{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:53:24Z","timestamp":1775069604465,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T00:00:00Z","timestamp":1346630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,3]]},"DOI":"10.1145\/2381716.2381863","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"771-778","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Identifying spam e-mail based-on statistical header features and sender behavior"],"prefix":"10.1145","author":[{"given":"Aziz","family":"Qaroush","sequence":"first","affiliation":[{"name":"Birzeit University, Birzeit, West Bank, Palestine"}]},{"given":"Ismail M.","family":"Khater","sequence":"additional","affiliation":[{"name":"Birzeit University, Birzeit, West Bank, Palestine"}]},{"given":"Mahdi","family":"Washaha","sequence":"additional","affiliation":[{"name":"Birzeit University, Birzeit, West Bank, Palestine"}]}],"member":"320","published-online":{"date-parts":[[2012,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more.","author":"Christian K.","year":"2009"},{"key":"e_1_3_2_1_2_1","unstructured":"Intelligence S. Symantec Intelligence Report: November 2011 2011 {cited January 2012}; Available from: http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/other_resources\/b-intelligence_report_11-2011.en-us.pdf.  Intelligence S. Symantec Intelligence Report: November 2011 2011 {cited January 2012}; Available from: http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/other_resources\/b-intelligence_report_11-2011.en-us.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"The Real Cost of Spam. 2007 {cited January 2012}; Available from: http:\/\/www.itsecurity.com\/features\/real-cost-of-spam-121007\/. The Real Cost of Spam . 2007 {cited January 2012}; Available from: http:\/\/www.itsecurity.com\/features\/real-cost-of-spam-121007\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Reading and Understanding Email Headers. {cited March 2012}; Available from: http:\/\/www.by-users.co.uk\/faqs\/email\/headers\/. Reading and Understanding Email Headers . {cited March 2012}; Available from: http:\/\/www.by-users.co.uk\/faqs\/email\/headers\/."},{"key":"e_1_3_2_1_5_1","unstructured":"J. K Network Working Group. Simple Mail Transfer Protocol. {cited; Available from: http:\/\/tools.ietf.org\/html\/rfc5321.  J. K Network Working Group. Simple Mail Transfer Protocol . {cited; Available from: http:\/\/tools.ietf.org\/html\/rfc5321."},{"key":"e_1_3_2_1_6_1","unstructured":"P. R. Network Working Group E. Request for Comments RFC 2822 . {cited March 2012}; Available from: http:\/\/tools.ietf.org\/html\/rfc2822.html.  P. R. Network Working Group E. Request for Comments RFC 2822 . {cited March 2012}; Available from: http:\/\/tools.ietf.org\/html\/rfc2822.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Gansterer W. N. et al. Spam Filtering Based on Latent Semantic Indexing Survey of Text Mining II. 2008 Springer London. p. 165--183.  Gansterer W. N. et al. Spam Filtering Based on Latent Semantic Indexing Survey of Text Mining II . 2008 Springer London. p. 165--183.","DOI":"10.1007\/978-1-84800-046-9_9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.03.002"},{"key":"e_1_3_2_1_9_1","volume-title":"Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on.","author":"Miao Y.","year":"2008"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.05.020"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.12.012"},{"key":"e_1_3_2_1_12_1","first-page":"34","volume":"9","author":"An Efficient Two I","journal-title":"J. Network Security."},{"key":"e_1_3_2_1_13_1","volume-title":"Identifying Potentially Useful Email Header Features for Email Spam Filtering. in The Sixth International Conference on Digital Society (ICDS)","author":"Al-Jarrah O.","year":"2012"},{"key":"e_1_3_2_1_14_1","unstructured":"n-gram. {cited March 2012}; Available from: http:\/\/en.wikipedia.org\/wiki\/N-gram. n-gram . {cited March 2012}; Available from: http:\/\/en.wikipedia.org\/wiki\/N-gram."},{"key":"e_1_3_2_1_15_1","unstructured":"Web of Trust. {cited March 2012}; Available from: http:\/\/www.mywot.com\/. Web of Trust . {cited March 2012}; Available from: http:\/\/www.mywot.com\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_17_1","unstructured":"corpus C. L. S. C. L. {cited March 2012}; Available from: http:\/\/plg1.uwaterloo.ca\/cgi-bin\/cgiwrap\/gvcormac\/fooceas.  corpus C. L. S. C. L. {cited March 2012}; Available from: http:\/\/plg1.uwaterloo.ca\/cgi-bin\/cgiwrap\/gvcormac\/fooceas."},{"key":"e_1_3_2_1_18_1","volume-title":"CSDMC2010 and S. corpus). {cited","author":"GROUP.","year":"2010"}],"event":{"name":"CUBE '12: CUBE International IT Conference & Exhibition","location":"Pune India","acronym":"CUBE '12","sponsor":["CUOT Curtin University of Technology"]},"container-title":["Proceedings of the CUBE International Information Technology Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381863","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381716.2381863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:46Z","timestamp":1750239286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381863"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,3]]},"references-count":18,"alternative-id":["10.1145\/2381716.2381863","10.1145\/2381716"],"URL":"https:\/\/doi.org\/10.1145\/2381716.2381863","relation":{},"subject":[],"published":{"date-parts":[[2012,9,3]]},"assertion":[{"value":"2012-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}