{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:32:45Z","timestamp":1755999165687,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T00:00:00Z","timestamp":1584576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3,19]]},"DOI":"10.1145\/3388176.3388217","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T09:08:11Z","timestamp":1588583291000},"page":"38-42","source":"Crossref","is-referenced-by-count":6,"title":["False Positive Detection in Sender Domain Authentication by DMARC Report Analysis"],"prefix":"10.1145","author":[{"given":"Kanako","family":"Konno","sequence":"first","affiliation":[{"name":"Tokyo University of Agriculture and Technology, Naka-cho, Koganei, Tokyo, Japan"}]},{"given":"Naoya","family":"Kitagawa","sequence":"additional","affiliation":[{"name":"Tokyo University of Agriculture and Technology, Naka-cho, Koganei, Tokyo, Japan"}]},{"given":"Nariyoshi","family":"Yamai","sequence":"additional","affiliation":[{"name":"Tokyo University of Agriculture and Technology, Naka-cho, Koganei, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"unstructured":"FBI (Federal Bureau of Investigation). Business Email Compromise The $26 Billion Scam. [online] Available at: https:\/\/www.ic3.gov\/media\/2019\/190910.aspx [Accessed 8 Jan. 2020].  FBI (Federal Bureau of Investigation). Business Email Compromise The $26 Billion Scam. [online] Available at: https:\/\/www.ic3.gov\/media\/2019\/190910.aspx [Accessed 8 Jan. 2020].","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"crossref","unstructured":"M. Wong and W. Schlitt. 2006. Sender Policy Framework (SPF) for authorizing use of domains in e-mail. RFC4408.  M. Wong and W. Schlitt. 2006. Sender Policy Framework (SPF) for authorizing use of domains in e-mail. RFC4408.","key":"e_1_3_2_1_2_1","DOI":"10.17487\/rfc4408"},{"doi-asserted-by":"crossref","unstructured":"D. Crocker T. Hansen and M. Kucherawy.2011. DomainKeys Identified Mail (DKIM) signatures. STD 76.  D. Crocker T. Hansen and M. Kucherawy.2011. DomainKeys Identified Mail (DKIM) signatures. STD 76.","key":"e_1_3_2_1_3_1","DOI":"10.17487\/rfc6376"},{"doi-asserted-by":"crossref","unstructured":"M. Kucherawy and E. Zwicky. 2015. Domain-based message authentication reporting and conformance (DMARC). RFC 7489.  M. Kucherawy and E. Zwicky. 2015. Domain-based message authentication reporting and conformance (DMARC). RFC 7489.","key":"e_1_3_2_1_4_1","DOI":"10.17487\/rfc7489"},{"unstructured":"E. Harris. The Next Step in the Spam Control War: Greylisting. [online] Available at: http:\/\/projects.puremagic.com\/greylisting\/whitepaper.html. [Accessed 8 Jan. 2020].  E. Harris. The Next Step in the Spam Control War: Greylisting. [online] Available at: http:\/\/projects.puremagic.com\/greylisting\/whitepaper.html. [Accessed 8 Jan. 2020].","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/ICON.2012.6506588"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/345508.345569"},{"volume-title":"Proceedings of the 7th International Conference on Security of Information and Networks - SIN 14","year":"2014","author":"Aggarwal S.","key":"e_1_3_2_1_8_1"},{"volume-title":"2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC) (2016","year":"2016","author":"Feng W.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1186\/s40537-015-0029-9"},{"unstructured":"The Apache Software Foundation. The Apache SpamAssassin Project. [online] Available at: http:\/\/spamassassin.apache.org\/. [Accessed 8 Jan. 2020].  The Apache Software Foundation. The Apache SpamAssassin Project. [online] Available at: http:\/\/spamassassin.apache.org\/. [Accessed 8 Jan. 2020].","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/MALWARE.2008.4690858"},{"volume-title":"Proceedings of the Seventeenth International Conference on Machine Learning (ICML","year":"2000","author":"Pelleg D.","key":"e_1_3_2_1_13_1"},{"unstructured":"The Spamhaus Project Ltd. Spamhaus ZEN. [online]. Available at: https:\/\/www.spamhaus.org\/zen\/. [Accessed 8 Jan. 2020].  The Spamhaus Project Ltd. Spamhaus ZEN. [online]. Available at: https:\/\/www.spamhaus.org\/zen\/. [Accessed 8 Jan. 2020].","key":"e_1_3_2_1_14_1"}],"event":{"sponsor":["University of Salford University of Salford","Cardiff University Cardiff University","Kingston University Kingston University"],"acronym":"ICISS 2020","name":"ICISS 2020: 2020 The 3rd International Conference on Information Science and System","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the 2020 The 3rd International Conference on Information Science and System"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3388176.3388217","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3388176.3388217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:19Z","timestamp":1750197679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3388176.3388217"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,19]]},"references-count":14,"alternative-id":["10.1145\/3388176.3388217","10.1145\/3388176"],"URL":"https:\/\/doi.org\/10.1145\/3388176.3388217","relation":{},"subject":[],"published":{"date-parts":[[2020,3,19]]}}}