{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T20:17:44Z","timestamp":1760473064724,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T00:00:00Z","timestamp":1629072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,16]]},"DOI":"10.1145\/3469096.3475060","type":"proceedings-article","created":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:22:40Z","timestamp":1629159760000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Trustworthiness of spam email addresses using machine learning"],"prefix":"10.1145","author":[{"given":"Francisco","family":"J\u00e1\u00f1ez-Martino","sequence":"first","affiliation":[{"name":"University of Le\u00f3n, Spain"}]},{"given":"Roc\u00edo","family":"Alaiz-Rodr\u00edguez","sequence":"additional","affiliation":[{"name":"University of Le\u00f3n, Spain"}]},{"given":"V\u00edctor","family":"Gonz\u00e1lez-Castro","sequence":"additional","affiliation":[{"name":"University of Le\u00f3n, Spain"}]},{"given":"Eduardo","family":"Fidalgo","sequence":"additional","affiliation":[{"name":"University of Le\u00f3n, Spain"}]}],"member":"320","published-online":{"date-parts":[[2021,8,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5220\/0009154802280234"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102090"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101613"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e01802"},{"key":"e_1_3_2_1_5_1","unstructured":"Europol. 2019. Spear phishing a law enforcement and cross-industry perspective. https:\/\/www.europol.europa.eu\/newsroom\/news\/europol-publishes-law-enforcement-and-industry-report-spear-phishing. Accessed: 2021-06-01.  Europol. 2019. Spear phishing a law enforcement and cross-industry perspective. https:\/\/www.europol.europa.eu\/newsroom\/news\/europol-publishes-law-enforcement-and-industry-report-spear-phishing. Accessed: 2021-06-01."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102259"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101494"},{"key":"e_1_3_2_1_8_1","volume-title":"A lifelong spam emails classification model. Applied Computing and Informatics, (01","author":"Mohammad Rami","year":"2020","unstructured":"Rami Mohammad and A Mohammad . 2020. A lifelong spam emails classification model. Applied Computing and Informatics, (01 2020 ), 10. Rami Mohammad and A Mohammad. 2020. A lifelong spam emails classification model. Applied Computing and Informatics, (01 2020), 10."},{"key":"e_1_3_2_1_9_1","unstructured":"Harsha Nori Samuel Jenkins Paul Koch and Rich Caruana. 2019. InterpretML: A Unified Framework for Machine Learning Interpretability. arXiv preprint arXiv:1909.09223 (2019) .  Harsha Nori Samuel Jenkins Paul Koch and Rich Caruana. 2019. InterpretML: A Unified Framework for Machine Learning Interpretability. arXiv preprint arXiv:1909.09223 (2019) ."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-019-0098-8"},{"key":"e_1_3_2_1_11_1","volume-title":"Detection of phishing websites using an efficient feature-based machine learning framework. Neural Computing and Applications 31 (08","author":"Rao Routhu","year":"2019","unstructured":"Routhu Rao and Alwyn Pais . 2019. Detection of phishing websites using an efficient feature-based machine learning framework. Neural Computing and Applications 31 (08 2019 ). Routhu Rao and Alwyn Pais. 2019. Detection of phishing websites using an efficient feature-based machine learning framework. Neural Computing and Applications 31 (08 2019)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"e_1_3_2_1_13_1","volume-title":"Impact of Current Phishing Strategies in Machine Learning Models for Phishing Detection. In 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS","author":"S\u00e1nchez-Paniagua M.","year":"2020","unstructured":"M. S\u00e1nchez-Paniagua , E. Fidalgo , V. Gonz\u00e1lez-Castro , and E. Alegre . 2021 . Impact of Current Phishing Strategies in Machine Learning Models for Phishing Detection. In 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020 ), \u00c1lvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, H\u00e9ctor Quinti\u00e1n, and Emilio Corchado (Eds.). Springer International Publishing, Cham, 87--96. M. S\u00e1nchez-Paniagua, E. Fidalgo, V. Gonz\u00e1lez-Castro, and E. Alegre. 2021. Impact of Current Phishing Strategies in Machine Learning Models for Phishing Detection. In 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020), \u00c1lvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, H\u00e9ctor Quinti\u00e1n, and Emilio Corchado (Eds.). Springer International Publishing, Cham, 87--96."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107275"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892066"}],"event":{"name":"DocEng '21: ACM Symposium on Document Engineering 2021","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Limerick Ireland","acronym":"DocEng '21"},"container-title":["Proceedings of the 21st ACM Symposium on Document Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3469096.3475060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3469096.3475060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:29Z","timestamp":1750191509000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3469096.3475060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,16]]},"references-count":15,"alternative-id":["10.1145\/3469096.3475060","10.1145\/3469096"],"URL":"https:\/\/doi.org\/10.1145\/3469096.3475060","relation":{},"subject":[],"published":{"date-parts":[[2021,8,16]]},"assertion":[{"value":"2021-08-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}