{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:14Z","timestamp":1750306634519,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["257007"],"award-info":[{"award-number":["257007"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590344","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"377-388","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Shades of gray"],"prefix":"10.1145","author":[{"given":"Jelena","family":"Isacenkova","sequence":"first","affiliation":[{"name":"Eurecom, Sophia Antipolis, France"}]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[{"name":"Eurecom, Sophia Antipolis, France"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Controlling the Assault of Non-Solicited Pornography And Marketing Act of","author":"Act CAN-SPAM","year":"2003","unstructured":"CAN-SPAM Act : Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003 . CAN-SPAM Act: Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003."},{"key":"e_1_3_2_1_2_1","volume-title":"concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)","author":"Privacy Directive","year":"2002","unstructured":"Directive 2002\/58 on Privacy and Electronic Communications , concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) . , 2002 . Directive 2002\/58 on Privacy and Electronic Communications, concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). , 2002."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791562.1791608"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_1_5_1","volume-title":"CEAS","author":"Chang M.-W.","year":"2008","unstructured":"M.-W. Chang , W.-T. Yih , and R. Mccann . Personalized spam filtering for gray mail . CEAS , 2008 . M.-W. Chang, W.-T. Yih, and R. Mccann. Personalized spam filtering for gray mail. CEAS, 2008."},{"key":"e_1_3_2_1_6_1","volume-title":"Spam: How it is hurting email and degrading life on the internet","author":"Fallows D.","year":"2003","unstructured":"D. Fallows . Spam: How it is hurting email and degrading life on the internet , 2003 . D. Fallows. Spam: How it is hurting email and degrading life on the internet, 2003."},{"key":"e_1_3_2_1_7_1","volume-title":"Response Rate Report","author":"Direct Marketing Association","year":"2012","unstructured":"Direct Marketing Association . Response Rate Report , 2012 . Direct Marketing Association. Response Rate Report, 2012."},{"key":"e_1_3_2_1_8_1","volume-title":"Email deliverability review whitepaper","author":"D. M. A.","year":"2012","unstructured":"D. M. A. DMA. Email deliverability review whitepaper , 2012 . D. M. A. DMA. Email deliverability review whitepaper, 2012."},{"key":"e_1_3_2_1_9_1","first-page":"101","volume-title":"Proc. of the 18th conference on USENIX security symposium","author":"Hao S.","year":"2009","unstructured":"S. Hao , N. Syed , N. Feamster , A. Gray , and S. Krasser . Detecting spammers with SNARE: Spatio-temporal network-level automatic reputation engine . In Proc. of the 18th conference on USENIX security symposium , pages 101 -- 118 . USENIX Association , 2009 . S. Hao, N. Syed, N. Feamster, A. Gray, and S. Krasser. Detecting spammers with SNARE: Spatio-temporal network-level automatic reputation engine. In Proc. of the 18th conference on USENIX security symposium, pages 101--118. USENIX Association, 2009."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068855"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_3_2_1_13_1","volume-title":"Spam or not spam--that is the question. Tech. rep","author":"Kiran P.","year":"2009","unstructured":"P. Kiran and I. Atmosukarto . Spam or not spam--that is the question. Tech. rep ., University of Washington , 2009 . P. Kiran and I. Atmosukarto. Spam or not spam--that is the question. Tech. rep., University of Washington, 2009."},{"key":"e_1_3_2_1_14_1","volume-title":"CEAS","author":"Kolcz A.","year":"2007","unstructured":"A. Kolcz and A. Chowdhury . Hardening fingerprinting by context . CEAS , 2007 . A. Kolcz and A. Chowdhury. Hardening fingerprinting by context. CEAS, 2007."},{"key":"e_1_3_2_1_15_1","volume-title":"CEAS","author":"Li F.","year":"2006","unstructured":"F. Li and M. han Hsieh . An empirical study of clustering behavior of spammers and groupbased anti-spam strategies . CEAS , 2006 . F. Li and M. han Hsieh. An empirical study of clustering behavior of spammers and groupbased anti-spam strategies. CEAS, 2006."},{"key":"e_1_3_2_1_16_1","volume-title":"Email Security Awareness and Usage Report","author":"MAAWG.","year":"2012","unstructured":"MAAWG. Email Security Awareness and Usage Report , 2012 . MAAWG. Email Security Awareness and Usage Report, 2012."},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX","author":"McCoy D.","year":"2012","unstructured":"D. McCoy , A. Pitsillidis , G. Jordan , N. Weaver , C. Kreibich , B. Krebs , G. M. Voelker , S. Savage , and K. Levchenko . Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs . USENIX , 2012 . D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko. Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs. USENIX, 2012."},{"key":"e_1_3_2_1_18_1","volume-title":"NDSS","author":"Onarlioglu K.","year":"2012","unstructured":"K. Onarlioglu , U. O. Yilmaz , D. Balzarotti , and E. Kirda . Insights into user behavior in dealing with internet attacks . NDSS , 2012 . K. Onarlioglu, U. O. Yilmaz, D. Balzarotti, and E. Kirda. Insights into user behavior in dealing with internet attacks. NDSS, 2012."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387709.1387712"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555352"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398821"},{"key":"e_1_3_2_1_22_1","volume-title":"NDSS","author":"Pitsillidis A.","year":"2010","unstructured":"A. Pitsillidis , K. Levchenko , C. Kreibich , C. Kanich , G. M. Voelker , V. Paxson , N. Weaver , and S. Savage . Botnet judo: Fighting spam with itself . NDSS , 2010 . A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. M. Voelker, V. Paxson, N. Weaver, and S. Savage. Botnet judo: Fighting spam with itself. NDSS, 2010."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811090"},{"key":"e_1_3_2_1_24_1","volume-title":"NDSS","author":"Qian Z.","year":"2010","unstructured":"Z. Qian , Z. M. Mao , Y. Xie , and F. Yu . On network-level clusters for spam detection . In NDSS , 2010 . Z. Qian, Z. M. Mao, Y. Xie, and F. Yu. On network-level clusters for spam detection. In NDSS, 2010."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159947"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315288"},{"key":"e_1_3_2_1_27_1","first-page":"Q3","year":"2012","unstructured":"Return Path. Email Intelligence Report , Q3 2012 . Return Path. Email Intelligence Report, Q3 2012.","journal-title":"Return Path. Email Intelligence Report"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_1_29_1","volume-title":"DTIC Document","author":"West A. G.","year":"2010","unstructured":"A. G. West , A. J. Aviv , J. Chang , and I. Lee . Mitigating spam using spatio-temporal reputation. Technical report , DTIC Document , 2010 . A. G. West, A. J. Aviv, J. Chang, and I. Lee. Mitigating spam using spatio-temporal reputation. Technical report, DTIC Document, 2010."},{"key":"e_1_3_2_1_30_1","volume-title":"CEAS","author":"Yih W.-t.","year":"2007","unstructured":"W.-t. Yih , R. McCann , and A. Kolcz . Improving spam filtering by detecting gray mail . CEAS , 2007 . W.-t. Yih, R. McCann, and A. Kolcz. Improving spam filtering by detecting gray mail. CEAS, 2007."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529565"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590344","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:52Z","timestamp":1750229752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590344"}},"subtitle":["a closer look at emails in the gray area"],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":31,"alternative-id":["10.1145\/2590296.2590344","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590344","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}