{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:55:03Z","timestamp":1752674103617,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,1]],"date-time":"2011-09-01T00:00:00Z","timestamp":1314835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["573871\/2008-6141322\/2009-8"],"award-info":[{"award-number":["573871\/2008-6141322\/2009-8"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1145\/2030376.2030386","type":"proceedings-article","created":{"date-parts":[[2011,9,13]],"date-time":"2011-09-13T12:43:28Z","timestamp":1315917808000},"page":"83-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Spam detection using web page content"],"prefix":"10.1145","author":[{"given":"Marco T\u00falio","family":"Ribeiro","sequence":"first","affiliation":[{"name":"Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, Brazil"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pedro H. Calais","family":"Guerra","sequence":"additional","affiliation":[{"name":"Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, Brazil"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leonardo","family":"Vilela","sequence":"additional","affiliation":[{"name":"Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, Brazil"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adriano","family":"Veloso","sequence":"additional","affiliation":[{"name":"Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, Brazil"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dorgival","family":"Guedes","sequence":"additional","affiliation":[{"name":"Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, Brazil"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"suffix":"Jr.","given":"Wagner","family":"Meira","sequence":"additional","affiliation":[{"name":"Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, Brazil"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcelo H. P. C.","family":"Chaves","sequence":"additional","affiliation":[{"name":"Brazilian Network Information Center (NIC.br), Sao Paulo, Brazil"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Klaus","family":"Steding-Jessen","sequence":"additional","affiliation":[{"name":"Brazilian Network Information Center (NIC.br), Sao Paulo, Brazil"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cristine","family":"Hoepers","sequence":"additional","affiliation":[{"name":"Brazilian Network Information Center (NIC.br), Sao Paulo, Brazil"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2011,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"135","volume-title":"Proceedings of the 16th IEEE Security Symposium","author":"Anderson D. S.","year":"2007","unstructured":"D. S. Anderson , C. Fleizach , S. Savage , and G. M. Voelker . Spamscatter: Characterizing Internet Scam Hosting Infrastructure . In Proceedings of the 16th IEEE Security Symposium , pages 135 -- 148 , 2007 . D. S. Anderson, C. Fleizach, S. Savage, and G. M. Voelker. Spamscatter: Characterizing Internet Scam Hosting Infrastructure. In Proceedings of the 16th IEEE Security Symposium, pages 135--148, 2007."},{"key":"e_1_3_2_1_2_1","volume-title":"An evaluation of naive bayesian anti-spam filtering. CoRR, cs.CL\/0006013","author":"Androutsopoulos I.","year":"2000","unstructured":"I. Androutsopoulos , J. Koutsias , K. Chandrinos , G. Paliouras , and C. D. Spyropoulos . An evaluation of naive bayesian anti-spam filtering. CoRR, cs.CL\/0006013 , 2000 . I. Androutsopoulos, J. Koutsias, K. Chandrinos, G. Paliouras, and C. D. Spyropoulos. An evaluation of naive bayesian anti-spam filtering. CoRR, cs.CL\/0006013, 2000."},{"key":"e_1_3_2_1_3_1","first-page":"15","volume-title":"Supervised and Unsupervised Ensemble Methods and Their Applications","author":"Biggio B.","year":"2008","unstructured":"B. Biggio , G. Fumera , and F. Roli . Evade hard multiple classifier systems . In O. Okun and G. Valentini, editors, Supervised and Unsupervised Ensemble Methods and Their Applications , volume 245 , pages 15 -- 38 . Springer Berlin\/Heidelberg , 2008 . B. Biggio, G. Fumera, and F. Roli. Evade hard multiple classifier systems. In O. Okun and G. Valentini, editors, Supervised and Unsupervised Ensemble Methods and Their Applications, volume 245, pages 15--38. Springer Berlin\/Heidelberg, 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646290"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000006"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.788645"},{"key":"e_1_3_2_1_8_1","first-page":"973","volume-title":"Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence","author":"Elkan C.","year":"2001","unstructured":"C. Elkan . The foundations of cost-sensitive learning . In Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence , pages 973 -- 978 , 2001 . C. Elkan. The foundations of cost-sensitive learning. In Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, pages 973--978, 2001."},{"volume-title":"Pharma-fraud continues to dominate spam. www.esoft.com\/network-security-threat-blog\/pharma-fraud-continues-to-dominate-spam\/","year":"2010","key":"e_1_3_2_1_9_1","unstructured":"eSoft. Pharma-fraud continues to dominate spam. www.esoft.com\/network-security-threat-blog\/pharma-fraud-continues-to-dominate-spam\/ , 2010 . eSoft. Pharma-fraud continues to dominate spam. www.esoft.com\/network-security-threat-blog\/pharma-fraud-continues-to-dominate-spam\/, 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/980972.980990"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216016.1216017"},{"key":"e_1_3_2_1_13_1","unstructured":"B. Guenter. Spam Archive 2011. http:\/\/untroubled.org\/spam\/.  B. Guenter. Spam Archive 2011. http:\/\/untroubled.org\/spam\/."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 7th Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS)","author":"Guerra P. H. C.","year":"2010","unstructured":"P. H. C. Guerra , D. Guedes , J. Wagner Meira , C. Hoepers , M. H. P. C. Chaves , and K. Steding-Jessen . Exploring the spam arms race to characterize spam evolution . In Proceedings of the 7th Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS) , Redmond, WA , 2010 . P. H. C. Guerra, D. Guedes, J. Wagner Meira, C. Hoepers, M. H. P. C. Chaves, and K. Steding-Jessen. Exploring the spam arms race to characterize spam evolution. In Proceedings of the 7th Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), Redmond, WA, 2010."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 5th Conference on e-mail and anti-spam (CEAS)","author":"Guerra P. H. C.","year":"2008","unstructured":"P. H. C. Guerra , D. Pires , D. Guedes , J. Wagner Meira , C. Hoepers , and K. Steding-Jessen . A campaign-based characterization of spamming strategies . In Proceedings of the 5th Conference on e-mail and anti-spam (CEAS) , Mountain View, CA , 2008 . P. H. C. Guerra, D. Pires, D. Guedes, J. Wagner Meira, C. Hoepers, and K. Steding-Jessen. A campaign-based characterization of spamming strategies. In Proceedings of the 5th Conference on e-mail and anti-spam (CEAS), Mountain View, CA, 2008."},{"key":"e_1_3_2_1_16_1","volume-title":"The economy of spam. Technical report","author":"Illger M.","year":"2006","unstructured":"M. Illger , J. Straub , W. Gansterer , and C. Proschinger . The economy of spam. Technical report , Faculty of Computer Science, University of Vienna , 2006 . M. Illger, J. Straub, W. Gansterer, and C. Proschinger. The economy of spam. Technical report, Faculty of Computer Science, University of Vienna, 2006."},{"key":"e_1_3_2_1_17_1","unstructured":"S. M. Labs. MessageLabs Intelligence: 2010 annual security report. http:\/\/www.messagelabs.com\/mlireport\/MessageLabsIntelligence_2010_Annual_Report_FINAL.pdf 2010.  S. M. Labs. MessageLabs Intelligence: 2010 annual security report. http:\/\/www.messagelabs.com\/mlireport\/MessageLabsIntelligence_2010_Annual_Report_FINAL.pdf 2010."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_19_1","unstructured":"Libcurl 2011. http:\/\/curl.haxx.se\/libcurl\/.  Libcurl 2011. http:\/\/curl.haxx.se\/libcurl\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Lynx 2011. http:\/\/lynx.browser.org\/.  Lynx 2011. http:\/\/lynx.browser.org\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/GRC.2006.1635746"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 3rd Conference on Email and Anti-Spam (CEAS)","author":"Pu C.","year":"2006","unstructured":"C. Pu and S. Webb . Observed trends in spam construction techniques: a case study of spam evolution . Proceedings of the 3rd Conference on Email and Anti-Spam (CEAS) , 2006 . C. Pu and S. Webb. Observed trends in spam construction techniques: a case study of spam evolution. Proceedings of the 3rd Conference on Email and Anti-Spam (CEAS), 2006."},{"key":"e_1_3_2_1_25_1","unstructured":"SpamAssassin 2011. http:\/\/spamassassin.apache.org.  SpamAssassin 2011. http:\/\/spamassassin.apache.org."},{"key":"e_1_3_2_1_26_1","volume-title":"An overview of associative classifiers","author":"Sun Y.","year":"2006","unstructured":"Y. Sun , A. K. C. Wong , and I. Y. Wang . An overview of associative classifiers , 2006 . Y. Sun, A. K. C. Wong, and I. Y. Wang. An overview of associative classifiers, 2006."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.96"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1498932.1498946"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/LA-WEB.2006.19"},{"key":"e_1_3_2_1_31_1","volume-title":"In Proceedings of the 3rd Conference on Email and AntiSpam (CEAS) (Mountain View)","author":"Webb S.","year":"2006","unstructured":"S. Webb . Introducing the webb spam corpus: Using email spam to identify web spam automatically . In In Proceedings of the 3rd Conference on Email and AntiSpam (CEAS) (Mountain View) , 2006 . S. Webb. Introducing the webb spam corpus: Using email spam to identify web spam automatically. In In Proceedings of the 3rd Conference on Email and AntiSpam (CEAS) (Mountain View), 2006."}],"event":{"name":"CEAS '11: The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference","acronym":"CEAS '11","location":"Perth Australia"},"container-title":["Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2030376.2030386","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2030376.2030386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:48Z","timestamp":1750240128000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2030376.2030386"}},"subtitle":["a new battleground"],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":31,"alternative-id":["10.1145\/2030376.2030386","10.1145\/2030376"],"URL":"https:\/\/doi.org\/10.1145\/2030376.2030386","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]},"assertion":[{"value":"2011-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}