{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:42:13Z","timestamp":1753922533750,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,2,7]]},"DOI":"10.23919\/icact51234.2021.9370939","type":"proceedings-article","created":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T21:59:49Z","timestamp":1615413589000},"page":"387-391","source":"Crossref","is-referenced-by-count":5,"title":["Intelligent Blacklist Security System for Protecting Spammer in Corporate Email Solution: A Case of Corporate Email Service Provider in Thailand"],"prefix":"10.23919","author":[{"given":"Rattanachai","family":"Wongwatkit","sequence":"first","affiliation":[]},{"given":"Montree","family":"Raktham","sequence":"additional","affiliation":[]},{"given":"Thanadet","family":"Phawananthaphuti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"99","article-title":"Detection and Spam Mail Filtering Approach","author":"agrawal","year":"0","journal-title":"2016 Third International Conference on Digital Information Processing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2663333"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.08.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2702187"},{"key":"ref11","first-page":"613","article-title":"A longitudinal and comprehensive study of the DANE ecosystem in email","author":"lee","year":"0","journal-title":"Proc 29th USENIX Secur Symp"},{"key":"ref5","volume":"239","author":"wang","year":"2018","journal-title":"Hiding fast flux botnet in plain email sight"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.11.040"},{"key":"ref8","volume":"53","author":"gangavarapu","year":"2020","journal-title":"Applicability of machine learning in spam and phishing email filtering review and approaches"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e01802"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-6457-4"},{"key":"ref9","article-title":"Reputation Network Analysis for Email Filtering","author":"golbeck","year":"0","journal-title":"Proc 1st Conf Email Anti-Spam"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00420.x"}],"event":{"name":"2021 23rd International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2021,2,7]]},"location":"PyeongChang, Korea (South)","end":{"date-parts":[[2021,2,10]]}},"container-title":["2021 23rd International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9370342\/9370365\/09370939.pdf?arnumber=9370939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T21:23:43Z","timestamp":1620768223000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9370939\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,7]]},"references-count":12,"URL":"https:\/\/doi.org\/10.23919\/icact51234.2021.9370939","relation":{},"subject":[],"published":{"date-parts":[[2021,2,7]]}}}