{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:10:49Z","timestamp":1691619049633},"reference-count":20,"publisher":"Sociedade Brasileira de Computacao - SB","issue":"1","license":[{"start":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T00:00:00Z","timestamp":1431302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Internet Serv Appl"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13174-015-0025-5","type":"journal-article","created":{"date-parts":[[2015,4,29]],"date-time":"2015-04-29T09:58:08Z","timestamp":1430301488000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Neighborhoods and bands: an analysis of the origins of spam"],"prefix":"10.5753","volume":"6","author":[{"given":"Osvaldo","family":"Fonseca","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elverton","family":"Fazzion","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pedro Henrique","family":"B Las-Casas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dorgival","family":"Guedes","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"suffix":"Jr","given":"Wagner","family":"Meira","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cristine","family":"Hoepers","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Klaus","family":"Steding-Jessen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcelo HP","family":"Chaves","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"3742","published-online":{"date-parts":[[2015,5,11]]},"reference":[{"issue":"1","key":"25_CR1","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MIC.2013.16","volume":"17","author":"H Orman","year":"2013","unstructured":"Orman H (2013) The compleat story of phish. Int Comput IEEE 17(1): 87\u201391.","journal-title":"Int Comput IEEE"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"035101","DOI":"10.1103\/PhysRevE.66.035101","volume":"66","author":"MEJ Newman","year":"2002","unstructured":"Newman MEJ, Forrest S, Balthrop J (2002) Email networks and the spread of computer viruses. Phys Rev E 66: 035101.","journal-title":"Phys Rev E"},{"issue":"6","key":"25_CR3","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/990680.990681","volume":"47","author":"JC Sipior","year":"2004","unstructured":"Sipior JC, Ward BT, Bonner PG (2004) Should spam be on the menu?Commun ACM 47(6): 59\u201363.","journal-title":"Commun ACM"},{"key":"25_CR4","unstructured":"Guerra PHC, Guedes D, Wagner Meira J, Hoepers C, Chaves MHPC, Steding-Jessen K (2010) Exploring the spam arms race to characterize spam evolution In: Proceedings of the 7th Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), Redmond, WA."},{"issue":"6","key":"25_CR5","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1002\/nem.753","volume":"20","author":"W van Wanrooij","year":"2010","unstructured":"van Wanrooij W, Pras A (2010) Filtering spam from bad neighborhoods. Int J Netw Manag 20(6): 433\u2013444.","journal-title":"Int J Netw Manag"},{"key":"25_CR6","first-page":"1","volume-title":"7th International Conference on Network and Services Management (CNSM 2011), Paris, France","author":"GC Moreira Moura","year":"2011","unstructured":"Moreira Moura GC, Sadre R, Pras A (2011) Internet bad neighborhoods: the spam case. In: Festor O Lupu E (eds)7th International Conference on Network and Services Management (CNSM 2011), Paris, France, 1\u20138.. IEEE Communications Society, USA."},{"issue":"4","key":"25_CR7","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1145\/1151659.1159947","volume":"36","author":"A Ramachandran","year":"2006","unstructured":"Ramachandran A, Feamster N (2006) Understanding the Network-Level Behavior of Spammers. SIGCOMM Comput Commun Rev 36(4): 291\u2013302.","journal-title":"SIGCOMM Comput Commun Rev"},{"issue":"14","key":"25_CR8","doi-asserted-by":"publisher","first-page":"1764","DOI":"10.1016\/j.comcom.2011.03.015","volume":"34","author":"Z Duan","year":"2011","unstructured":"Duan Z, Gopalan K, Yuan X (2011) An empirical study of behavioral characteristics of spammers: Findings and implications. Comput Commun 34(14): 1764\u20131776.","journal-title":"Comput Commun"},{"key":"25_CR9","unstructured":"Pathak A, Hu YC, Mao ZM (2008) Peeking into spammer behavior from a unique vantage point In: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. LEET\u201908, 3\u2013139.. USENIX Association, Berkeley, CA, USA. http:\/\/dl.acm.org\/citation.cfm?id=1387709.1387712 ."},{"key":"25_CR10","volume-title":"Proceedings of the Second Conference on Email and Anti-Spam - CEAS 2005","author":"LH Gomes","year":"2005","unstructured":"Gomes LH, Almeida RB, Bettencourt LMA, Almeida V, Almeida JM (2005) Comparative Graph Theoretical Characterization of Networks of Spam and Legitimate Email In: Proceedings of the Second Conference on Email and Anti-Spam - CEAS 2005.. CEAS, Stanford, CA, USA."},{"key":"25_CR11","unstructured":"Kokkodis M, Faloutsos M (2009) Spamming botnets: Are we losing the war? In: Proceedings of the 6th Conference on E-mail and Anti-spam (CEAS), Mountain View, CA."},{"key":"25_CR12","unstructured":"Guerra PHC, Pires DEV, Guedes D, Wagner Meira J, Hoepers C, Steding-Jessen K (2008) A campaign-based characterization of spamming strategies In: Proceedings of the 5th Conference on E-mail and Anti-spam (CEAS), Mountain View, CA."},{"key":"25_CR13","first-page":"171","volume-title":"SIGCOMM","author":"Y Xie","year":"2008","unstructured":"Xie Y, Yu F, Achan K, Panigrahy R, Hulten G, Osipkov I (2008) Spamming botnets: signatures and characteristics. In: Bahl V, Wetherall D, Savage S, Stoica I (eds)SIGCOMM, 171\u2013182.. ACM, Seatle, WA."},{"key":"25_CR14","unstructured":"Fonseca O, Las-Casas PHB, Fazzion E, Guedes D, Jr. WM, Hoepers C, Steding-Jessen K, Chaves MHP (2014) Vizinhan\u00e7as ou condom\u00ednios: uma an\u00e1lise da origem de spams com base na organiza\u00e7\u00e3o de sistemas aut\u00f4nomos In: Brazilian Symposium on Computer Networks and Distributed Systems (SBRC) (In Portuguese), Florian\u00f3polis, Brazil."},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Fazzion E, Las-Casas PHB, Fonseca O, Guedes D, Jr. WM, Hoepers C, Steding-Jessen K, Chaves MHP (2014) Spambands: Uma metodologia para identifica\u00e7\u00e3o de fontes de spam agindo sob uma coordena\u00e7\u00e3o In: Brazilian Symposium on Information Security and Computer Systems (SBSeg) (In Portuguese), Belo Horizonte, Brazil.","DOI":"10.5753\/sbseg.2014.20136"},{"issue":"1","key":"25_CR16","first-page":"45","volume":"7","author":"K Steding-jessen","year":"2008","unstructured":"Steding-jessen K, Vijaykumar NL, Montes A (2008) Using Low-Interaction Honeypots to Study the Abuse of Open Proxies to Send Spam. INFOCOMP J Comput Sci 7(1): 45\u201353.","journal-title":"INFOCOMP J Comput Sci"},{"key":"25_CR17","unstructured":"Totti LC, Moreira REA, Fazzion E, Fonseca O, Wagner Meira J, Guedes D, Hoepers C, Steding-Jessen K, Chaves MHP (2012) Impacto da Evolu\u00e7\u00e3o Temporal na Detec\u00e7\u00e3o de Spammers na Rede de Origem In: SBRC 2012, Ouro Preto, Brasil."},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Almeida H, Guedes D, Meira W, Zaki MJ (2011) Is there a best quality metric for graph clusters? In: Proceedings of the 2011 European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I, 44\u201359, Athens, Greece.","DOI":"10.1007\/978-3-642-23780-5_13"},{"key":"25_CR19","unstructured":"Pelleg D, Moore AW (2000) X-means: Extending k-means with efficient estimation of the number of clusters In: ICML, 727\u2013734, San Francisco, CA."},{"key":"25_CR20","unstructured":"John JP, Moshchuk A, Gribble SD, Krishnamurthy A (2009) Studying Spamming Botnets Using Botlab In: 6th USENIX Symp. on Networked Systems Design and Implementation, Boston, EUA."}],"container-title":["Journal of Internet Services and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-015-0025-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13174-015-0025-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-015-0025-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-015-0025-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T21:53:44Z","timestamp":1691618024000},"score":1,"resource":{"primary":{"URL":"https:\/\/jisajournal.springeropen.com\/articles\/10.1186\/s13174-015-0025-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,11]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["25"],"URL":"https:\/\/doi.org\/10.1186\/s13174-015-0025-5","relation":{},"ISSN":["1867-4828","1869-0238"],"issn-type":[{"value":"1867-4828","type":"print"},{"value":"1869-0238","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,11]]},"assertion":[{"value":"17 September 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"9"}}