{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:31Z","timestamp":1750307791040,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,8,27]],"date-time":"2007-08-27T00:00:00Z","timestamp":1188172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001868","name":"National Science Council Taiwan","doi-asserted-by":"publisher","award":["NSC 95-2218-E-001-001NSC95-2218-E-011-015","NSC 95-2221-E-011-150NSC 95-2221-E-011-151","NSC95-3114-P-001-002-Y02"],"award-info":[{"award-number":["NSC 95-2218-E-001-001NSC95-2218-E-011-015","NSC 95-2221-E-011-150NSC 95-2221-E-011-151","NSC95-3114-P-001-002-Y02"]}],"id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,8,27]]},"DOI":"10.1145\/1352664.1352670","type":"proceedings-article","created":{"date-parts":[[2008,3,25]],"date-time":"2008-03-25T15:57:23Z","timestamp":1206460643000},"page":"113-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Adaptive e-mail intention finding mechanism based on e-mail words social networks"],"prefix":"10.1145","author":[{"given":"Che-Fu","family":"Yeh","sequence":"first","affiliation":[{"name":"National Taiwan University of Science and Technology"}]},{"given":"Ching-Hao","family":"Mao","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology"}]},{"given":"Hahn-Ming","family":"Lee","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology and Academia Sinica"}]},{"given":"Tsuhan","family":"Chen","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2007,8,27]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1016\/j.peva.2006.11.001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/MSP.2007.22"},{"key":"e_1_3_2_1_3_1","first-page":"55","volume-title":"AAAI Workshop on Learning for Text Categorization","author":"Sahami M.","year":"1998"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/72.788645"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.3115\/1117601.1117623"},{"volume-title":"AISEC: An Artificial Immune System for Email Classification. The IEEE Congress on Evolutionary Computation Proceedings, 1:  131--138","year":"2003","author":"Secker A.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1007\/11536444_21"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/MC.2005.132"},{"volume-title":"Proceedings of the Third Conference on Email and Anti-spam","year":"2006","author":"O'Donnell A. J.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/MC.2006.257"},{"unstructured":"M. Wong and W. Schlitt. Sender Policy Framework (SPF) for Authorizing Use of Domains in E-mail Available at: http:\/\/www.openspf.org\/Project_Overview.  M. Wong and W. Schlitt. Sender Policy Framework (SPF) for Authorizing Use of Domains in E-mail Available at: http:\/\/www.openspf.org\/Project_Overview.","key":"e_1_3_2_1_11_1"},{"volume-title":"Proceedings of the Third Conference on Email and Anti-spam","year":"2006","author":"Taylor B.","key":"e_1_3_2_1_12_1"},{"unstructured":"DomainKeys Proving and Protecting Email Sender Identity Available at: http:\/\/antispam.yahoo.com\/domainkeys.  DomainKeys Proving and Protecting Email Sender Identity Available at: http:\/\/antispam.yahoo.com\/domainkeys.","key":"e_1_3_2_1_13_1"},{"volume-title":"Proceedings of the First Conference on Email and Anti-Spam","year":"2004","author":"Ahmed S.","key":"e_1_3_2_1_14_1"},{"volume-title":"Proceedings of the Third Conference on Email and Anti-spam","year":"2006","author":"F.","key":"e_1_3_2_1_15_1"},{"volume-title":"Proceedings of the Third Conference on Email and Anti-spam","year":"2006","author":"Goodman J.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.5555\/944919.944937"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/1025132.1026321"},{"volume-title":"Topic and Role Discovery in Social Networks. International Joint Conference on Artificial Intelligence","year":"2005","author":"McCallum A.","key":"e_1_3_2_1_19_1"},{"volume-title":"Proceedings of the Second Conference on Email and Anti-Spam","year":"2005","author":"Surendran A. C.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","first-page":"147","article-title":"Correlated topic models","volume":"18","author":"Blei D. M.","year":"2006","journal-title":"Advances in Neural Information Processing Systems"},{"unstructured":"M. W. Berry. Survey of Text Mining: Clustering Classification and Retrieval. Springer-Verlag. 2003.   M. W. Berry. Survey of Text Mining: Clustering Classification and Retrieval. Springer-Verlag. 2003.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.5555\/1248547.1248645"},{"volume-title":"Springer-Verlag","year":"2002","author":"De Castro L. N.","key":"e_1_3_2_1_24_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1590\/S0103-97332006000500032"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1103\/PhysRevE.65.065102"},{"key":"e_1_3_2_1_27_1","first-page":"66","article-title":"Scale-free topology of email networks","author":"Ebel H.","year":"2002","journal-title":"Physical Review E"},{"volume-title":"Genetic and Evolutionary Computation Conference","year":"1999","author":"Hofmeyr S. A.","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1162\/106365600568257"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1007\/11536444_10"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1016\/j.fss.2004.03.007"},{"volume-title":"Proceedings of the First Conference on Email and Anti-Spam","year":"2004","author":"Culotta A.","key":"e_1_3_2_1_32_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/1060745.1060813"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/1148170.1148196"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/301136.301209"},{"unstructured":"UCINET The Software for Social Network Analysis Available at: http:\/\/www.analytictech.com\/downloaduc6.htm  UCINET The Software for Social Network Analysis Available at: http:\/\/www.analytictech.com\/downloaduc6.htm","key":"e_1_3_2_1_36_1"},{"volume-title":"Morgan Kaufmann","year":"2005","author":"Witten I. H.","key":"e_1_3_2_1_37_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.5555\/288808.288815"},{"doi-asserted-by":"crossref","unstructured":"S. Wasserman and K. Faust. Social Networks Analysis: Methods and Applications. Cambridge University Press. 1994.  S. Wasserman and K. Faust. Social Networks Analysis: Methods and Applications. Cambridge University Press. 1994.","key":"e_1_3_2_1_39_1","DOI":"10.1017\/CBO9780511815478"},{"doi-asserted-by":"crossref","unstructured":"P. J. Carrington J. Scott and S. Wasserman. Models and Methods in Social Network Analysis. Cambridge University Press. 2005.  P. J. Carrington J. Scott and S. Wasserman. Models and Methods in Social Network Analysis. Cambridge University Press. 2005.","key":"e_1_3_2_1_40_1","DOI":"10.1017\/CBO9780511811395"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1145\/980972.980990"},{"unstructured":"SPAMASSASSIN The SpamAssassin corpus Available at: http:\/\/spamassassin.apache.org\/publiccorpus\/.  SPAMASSASSIN The SpamAssassin corpus Available at: http:\/\/spamassassin.apache.org\/publiccorpus\/.","key":"e_1_3_2_1_42_1"},{"volume-title":"TREC 2005 Spam Track Overview. Fourteenth Text REtrieval Conference","year":"2005","author":"Cormack G. V.","key":"e_1_3_2_1_43_1"},{"volume-title":"Proceedings of the Second Conference on Email and Anti-Spam","year":"2005","author":"Cormack G. V.","key":"e_1_3_2_1_44_1"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"SIGCOMM07","name":"SIGCOMM07: ACM SIGCOMM 2007 Conference","location":"Kyoto Japan"},"container-title":["Proceedings of the 2007 workshop on Large scale attack defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352664.1352670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1352664.1352670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:19Z","timestamp":1750254979000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352664.1352670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8,27]]},"references-count":44,"alternative-id":["10.1145\/1352664.1352670","10.1145\/1352664"],"URL":"https:\/\/doi.org\/10.1145\/1352664.1352670","relation":{},"subject":[],"published":{"date-parts":[[2007,8,27]]},"assertion":[{"value":"2007-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}