telecommunications, and Information Technology,Telecommunications Dept.,Bucharest,Romania"}]},{"given":"George","family":"Suciu","sequence":"additional","affiliation":[{"name":"POLITEHNICA University of Bucharest, BEIA Consult International,Faculty of Electronics, Telecommunications, and Information Technology,Telecommunications Dept., R&#x0026;D Department,Bucharest,Romania"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Scalable graph learning for anti-money \/aundering: Afirst look","author":"weber","year":"2018","journal-title":"ArXiv"},{"key":"ref12","article-title":"How powerful are graph neural networks","author":"xu","year":"0","journal-title":"International Conference on Learning Representations"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/3340531.3411903"},{"key":"ref14","article-title":"Evolvegcn: Evolving graph convolutional networks for dynamic graphs","author":"pareja","year":"2019","journal-title":"ArXiv"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TNN.2008.2005141"},{"year":"2007","author":"chau","journal-title":"Incorporating hyperlink analysis in web page clustering","key":"ref10"},{"key":"ref2","article-title":"Deep learning in finance","volume":"abs 1602 6561","author":"heaton","year":"2016","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/3538969.3544434"},{"key":"ref16","article-title":"Graph attention networks","author":"velickovic","year":"0","journal-title":"International Conference on Learning Representations"},{"key":"ref8","article-title":"Improving the accuracy and efficiency of the k-means clustering algorithm","volume":"2176","author":"nazeer","year":"2009","journal-title":"Lecture Notes in Computational Science and Enginee"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-642-22543-7_72"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/324133.324140"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/HICSS.1994.323314"},{"key":"ref3","first-page":"164","article-title":"Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection","volume":"1998","author":"chan","year":"1998","journal-title":"Proc ACM SIGKDD Conf Knowledge Discovery Data Mining"},{"key":"ref6","article-title":"A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection","author":"panagiotis","year":"0","journal-title":"Proceedings of International Conference on Availability Reliability and Security"},{"key":"ref5","first-page":"220","article-title":"Cardwatch:a neural network-based database mining system for credit card fraud detection","author":"aleskerov","year":"0","journal-title":"International Conference on Computational Intelligence for Financial Engineering"}],"event":{"name":"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2023,6,29]]},"location":"Bucharest, Romania","end":{"date-parts":[[2023,6,30]]}},"container-title":["2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10193876\/10193857\/10193949.pdf?arnumber=10193949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:42:53Z","timestamp":1692639773000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10193949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,29]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ecai58194.2023.10193949","relation":{},"subject":[],"published":{"date-parts":[[2023,6,29]]}}}