{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:47:28Z","timestamp":1759333648098,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3471621.3471862","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:50:46Z","timestamp":1633618246000},"page":"205-219","source":"Crossref","is-referenced-by-count":6,"title":["CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security"],"prefix":"10.1145","author":[{"given":"Mohamed","family":"Nabeel","sequence":"first","affiliation":[{"name":"QCRI, Qatar"}]},{"given":"Enes","family":"Altinisik","sequence":"additional","affiliation":[{"name":"QCRI, Qatar"}]},{"given":"Haipei","family":"Sun","sequence":"additional","affiliation":[{"name":"STEVENS INSTITUTE OF TECHNOLOGY, US"}]},{"given":"Issa","family":"Khalil","sequence":"additional","affiliation":[{"name":"Qatar Computing Research Institute (QCRI), HBKU, Qatar"}]},{"given":"Hui (Wendy)","family":"Wang","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, US"}]},{"given":"Ting","family":"Yu","sequence":"additional","affiliation":[{"name":"Qatar Computing Research Institute, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. SpamHaus IP Blocklist. http:\/\/www.spamhaus.org.  [n.d.]. SpamHaus IP Blocklist. http:\/\/www.spamhaus.org."},{"key":"e_1_3_2_1_2_1","unstructured":"2003. SpamAssassin. https:\/\/spamassassin.apache.org\/.  2003. SpamAssassin. https:\/\/spamassassin.apache.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2003. SpamAssassin Tests Performed. https:\/\/bit.ly\/3gz1nm5.  2003. SpamAssassin Tests Performed. https:\/\/bit.ly\/3gz1nm5."},{"key":"e_1_3_2_1_4_1","unstructured":"[\n  4\n  ]  2017. https:\/\/techconnecto.com\/end-to-end-encryption-gmail\/.  [4] 2017. https:\/\/techconnecto.com\/end-to-end-encryption-gmail\/."},{"key":"e_1_3_2_1_5_1","unstructured":"[\n  5\n  ]  2017. https:\/\/blog.mailfence.com\/end-to-end-email-encryption\/.  [5] 2017. https:\/\/blog.mailfence.com\/end-to-end-email-encryption\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2017. E2EE Emails. https:\/\/bit.ly\/3qKvz2s.  2017. E2EE Emails. https:\/\/bit.ly\/3qKvz2s."},{"key":"e_1_3_2_1_7_1","unstructured":"[\n  7\n  ]  2020. https:\/\/gdpr.eu\/email-encryption\/.  [7] 2020. https:\/\/gdpr.eu\/email-encryption\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. OpenPGP. https:\/\/www.openpgp.org\/.  2020. OpenPGP. https:\/\/www.openpgp.org\/."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. DMARC Adoption Rate. https:\/\/www.dmarc360.com\/.  2021. DMARC Adoption Rate. https:\/\/www.dmarc360.com\/."},{"key":"e_1_3_2_1_10_1","first-page":"7","article-title":"2012. Evolving fuzzy neural network for phishing emails detection","volume":"8","author":"Almomani A.","year":"2012","unstructured":"A. Almomani , T. Wan , A. Altaher , A. Manasrah , E. A Lmomani , M. Anbar , E. A Lomari , and S. Ramadass . 2012. Evolving fuzzy neural network for phishing emails detection . JSC 8 , 7 ( 2012 ), 1099. A. Almomani, T. Wan, A. Altaher, A. Manasrah, E. ALmomani, M. Anbar, E. ALomari, and S. Ramadass. 2012. Evolving fuzzy neural network for phishing emails detection. JSC 8, 7 (2012), 1099.","journal-title":"JSC"},{"key":"e_1_3_2_1_11_1","unstructured":"B. Barnes. 2002. E-Mail Impersonators. https:\/\/bit.ly\/3gw9sIq.  B. Barnes. 2002. E-Mail Impersonators. https:\/\/bit.ly\/3gw9sIq."},{"key":"e_1_3_2_1_12_1","volume-title":"Random forests. Machine learning 45, 1","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman . 2001. Random forests. Machine learning 45, 1 ( 2001 ), 5\u201332. Leo Breiman. 2001. Random forests. Machine learning 45, 1 (2001), 5\u201332."},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"2014. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data","volume":"25","author":"Cao N.","year":"2014","unstructured":"N. Cao , C. Wang , M. Li , K. Ren , and W. Lou . 2014. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data . IEEE TPDS 25 , 1 ( 2014 ), 222\u2013233. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. 2014. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE TPDS 25, 1 (2014), 222\u2013233.","journal-title":"IEEE TPDS"},{"key":"e_1_3_2_1_14_1","unstructured":"T.\u00a0Hansen D.\u00a0Crocker and M. Kucheraw. 2020. DomainKeys Identified Mail (DKIM) Signatures. https:\/\/tools.ietf.org\/html\/rfc6376.  T.\u00a0Hansen D.\u00a0Crocker and M. Kucheraw. 2020. DomainKeys Identified Mail (DKIM) Signatures. https:\/\/tools.ietf.org\/html\/rfc6376."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03326-2_5"},{"key":"e_1_3_2_1_16_1","volume-title":"EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails. In 40th IEEE Annual Computer Software and Applications Conference, COMPSAC 2016","author":"Duman Sevtap","year":"2016","unstructured":"Sevtap Duman , Kubra Kalkan-Cakmakci , Manuel Egele , William\u00a0 K. Robertson , and Engin Kirda . 2016 . EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails. In 40th IEEE Annual Computer Software and Applications Conference, COMPSAC 2016 , Atlanta, GA, USA , June 10-14, 2016. 408\u2013416. Sevtap Duman, Kubra Kalkan-Cakmakci, Manuel Egele, William\u00a0K. Robertson, and Engin Kirda. 2016. EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails. In 40th IEEE Annual Computer Software and Applications Conference, COMPSAC 2016, Atlanta, GA, USA, June 10-14, 2016. 408\u2013416."},{"key":"e_1_3_2_1_17_1","unstructured":"Simon Garfinkel. 1995. Pretty Good Privacy.  Simon Garfinkel. 1995. Pretty Good Privacy."},{"key":"e_1_3_2_1_18_1","volume-title":"Lines: Content-Agnostic Detection of Spear-Phishing Emails. In Research in Attacks, Intrusions, and Defenses. Cham, 69\u201391.","author":"Gascon H.","year":"2018","unstructured":"H. Gascon , S. Ullrich , B. Stritter , and K. Rieck . 2018 . Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails. In Research in Attacks, Intrusions, and Defenses. Cham, 69\u201391. H. Gascon, S. Ullrich, B. Stritter, and K. Rieck. 2018. Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails. In Research in Attacks, Intrusions, and Defenses. Cham, 69\u201391."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"P. Golle J. Staddon and B. Waters. 2004. Secure Conjunctive Keyword Search over Encrypted Data. In Applied Cryptography and Network Security. Berlin Heidelberg 31\u201345.  P. Golle J. Staddon and B. Waters. 2004. Secure Conjunctive Keyword Search over Encrypted Data. In Applied Cryptography and Network Security. Berlin Heidelberg 31\u201345.","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium","author":"Hao Shuang","year":"2009","unstructured":"Shuang Hao , Nadeem\u00a0Ahmed Syed , Nick Feamster , Alexander\u00a0 G. Gray , and Sven Krasser . 2009 . Detecting Spammers with SNARE: Spatio-Temporal Network-Level Automatic Reputation Engine . In Proceedings of the 18th Conference on USENIX Security Symposium ( Montreal, Canada) (SSYM\u201909). USENIX Association, USA, 101\u2013118. Shuang Hao, Nadeem\u00a0Ahmed Syed, Nick Feamster, Alexander\u00a0G. Gray, and Sven Krasser. 2009. Detecting Spammers with SNARE: Spatio-Temporal Network-Level Automatic Reputation Engine. In Proceedings of the 18th Conference on USENIX Security Symposium (Montreal, Canada) (SSYM\u201909). USENIX Association, USA, 101\u2013118."},{"key":"e_1_3_2_1_21_1","unstructured":"T. Hastie R. Tibshirani and J. Friedman. 2009. The elements of statistical learning: data mining inference and prediction. Springer Science & Business Media. 367\u2013368 pages.  T. Hastie R. Tibshirani and J. Friedman. 2009. The elements of statistical learning: data mining inference and prediction. Springer Science & Business Media. 367\u2013368 pages."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361427"},{"key":"e_1_3_2_1_23_1","unstructured":"G. Ho A. Sharma M. Javed V. Paxson and D. Wagner. 2017. Detecting Credential Spearphishing Attacks in Enterprise Settings. In USENIX (Vancouver BC Canada). 469\u2013485.  G. Ho A. Sharma M. Javed V. Paxson and D. Wagner. 2017. Detecting Credential Spearphishing Attacks in Enterprise Settings. In USENIX (Vancouver BC Canada). 469\u2013485."},{"volume-title":"Header Based Email Spam Detection Framework Using Support Vector Machine (SVM) Technique","author":"Khamis A.","key":"e_1_3_2_1_24_1","unstructured":"S.\u00a0 A. Khamis , C.\u00a0F.\u00a0 M. Foozy , M.\u00a0 F. Ab\u00a0Aziz , and N Rahim . 2020. Header Based Email Spam Detection Framework Using Support Vector Machine (SVM) Technique . In ICSCDM. Springer , 57\u201365. S.\u00a0A. Khamis, C.\u00a0F.\u00a0M. Foozy, M.\u00a0F. Ab\u00a0Aziz, and N Rahim. 2020. Header Based Email Spam Detection Framework Using Support Vector Machine (SVM) Technique. In ICSCDM. Springer, 57\u201365."},{"key":"e_1_3_2_1_25_1","unstructured":"S. Kitterman. 2020. Sender Policy Framework (SPF). https:\/\/tools.ietf.org\/html\/rfc7208.  S. Kitterman. 2020. Sender Policy Framework (SPF). https:\/\/tools.ietf.org\/html\/rfc7208."},{"volume-title":"Proceedings of the 28th ACM International Conference on Information and Knowledge Management","author":"Li A.","key":"e_1_3_2_1_26_1","unstructured":"A. Li , Z. Qin , R. Liu , Y. Yang , and D. Li . 2019. Spam Review Detection with Graph Convolutional Networks . In Proceedings of the 28th ACM International Conference on Information and Knowledge Management ( Beijing, China) (CIKM \u201919). Association for Computing Machinery, New York, NY, USA, 2703\u20132711. https:\/\/doi.org\/10.1145\/3357384.3357820 A. Li, Z. Qin, R. Liu, Y. Yang, and D. Li. 2019. Spam Review Detection with Graph Convolutional Networks. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management (Beijing, China) (CIKM \u201919). Association for Computing Machinery, New York, NY, USA, 2703\u20132711. https:\/\/doi.org\/10.1145\/3357384.3357820"},{"volume-title":"2010 Proceedings IEEE INFOCOM.","author":"Li J.","key":"e_1_3_2_1_27_1","unstructured":"J. Li , Q. Wang , C. Wang , N. Cao , K. Ren , and W. Lou . 2010. Fuzzy Keyword Search over Encrypted Data in Cloud Computing . In 2010 Proceedings IEEE INFOCOM. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou. 2010. Fuzzy Keyword Search over Encrypted Data in Cloud Computing. In 2010 Proceedings IEEE INFOCOM."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Y.\u00a0N. Liu Y. Han X.\u00a0D. Zhu F. He and L.\u00a0Y. Wei. 2014. An expanded feature extraction of e-mail header for spam recognition. In AMR Vol.\u00a0846. 1672\u20131675.  Y.\u00a0N. Liu Y. Han X.\u00a0D. Zhu F. He and L.\u00a0Y. Wei. 2014. An expanded feature extraction of e-mail header for spam recognition. In AMR Vol.\u00a0846. 1672\u20131675.","DOI":"10.4028\/www.scientific.net\/AMR.846-847.1672"},{"key":"e_1_3_2_1_29_1","unstructured":"[\n  29\n  ]  Posteo Mail.2020. https:\/\/posteo.de\/.  [29] Posteo Mail.2020. https:\/\/posteo.de\/."},{"key":"e_1_3_2_1_30_1","unstructured":"[\n  30\n  ]  Tutanota Mail.2020. https:\/\/tutanota.com\/.  [30] Tutanota Mail.2020. https:\/\/tutanota.com\/."},{"key":"e_1_3_2_1_31_1","unstructured":"[\n  31\n  ]  Mailfence.2020. https:\/\/mailfence.com\/.  [31] Mailfence.2020. https:\/\/mailfence.com\/."},{"key":"e_1_3_2_1_32_1","unstructured":"Esko Nuutila. 1998. Efficient transitive closure computation in large digraphs.(1998).  Esko Nuutila. 1998. Efficient transitive closure computation in large digraphs.(1998)."},{"key":"e_1_3_2_1_33_1","unstructured":"Lawrence Page. 2001. Method for node ranking in a linked database. US Patent 6 285 999.  Lawrence Page. 2001. Method for node ranking in a linked database. US Patent 6 285 999."},{"key":"e_1_3_2_1_34_1","unstructured":"Gilchan Park and Julia\u00a0M Taylor. 2015. Using syntactic features for phishing detection. arXiv preprint arXiv:1506.00037(2015).  Gilchan Park and Julia\u00a0M Taylor. 2015. Using syntactic features for phishing detection. arXiv preprint arXiv:1506.00037(2015)."},{"key":"e_1_3_2_1_35_1","volume-title":"Nature 72","author":"Pearson Karl","year":"1905","unstructured":"Karl Pearson . 1905 . The problem of the random walk . Nature 72 , 1867 (1905), 342. Karl Pearson. 1905. The problem of the random walk. Nature 72, 1867 (1905), 342."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"P. Pons and M. Latapy. 2005. Computing Communities in Large Networks Using Random Walks. In ISCIS. 284\u2013293.  P. Pons and M. Latapy. 2005. Computing Communities in Large Networks Using Random Walks. In ISCIS. 284\u2013293.","DOI":"10.1007\/11569596_31"},{"key":"e_1_3_2_1_37_1","unstructured":"ProtoMail. 2020. Secure email. https:\/\/protonmail.com\/.  ProtoMail. 2020. Secure email. https:\/\/protonmail.com\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"A. Ramachandran N. Feamster and S.\u00a0S. Vempala. 2007. Filtering spam with behavioral blacklisting. In CCS. 342\u2013351.  A. Ramachandran N. Feamster and S.\u00a0S. Vempala. 2007. Filtering spam with behavioral blacklisting. In CCS. 342\u2013351.","DOI":"10.1145\/1315245.1315288"},{"key":"e_1_3_2_1_39_1","first-page":"3","article-title":"2012. The economics of spam","volume":"26","author":"Rao J.","year":"2012","unstructured":"J. Rao and D. Reiley . 2012. The economics of spam . JEP 26 , 3 ( 2012 ), 87\u2013110. J. Rao and D. Reiley. 2012. The economics of spam. JEP 26, 3 (2012), 87\u2013110.","journal-title":"JEP"},{"key":"e_1_3_2_1_40_1","unstructured":"P. Resnick. 2001. RFC 2822. https:\/\/tools.ietf.org\/html\/rfc2822l.  P. Resnick. 2001. RFC 2822. https:\/\/tools.ietf.org\/html\/rfc2822l."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0706851105"},{"key":"e_1_3_2_1_42_1","unstructured":"S. Sheng B. Wardman G. Warner L. Cranor J. Hong and C. Zhang. 2009. An empirical analysis of phishing blacklists. In CEAS. California USA.  S. Sheng B. Wardman G. Warner L. Cranor J. Hong and C. Zhang. 2009. An empirical analysis of phishing blacklists. In CEAS. California USA."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"A. Soliman and S. Girdzijauskas. 2017. AdaGraph: Adaptive Graph-Based Algorithms for Spam Detection in Social Networks. In NS. Cham 338\u2013354.  A. Soliman and S. Girdzijauskas. 2017. AdaGraph: Adaptive Graph-Based Algorithms for Spam Detection in Social Networks. In NS. Cham 338\u2013354.","DOI":"10.1007\/978-3-319-59647-1_25"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"G. Stringhini and O. Thonnard. 2015. That ain\u2019t you: Blocking spearphishing through behavioral modelling. In DIMVA. Springer 78\u201397.  G. Stringhini and O. Thonnard. 2015. That ain\u2019t you: Blocking spearphishing through behavioral modelling. In DIMVA. Springer 78\u201397.","DOI":"10.1007\/978-3-319-20550-2_5"},{"volume-title":"The definitive guide to controlling malware, spyware, phishing, and spam","author":"Sullivan Dan","key":"e_1_3_2_1_45_1","unstructured":"Dan Sullivan . 2005. The definitive guide to controlling malware, spyware, phishing, and spam . Realtimepublishers . com. Dan Sullivan. 2005. The definitive guide to controlling malware, spyware, phishing, and spam. Realtimepublishers. com."},{"key":"e_1_3_2_1_46_1","unstructured":"A. Vazhayil N. Harikrishnan R. Vinayakumar K. Soman and A. Verma. 2018. PED-ML: Phishing email detection using classical machine learning techniques. In IWSPA. Tempe AZ USA 1\u20138.  A. Vazhayil N. Harikrishnan R. Vinayakumar K. Soman and A. Verma. 2018. PED-ML: Phishing email detection using classical machine learning techniques. In IWSPA. Tempe AZ USA 1\u20138."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"R. Verma and N. Hossain. 2013. Semantic feature selection for text with application to phishing email detection. In ICISC. Springer 455\u2013468.  R. Verma and N. Hossain. 2013. Semantic feature selection for text with application to phishing email detection. In ICISC. Springer 455\u2013468.","DOI":"10.1007\/978-3-319-12160-4_27"},{"volume-title":"Detecting phishing emails the natural language way","author":"Verma Rakesh","key":"e_1_3_2_1_48_1","unstructured":"Rakesh Verma , Narasimha Shashidhar , and Nabil Hossain . 2012. Detecting phishing emails the natural language way . In ESRCS. Springer , 824\u2013841. Rakesh Verma, Narasimha Shashidhar, and Nabil Hossain. 2012. Detecting phishing emails the natural language way. In ESRCS. Springer, 824\u2013841."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.12.012"},{"key":"e_1_3_2_1_50_1","first-page":"4","article-title":"2018. A Survey on Malicious Domains Detection through DNS Data Analysis","volume":"51","author":"Zhauniarovich Y.","year":"2018","unstructured":"Y. Zhauniarovich , I. Khalil , T. Yu , and M. Dacier . 2018. A Survey on Malicious Domains Detection through DNS Data Analysis . ACM Comput. Surv. 51 , 4 ( 2018 ), 67:1\u201367:36. Y. Zhauniarovich, I. Khalil, T. Yu, and M. Dacier. 2018. A Survey on Malicious Domains Detection through DNS Data Analysis. ACM Comput. Surv. 51, 4 (2018), 67:1\u201367:36.","journal-title":"ACM Comput. Surv."}],"event":{"name":"RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID '21","location":"San Sebastian Spain"},"container-title":["24th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471862","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:49Z","timestamp":1750195489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471862"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":50,"alternative-id":["10.1145\/3471621.3471862","10.1145\/3471621"],"URL":"https:\/\/doi.org\/10.1145\/3471621.3471862","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}