{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:20:55Z","timestamp":1725564055073},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/icc.2010.5502086","type":"proceedings-article","created":{"date-parts":[[2010,7,12]],"date-time":"2010-07-12T14:22:30Z","timestamp":1278944550000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Blocking Foxy Phishing Emails with Historical Information"],"prefix":"10.1109","author":[{"given":"Y.","family":"Wu","sequence":"first","affiliation":[]},{"given":"Z.","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"F.","family":"Bao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Building an office 2000 COM add-in with VC++IATL","year":"0","author":"dey","key":"ref10"},{"key":"ref11","first-page":"342","article-title":"Filtering Spam with Behavioral Blacklisting","author":"ramachandran","year":"2007","journal-title":"CCS"},{"article-title":"Sender Address Verification: Solving the Spam Crisis","year":"2004","author":"golan","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25660-1_19"},{"key":"ref14","article-title":"Sender ID: Authenticating E-Mail","author":"lyon","year":"2006","journal-title":"RFC 4406"},{"article-title":"Thunderbird Anti-Phishing\/Sender Verification Extension","year":"0","author":"tauberer","key":"ref15"},{"key":"ref16","article-title":"Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1","author":"wong","year":"2006","journal-title":"RFC 4408"},{"key":"ref17","article-title":"DomainKeys Identified Mail (DKIM) Signatures","author":"allman","year":"2007","journal-title":"IETF RFC 4871"},{"key":"ref18","article-title":"Secure\/Multipurpose Internet Mail Extensions (SIMIME) Version 3.2-Message Specification","author":"ramsdell","year":"2008","journal-title":"Internet draft"},{"key":"ref19","article-title":"Multiple Signatures in SIMIME","author":"turner","year":"2008","journal-title":"Internet draft"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1455525"},{"year":"2008","key":"ref3","article-title":"2008 Internet Security Trends"},{"journal-title":"Anti-Phishing Working Group","article-title":"Proposed Solutions to Address the Threat of Email Spoofing Scams","year":"0","key":"ref6"},{"key":"ref5","article-title":"Deleting spam costs businesses billions","author":"swarz","year":"2005","journal-title":"1nformation Management Journal"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"article-title":"Global Phishing Survey: Domain Name Use and Trends IH2008","year":"2008","author":"rasmussen","key":"ref7"},{"journal-title":"Micorsoft White paper","article-title":"Sender ID Frame-work","year":"2008","key":"ref2"},{"key":"ref1","article-title":"Simple Mail Transfer Protocol","author":"postel","year":"1982","journal-title":"RFC 821"},{"key":"ref9","article-title":"7 Hot Projects","author":"jonietz","year":"2004","journal-title":"MIT Technology Review"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529470"},{"key":"ref22","first-page":"10","article-title":"Email Sender Verification System","author":"george","year":"2007","journal-title":"US Patent No"},{"key":"ref21","first-page":"10","article-title":"Enhanced message-id as electronic watermark for electronic mail filtering","author":"howe","year":"2008","journal-title":"US2008\/0270545Al"}],"event":{"name":"ICC 2010 - 2010 IEEE International Conference on Communications","start":{"date-parts":[[2010,5,23]]},"location":"Cape Town, South Africa","end":{"date-parts":[[2010,5,27]]}},"container-title":["2010 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5497983\/5501741\/05502086.pdf?arnumber=5502086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T22:46:49Z","timestamp":1489877209000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5502086\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icc.2010.5502086","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}