{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:37Z","timestamp":1750307137350,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,1]],"date-time":"2011-09-01T00:00:00Z","timestamp":1314835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1145\/2030376.2030388","type":"proceedings-article","created":{"date-parts":[[2011,9,13]],"date-time":"2011-09-13T12:43:28Z","timestamp":1315917808000},"page":"102-108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A rule-based system for end-user e-mail annotations"],"prefix":"10.1145","author":[{"given":"G.","family":"Fiumara","sequence":"first","affiliation":[{"name":"University of Messina, Messina, Italy"}]},{"given":"M.","family":"Marchi","sequence":"additional","affiliation":[{"name":"University of Messina, Messina, Italy"}]},{"given":"R.","family":"Pagano","sequence":"additional","affiliation":[{"name":"University of Messina, Messina, Italy"}]},{"given":"A.","family":"Provetti","sequence":"additional","affiliation":[{"name":"University of Messina, Messina, Italy"}]},{"given":"N.","family":"Spada","sequence":"additional","affiliation":[{"name":"University of Messina, Messina, Italy"}]}],"member":"320","published-online":{"date-parts":[[2011,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"119","volume-title":"Visual web information extraction with lixto","author":"Baumgartner R.","year":"2001","unstructured":"R. Baumgartner , S. Flesca , and G. Gottlob . Visual web information extraction with lixto . In P. M. G. Apers, P. Atzeni, S. Ceri, S. Paraboschi, K. Ramamohanarao, and R. T. Snodgrass, editors, VLDB, pages 119 -- 128 . Morgan Kaufmann , 2001 . R. Baumgartner, S. Flesca, and G. Gottlob. Visual web information extraction with lixto. In P. M. G. Apers, P. Atzeni, S. Ceri, S. Paraboschi, K. Ramamohanarao, and R. T. Snodgrass, editors, VLDB, pages 119--128. Morgan Kaufmann, 2001."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of the Second Conference on Email and Anti-Spam (CEAS 2005)","author":"Cormack G. V.","year":"2005","unstructured":"G. V. Cormack and T. R. Lynam . Spam corpus creation for trec . In Proc. of the Second Conference on Email and Anti-Spam (CEAS 2005) , 2005 . G. V. Cormack and T. R. Lynam. Spam corpus creation for trec. In Proc. of the Second Conference on Email and Anti-Spam (CEAS 2005), 2005."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247715.1247717"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2005.02.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"G.\n      Fiumara M.\n      Marchi R.\n      Pagano and \n      A.\n      Provetti\n  . \n  Rule-based spam e-mail annotation\n  . In P. Hitzler and T. Lukasiewicz editors RR volume \n  6333\n   of \n  Lecture Notes in Computer Science pages \n  231\n  --\n  234\n  . \n  Springer 2010\n  .   G. Fiumara M. Marchi R. Pagano and A. Provetti. Rule-based spam e-mail annotation. In P. Hitzler and T. Lukasiewicz editors RR volume 6333 of Lecture Notes in Computer Science pages 231--234. Springer 2010.","DOI":"10.1007\/978-3-642-15918-3_21"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-008-5094-2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055560"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1497308.1497402"},{"key":"e_1_3_2_1_9_1","volume-title":"CEAS","author":"Hayati P.","year":"2010","unstructured":"P. Hayati , V. Potdar , A. Talevski , and W. Smyth . Rule-based on-the-fly web spambot detection using action strings . In CEAS , 2010 . P. Hayati, V. Potdar, A. Talevski, and W. Smyth. Rule-based on-the-fly web spambot detection using action strings. In CEAS, 2010."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of the Second Conference on Email and Anti-Spam (CEAS 2005)","author":"Lee H.","year":"2005","unstructured":"H. Lee and A. Y. Ng . Spam deobfuscation using a hidden markov model . In Proc. of the Second Conference on Email and Anti-Spam (CEAS 2005) , 2005 . H. Lee and A. Y. Ng. Spam deobfuscation using a hidden markov model. In Proc. of the Second Conference on Email and Anti-Spam (CEAS 2005), 2005."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of IJCAI (IJCAI 2007)","author":"Lee S.","year":"2007","unstructured":"S. Lee , I. Jeong , and S. Choi . Dynamically weighted hidden markov model for spam deobfuscation . In Proc. of IJCAI (IJCAI 2007) , 2007 . S. Lee, I. Jeong, and S. Choi. Dynamically weighted hidden markov model for spam deobfuscation. In Proc. of IJCAI (IJCAI 2007), 2007."},{"key":"e_1_3_2_1_12_1","first-page":"75","volume-title":"Stable models and an alternative logic programming paradigm. The Logic Programming Paradigm: a 25-Year Perspective","author":"Marek V. W.","year":"1999","unstructured":"V. W. Marek and M. Truszczy\u0144ski . Stable models and an alternative logic programming paradigm. The Logic Programming Paradigm: a 25-Year Perspective , Springer-Verlag , pages 75 -- 398 , 1999 . V. W. Marek and M. Truszczy\u0144ski. Stable models and an alternative logic programming paradigm. The Logic Programming Paradigm: a 25-Year Perspective, Springer-Verlag, pages 75--398, 1999."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-007-5036-4"},{"key":"e_1_3_2_1_14_1","volume-title":"Computational Intelligence: a Logical Approach","author":"Poole D.","year":"2007","unstructured":"D. Poole , A. Macworth , and R. Goebel . Computational Intelligence: a Logical Approach ( 2 nd ed). Oxford University Press , 2007 . D. Poole, A. Macworth, and R. Goebel. Computational Intelligence: a Logical Approach (2nd ed). Oxford University Press, 2007.","edition":"2"},{"key":"e_1_3_2_1_15_1","volume-title":"Spam Conference","author":"Sergeant M.","year":"2003","unstructured":"M. Sergeant . Internet-level spam detection and spamassassin 2.50 . In Spam Conference , 2003 . M. Sergeant. Internet-level spam detection and spamassassin 2.50. In Spam Conference, 2003."},{"key":"e_1_3_2_1_16_1","volume-title":"Information Retrieval","author":"van Rijsbergen C. J.","year":"1979","unstructured":"C. J. van Rijsbergen . Information Retrieval ( 2 nd ed.). Butterworths , London , 1979 . C. J. van Rijsbergen. Information Retrieval (2nd ed.). Butterworths, London, 1979.","edition":"2"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of the 12th Int'l Workshop on Logic Programming Environments (WLPE2002)","author":"Wielemaker J.","year":"2002","unstructured":"J. Wielemaker and A. Anjewierden . An architecture for making object-oriented systems available from prolog . In Proc. of the 12th Int'l Workshop on Logic Programming Environments (WLPE2002) , 2002 . J. Wielemaker and A. Anjewierden. An architecture for making object-oriented systems available from prolog. In Proc. of the 12th Int'l Workshop on Logic Programming Environments (WLPE2002), 2002."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of the fourth Conference on Email and Anti-Spam (CEAS 2007)","author":"Yih W.","year":"2007","unstructured":"W. Yih , R. McCann , and A. Kotcz . Improving spam filtering by detecting gray mail . In Proc. of the fourth Conference on Email and Anti-Spam (CEAS 2007) , 2007 . W. Yih, R. McCann, and A. Kotcz. Improving spam filtering by detecting gray mail. In Proc. of the fourth Conference on Email and Anti-Spam (CEAS 2007), 2007."}],"event":{"name":"CEAS '11: The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference","acronym":"CEAS '11","location":"Perth Australia"},"container-title":["Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2030376.2030388","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2030376.2030388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:48Z","timestamp":1750240128000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2030376.2030388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":18,"alternative-id":["10.1145\/2030376.2030388","10.1145\/2030376"],"URL":"https:\/\/doi.org\/10.1145\/2030376.2030388","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]},"assertion":[{"value":"2011-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}