{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T11:49:54Z","timestamp":1751629794077},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/fskd.2017.8393226","type":"proceedings-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T22:38:33Z","timestamp":1531780713000},"source":"Crossref","is-referenced-by-count":9,"title":["Email trouble: Secrets of spoofing, the dangers of social engineering, and how we can help"],"prefix":"10.1109","author":[{"given":"Bridget","family":"Opazo","sequence":"first","affiliation":[]},{"given":"Don","family":"Whitteker","sequence":"additional","affiliation":[]},{"given":"Chen-Chi","family":"Shing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"ragan","year":"2016","journal-title":"CSO from IDG"},{"key":"ref11","author":"rubino","year":"2016","journal-title":"Above the Law"},{"key":"ref12","year":"2015","journal-title":"Public Service Announcement FBI"},{"key":"ref13","author":"mehnle","year":"2008","journal-title":"Sender Policy Framework SPF Record Syntax"},{"key":"ref14","author":"zink","year":"2007","journal-title":"CircleID"},{"key":"ref15","year":"2007","journal-title":"DKIM org"},{"key":"ref16","year":"0","journal-title":"DMARC overview"},{"key":"ref17","author":"brook","year":"2016","journal-title":"Threat Post"},{"key":"ref18","author":"eggert","year":"2016","journal-title":"Global SPF Deployment"},{"key":"ref4","article-title":"Comp TIA Security+ Guide to Network Security Fundamentals","author":"ciampa","year":"2015","journal-title":"Cengage Learning"},{"key":"ref3","author":"krebs","year":"2015","journal-title":"Krebs on Security"},{"key":"ref6","year":"2015","journal-title":"Marcalitions"},{"key":"ref5","article-title":"What is email spoofing and how can I tell if my account has been spoofed?","year":"2016","journal-title":"Aol Help"},{"key":"ref8","author":"krebs","year":"2015","journal-title":"Krebs on Security"},{"key":"ref7","author":"meidinger","year":"2014","journal-title":"AGARI"},{"key":"ref2","author":"maurer","year":"1940","journal-title":"The Big Con The Story of the Confidence Man"},{"key":"ref1","author":"loshin","year":"2016","journal-title":"SearchSecurity"},{"key":"ref9","author":"ragan","year":"2016","journal-title":"CSO from IDG"}],"event":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","location":"Guilin","start":{"date-parts":[[2017,7,29]]},"end":{"date-parts":[[2017,7,31]]}},"container-title":["2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8384043\/8392854\/08393226.pdf?arnumber=8393226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:55:17Z","timestamp":1598223317000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8393226\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/fskd.2017.8393226","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}