{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:31:41Z","timestamp":1760189501414,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,15]],"date-time":"2016-06-15T00:00:00Z","timestamp":1465948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,15]]},"DOI":"10.1145\/2935663.2935672","type":"proceedings-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T21:50:36Z","timestamp":1465595436000},"page":"76-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Detecting Compromised Email Accounts from the Perspective of Graph Topology"],"prefix":"10.1145","author":[{"given":"Xuan","family":"Hu","sequence":"first","affiliation":[{"name":"Computer Center, Peking University"}]},{"given":"Banghuai","family":"Li","sequence":"additional","affiliation":[{"name":"Computer Center, Peking University"}]},{"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Computer Center, Peking University"}]},{"given":"Changling","family":"Zhou","sequence":"additional","affiliation":[{"name":"Computer Center, Peking University"}]},{"given":"Hao","family":"Ma","sequence":"additional","affiliation":[{"name":"Computer Center, Peking University"}]}],"member":"320","published-online":{"date-parts":[[2016,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/giraph.apache.org\/. Accessed","author":"Giraph Apache","year":"2016","unstructured":"Apache Giraph . http:\/\/giraph.apache.org\/. Accessed : May 20, 2016 . Apache Giraph. http:\/\/giraph.apache.org\/. Accessed: May 20, 2016."},{"key":"e_1_3_2_1_2_1","volume-title":"Accessed","author":"Wikipedia Clustering","year":"2016","unstructured":"Clustering coefficient - Wikipedia , the free encyclopedia. https:\/\/en.wikipedia.org\/wiki\/Clustering_coefficient . Accessed : May 20, 2016 . Clustering coefficient - Wikipedia, the free encyclopedia. https:\/\/en.wikipedia.org\/wiki\/Clustering_coefficient. Accessed: May 20, 2016."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663749"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19325-5_28"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the Second Conference on Email and Anti-Spam","author":"Hovold J.","year":"2005","unstructured":"J. Hovold . Naive Bayes Spam Filtering Using Word-Position-Based Attributes . In Proceedings of the Second Conference on Email and Anti-Spam , 2005 . J. Hovold. Naive Bayes Spam Filtering Using Word-Position-Based Attributes. In Proceedings of the Second Conference on Email and Anti-Spam, 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484330"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028838"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Second Conference on Email and Anti-Spam","author":"Lee H.","year":"2005","unstructured":"H. Lee and A. Ng . Spam deobfuscation using a hidden markov model . In Proceedings of the Second Conference on Email and Anti-Spam , 2005 . H. Lee and A. Ng. Spam deobfuscation using a hidden markov model. In Proceedings of the Second Conference on Email and Anti-Spam, 2005."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the Second Conference on Email and Anti-Spam","author":"Lowd D.","year":"2005","unstructured":"D. Lowd and C. Meek . Good Word Attacks on Statistical Spam Filters . Proceedings of the Second Conference on Email and Anti-Spam , 2005 . D. Lowd and C. Meek. Good Word Attacks on Statistical Spam Filters. Proceedings of the Second Conference on Email and Anti-Spam, 2005."},{"key":"e_1_3_2_1_10_1","first-page":"123","volume-title":"Proceedings of the Second Conference on Email and Anti-Spam","volume":"3","author":"Martin S.","year":"2005","unstructured":"S. Martin , B. Nelson , and A. D. Joseph . Analyzing Behavioral Features for Email Classification . In Proceedings of the Second Conference on Email and Anti-Spam , volume 3 , pages 123 -- 133 , 2005 . S. Martin, B. Nelson, and A. D. Joseph. Analyzing Behavioral Features for Email Classification. In Proceedings of the Second Conference on Email and Anti-Spam, volume 3, pages 123--133, 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.parco.2011.02.004"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.75.027105"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660282"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180428"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282415"}],"event":{"name":"CFI '16: The 11th International Conference on Future Internet Technologies","sponsor":["AsiaFI Asia Future Internet"],"location":"Nanjing China","acronym":"CFI '16"},"container-title":["Proceedings of the 11th International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935672","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2935663.2935672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:56Z","timestamp":1750217996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,15]]},"references-count":15,"alternative-id":["10.1145\/2935663.2935672","10.1145\/2935663"],"URL":"https:\/\/doi.org\/10.1145\/2935663.2935672","relation":{},"subject":[],"published":{"date-parts":[[2016,6,15]]},"assertion":[{"value":"2016-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}