{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:22:36Z","timestamp":1775067756830,"version":"3.50.1"},"publisher-location":"New York, New York, USA","reference-count":11,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1145\/2684793.2684803","type":"proceedings-article","created":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T13:51:05Z","timestamp":1418997065000},"page":"66-73","source":"Crossref","is-referenced-by-count":13,"title":["Clustering Spam Campaigns with Fuzzy Hashing"],"prefix":"10.1145","author":[{"given":"Jianxing","family":"Chen","sequence":"first","affiliation":[]},{"given":"Romain","family":"Fontugne","sequence":"additional","affiliation":[]},{"given":"Akira","family":"Kato","sequence":"additional","affiliation":[]},{"given":"Kensuke","family":"Fukuda","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2684793.2684803-1","unstructured":"Messaging Anti-Abuse Working Group (MAAWG), Email metrics program: The network operators' perspective. Report #15 - first, second and third quarter 2011. Nov. 2011."},{"key":"key-10.1145\/2684793.2684803-2","unstructured":"D. Dagon, C. C. Zou, and W. Lee. Modeling botnet propagation using time zones. In NDSS 2006, pages 1--15, San Diego, CA, Feb 2006."},{"key":"key-10.1145\/2684793.2684803-3","doi-asserted-by":"crossref","unstructured":"N. Jiang, J. C. Y. Jin, L. Li, and Z.-L. Zhang. Identifying suspicious activities through dns failure graph analysis. In ICNP 2010, pages 144--153, Vancouver, Canada, Oct 2010.","DOI":"10.1109\/ICNP.2010.5762763"},{"key":"key-10.1145\/2684793.2684803-4","doi-asserted-by":"crossref","unstructured":"J. Kornblum. Identifying almost identical files using context triggered piecewise hashing. Disital Investigation, 3:91--97, 2006.","DOI":"10.1016\/j.diin.2006.06.015"},{"key":"key-10.1145\/2684793.2684803-5","doi-asserted-by":"crossref","unstructured":"A. Pathak, F. Qian, Y. C. Hu, Z. M. Mao, and S. Ranjan. Botnet spam campaigns can be long lasting: evidence, implications, and analysis. In SIGMETRICS 2009, pages 13--24, Seattle, WA, Jun 2009.","DOI":"10.1145\/1555349.1555352"},{"key":"key-10.1145\/2684793.2684803-6","unstructured":"C. Porter. Email Security with Cisco IronPort. Networking Technology: Security Series. Cisco Press, 2012."},{"key":"key-10.1145\/2684793.2684803-7","unstructured":"M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. My botnet is bigger than yours (maybe, better than yours). In HotBots 2007, pages 1--5, Cambridge, MA, Apr 2007."},{"key":"key-10.1145\/2684793.2684803-8","doi-asserted-by":"crossref","unstructured":"A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In SIGCOMM 2006, pages 291--302, Pisa, Italy, Aug 2006.","DOI":"10.1145\/1159913.1159947"},{"key":"key-10.1145\/2684793.2684803-9","unstructured":"A. Ramachandran, N. Feamster, and D. Dagon. Revealing botnet membership using DNSBL counter-intelligence. In SRUTI 2006, pages 1--8, San Jose, CA, Jul 2006."},{"key":"key-10.1145\/2684793.2684803-10","unstructured":"B. Stone-Gross, T. Holz, G. Stringhini, and G. Vigna. The underground economy of spam: A botmaster's perspective of coordinating large-scale spam campaigns. In LEET 2011, pages 1--8, Boston, MA, Mar 2011."},{"key":"key-10.1145\/2684793.2684803-11","unstructured":"L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten, and J. D. Tygar. Characterizing botnets from email spam records. In LEET 2008, pages 1--9, San Francisco, CA, Apr 2008."}],"event":{"name":"the AINTEC 2014","location":"Chiang Mai, Thailand","acronym":"AINTEC '14","number":"14","sponsor":["SIGCOMM, ACM Special Interest Group on Data Communication","AIOT, Asian Institute of Technology"],"start":{"date-parts":[[2014,11,26]]},"end":{"date-parts":[[2014,11,28]]}},"container-title":["Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference - AINTEC '14"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2684793.2684803","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2684803&amp;ftid=1522821&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:41Z","timestamp":1750227221000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2684793.2684803"}},"subtitle":[],"proceedings-subject":"Asian Internet Engineering Conference","short-title":[],"issued":{"date-parts":[[2014]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1145\/2684793.2684803","relation":{},"subject":[],"published":{"date-parts":[[2014]]}}}