{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T22:50:43Z","timestamp":1775688643240,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/infcom.2011.5935048","type":"proceedings-article","created":{"date-parts":[[2011,7,7]],"date-time":"2011-07-07T14:59:10Z","timestamp":1310050750000},"page":"2309-2317","source":"Crossref","is-referenced-by-count":19,"title":["Prevalence and mitigation of forum spamming"],"prefix":"10.1109","author":[{"given":"Youngsang","family":"Shin","sequence":"first","affiliation":[]},{"given":"Minaxi","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Myers","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Akismet","year":"0"},{"key":"ref11","article-title":"MessageLabs intelligence: March 2010","year":"0"},{"key":"ref12","article-title":"A quantitative study of forum spamming using context-based analysis","author":"niu","year":"2007","journal-title":"Internet Society Annual Network and Distributed System Security Symposium (NDSS)"},{"key":"ref13","article-title":"IANA root zone database","year":"0"},{"key":"ref14","article-title":"The domain name industry brief","volume":"7","year":"2010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"ref16","article-title":"Route views project","year":"0"},{"key":"ref17","article-title":"IPInfoDB","year":"0"},{"key":"ref18","article-title":"Behind Phishing: An Examination of the Phisher Modi Operandi","author":"mcgrath","year":"2008","journal-title":"USENIX Workshop on Large-scale Exploits and Emergent Threats"},{"key":"ref19","article-title":"Alexa top sites","year":"2010"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553462"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1244408.1244412"},{"key":"ref27","article-title":"Large-scale automatic classification of phishing pages","author":"whittaker","year":"2010","journal-title":"Internet Society Annual Network and Distributed System Security Symposium (NDSS)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1244408.1244413"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1451983.1451994"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553462"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277814"},{"key":"ref8","article-title":"XRumer","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2009.4925088"},{"key":"ref2","article-title":"Internet 2009 in numbers","year":"0"},{"key":"ref9","article-title":"WordPress","year":"0"},{"key":"ref1","article-title":"December 2009 Web Server Survey","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"ref22","article-title":"A study of cross-validation and bootstrap for accuracy estimation and model selection","author":"kohavi","year":"1995","journal-title":"International Conference on Artificial Intelligence (IJCAI)"},{"key":"ref21","article-title":"SVMlight support vector machine","year":"0"},{"key":"ref24","article-title":"On network-level clusters for spam detection","author":"qian","year":"2010","journal-title":"Internet Society Annual Network and Distributed System Security Symposium (NDSS)"},{"key":"ref23","article-title":"Detecting spammers with SNARE: Spatio-temporal network-level automatic reputaion engine","author":"hao","year":"2009","journal-title":"USENIX Security Symposium"},{"key":"ref26","article-title":"SVMs for the blogosphere: Blog identification and splog","author":"kolari","year":"2006","journal-title":"AAAI Spring Symposium on Computational Approaches to Analysing Weblogs"},{"key":"ref25","article-title":"Blocking blog spam with language model disagreement","author":"mishne","year":"2005","journal-title":"International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)at International World Wide Web Conference (WWW)"}],"event":{"name":"IEEE INFOCOM 2011 - IEEE Conference on Computer Communications","location":"Shanghai, China","start":{"date-parts":[[2011,4,10]]},"end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5888673\/5934870\/05935048.pdf?arnumber=5935048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T07:04:55Z","timestamp":1490079895000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5935048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/infcom.2011.5935048","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}