{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:47:23Z","timestamp":1772556443419,"version":"3.50.1"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2007,2,1]],"date-time":"2007-02-01T00:00:00Z","timestamp":1170288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2007,2]]},"abstract":"<jats:p>Even as spammers and phishers try evermore sophisticated techniques to get past filters and into users' mailboxes, anti-spam researchers have managed to stay several steps ahead, so far.<\/jats:p>","DOI":"10.1145\/1216016.1216017","type":"journal-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:20:08Z","timestamp":1175800808000},"page":"24-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":87,"title":["Spam and the ongoing battle for the inbox"],"prefix":"10.1145","volume":"50","author":[{"given":"Joshua","family":"Goodman","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]},{"given":"Gordon V.","family":"Cormack","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"David","family":"Heckerman","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]}],"member":"320","published-online":{"date-parts":[[2007,2]]},"reference":[{"key":"e_1_2_2_1_1","volume":"7","author":"Bratko A.","year":"2006","unstructured":"Bratko , A. , Cormack , G. , Filipic , B. , Lynam , T. , and Zupan , B. Spam filtering using statistical data compression models. Journal of Machine Learning Research 7 ( Dec. 2006 ). Bratko, A., Cormack, G., Filipic, B., Lynam, T., and Zupan, B. Spam filtering using statistical data compression models. Journal of Machine Learning Research 7 (Dec. 2006).","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_2_2_1","volume-title":"Proceedings of the Advances in Neural Information Processing Systems (NIPS) Conference","author":"Chellapilla K.","year":"2005","unstructured":"Chellapilla , K. and Simard , P . Using machine learning to break visual human interaction proofs . In Proceedings of the Advances in Neural Information Processing Systems (NIPS) Conference ( Vancouver, Canada). MIT Press , 2005 , 265--272. Chellapilla, K. and Simard, P. Using machine learning to break visual human interaction proofs. In Proceedings of the Advances in Neural Information Processing Systems (NIPS) Conference (Vancouver, Canada). MIT Press, 2005, 265--272."},{"key":"e_1_2_2_3_1","volume-title":"Proceedings of the Second Conference on Email and Anti-Spam (CEAS)","author":"Chellapilla K.","year":"2005","unstructured":"Chellapilla , K. , Simard , P. , and Czerwinski , M . Computers beat humans at single character recognition in reading-based human interaction proofs (HIPs) . In Proceedings of the Second Conference on Email and Anti-Spam (CEAS) ( Palo Alto, CA, July 21--22 , 2005 ). Chellapilla, K., Simard, P., and Czerwinski, M. Computers beat humans at single character recognition in reading-based human interaction proofs (HIPs). In Proceedings of the Second Conference on Email and Anti-Spam (CEAS) (Palo Alto, CA, July 21--22, 2005)."},{"key":"e_1_2_2_4_1","first-page":"147","volume":"137","author":"Dwork C.","year":"1992","unstructured":"Dwork , C. and Naor , M. Pricing via processing or combatting junk mail. In Proceedings of the 12th Annual International Cryptology Conference (Lecture Notes in Computer Science) (Santa Barbara, CA, Aug . 16--20). Springer , 1992 , 137 -- 147 . Dwork, C. and Naor, M. Pricing via processing or combatting junk mail. In Proceedings of the 12th Annual International Cryptology Conference (Lecture Notes in Computer Science) (Santa Barbara, CA, Aug. 16--20). Springer, 1992, 137--147.","journal-title":"Springer"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/988772.988779"},{"key":"e_1_2_2_6_1","volume-title":"Proceedings of the First Conference on Email and Anti-Spam (CEAS)","author":"Hulten G.","year":"2004","unstructured":"Hulten , G. , Penta , A. , Seshadrinathan , G. , and Mishra , M . Trends in spam products and methods . In Proceedings of the First Conference on Email and Anti-Spam (CEAS) ( Mountain View, CA, July 30--31 , 2004 ). Hulten, G., Penta, A., Seshadrinathan, G., and Mishra, M. Trends in spam products and methods. In Proceedings of the First Conference on Email and Anti-Spam (CEAS) (Mountain View, CA, July 30--31, 2004)."},{"key":"e_1_2_2_7_1","volume-title":"Proceedings of the First Conference on Email and Anti-Spam (CEAS)","author":"Kolcz A.","year":"2004","unstructured":"Kolcz , A. , Chowdhury , A. , and Alspector , J . The impact of feature selection on signature-driven spam detection . In Proceedings of the First Conference on Email and Anti-Spam (CEAS) ( Mountain View, CA, July 30--31 , 2004 ). Kolcz, A., Chowdhury, A., and Alspector, J. The impact of feature selection on signature-driven spam detection. In Proceedings of the First Conference on Email and Anti-Spam (CEAS) (Mountain View, CA, July 30--31, 2004)."},{"key":"e_1_2_2_8_1","volume-title":"First Quarter 2006 Report.","author":"Messaging Anti-Abuse Working Group","year":"2006","unstructured":"Messaging Anti-Abuse Working Group . MAAWG Email Metrics Program , First Quarter 2006 Report. June 2006 ; www.maawg.org\/about\/FINAL_1Q2006_Metrics_Report.pdf. Messaging Anti-Abuse Working Group. MAAWG Email Metrics Program, First Quarter 2006 Report. June 2006; www.maawg.org\/about\/FINAL_1Q2006_Metrics_Report.pdf."},{"key":"e_1_2_2_9_1","unstructured":"Naor M. Verification of a Human in the Loop or Identification via the Turing Test; www.wisdom.weizmann.ac.il\/~naor\/.  Naor M. Verification of a Human in the Loop or Identification via the Turing Test; www.wisdom.weizmann.ac.il\/~naor\/."},{"key":"e_1_2_2_10_1","volume-title":"Proceedings of the First Conference on Email and Anti-Spam (CEAS)","author":"Rigoutsos I.","year":"2004","unstructured":"Rigoutsos , I. and Huynh , T . Chung-Kwei: A pattern-discovery-based system for the automatic identification of unsolicited e-mail messages . In Proceedings of the First Conference on Email and Anti-Spam (CEAS) ( Mountain View, CA, July 30--31 , 2004 ). Rigoutsos, I. and Huynh, T. Chung-Kwei: A pattern-discovery-based system for the automatic identification of unsolicited e-mail messages. In Proceedings of the First Conference on Email and Anti-Spam (CEAS) (Mountain View, CA, July 30--31, 2004)."},{"key":"e_1_2_2_12_1","volume-title":"Proceedings of the Third Conference on Email and Anti-Spam (CEAS)","author":"Yih W.","year":"2006","unstructured":"Yih , W. , Goodman , J. , and Hulten , G . Learning at low false positive rates . In Proceedings of the Third Conference on Email and Anti-Spam (CEAS) ( Mountain View, CA, July 27--28 , 2006 ). Yih, W., Goodman, J., and Hulten, G. Learning at low false positive rates. In Proceedings of the Third Conference on Email and Anti-Spam (CEAS) (Mountain View, CA, July 27--28, 2006)."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1216016.1216017","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1216016.1216017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:16Z","timestamp":1750278136000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1216016.1216017"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,2]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,2]]}},"alternative-id":["10.1145\/1216016.1216017"],"URL":"https:\/\/doi.org\/10.1145\/1216016.1216017","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,2]]},"assertion":[{"value":"2007-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}