{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:55Z","timestamp":1750307515658,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,28]],"date-time":"2009-06-28T00:00:00Z","timestamp":1246147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,28]]},"DOI":"10.1145\/1599272.1599274","type":"proceedings-article","created":{"date-parts":[[2009,9,8]],"date-time":"2009-09-08T12:53:09Z","timestamp":1252414389000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["AntiPhish"],"prefix":"10.1145","author":[{"given":"Andr\u00e9","family":"Bergholz","sequence":"first","affiliation":[{"name":"Fraunhofer Institute Intelligent Analysis and Information Systems (IAIS), St. Augustin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2009,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Andre Bergholz Jan De Beer Sebastian Glahn Marie-Francine Moens Gerhard Paass Siehyun Strobel 2009. New Filtering Approaches for Phishing Email. Accepted for publication for Journal of Computer Security (JCS) Andre Bergholz Jan De Beer Sebastian Glahn Marie-Francine Moens Gerhard Paass Siehyun Strobel 2009. New Filtering Approaches for Phishing Email. Accepted for publication for Journal of Computer Security (JCS)","DOI":"10.3233\/JCS-2010-0371"},{"volume-title":"Detecting Known and New Salting Tricks in Unwanted Emails. Fifth Conference on Email and Anti-Spam, CEAS 2008","year":"2008","author":"Bergholz Andre","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Markus Jakobson and Steven Myers 2007. Phishing and Countermeasures - Understanding the Increasing Problem of Electronic Identity Theft. Wiley Hoboken New Jersey. Markus Jakobson and Steven Myers 2007. Phishing and Countermeasures - Understanding the Increasing Problem of Electronic Identity Theft. Wiley Hoboken New Jersey.","DOI":"10.1002\/0470086106"}],"event":{"name":"KDD09: The 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Paris France","acronym":"KDD09"},"container-title":["Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1599272.1599274","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1599272.1599274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:09Z","timestamp":1750249089000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1599272.1599274"}},"subtitle":["lessons learnt"],"short-title":[],"issued":{"date-parts":[[2009,6,28]]},"references-count":3,"alternative-id":["10.1145\/1599272.1599274","10.1145\/1599272"],"URL":"https:\/\/doi.org\/10.1145\/1599272.1599274","relation":{},"subject":[],"published":{"date-parts":[[2009,6,28]]},"assertion":[{"value":"2009-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}