{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T22:28:25Z","timestamp":1769552905988,"version":"3.49.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,13]]},"DOI":"10.23919\/icact53585.2022.9728878","type":"proceedings-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T20:27:02Z","timestamp":1647030422000},"page":"387-391","source":"Crossref","is-referenced-by-count":2,"title":["Intelligent Blacklist Security System for Protecting Spammer in Corporate Email Solution: A Case of Corporate Email Service Provider in Thailand"],"prefix":"10.23919","author":[{"given":"Rattanachai","family":"Wongwatkit","sequence":"first","affiliation":[{"name":"Technology Land Co., Ltd.,Bangkok,Thailand"}]},{"given":"Montree","family":"Raktham","sequence":"additional","affiliation":[{"name":"Technology Land Co., Ltd.,Bangkok,Thailand"}]},{"given":"Thanadet","family":"Phawananthaphuti","sequence":"additional","affiliation":[{"name":"Technology Land Co., Ltd.,Bangkok,Thailand"}]}],"member":"263","reference":[{"key":"ref4","first-page":"99","article-title":"Detection and Spam Mail Filtering Approach","author":"agrawal","year":"2016","journal-title":"2016 Third International Conference on Digital Information Processing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2663333"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.08.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2702187"},{"key":"ref11","first-page":"613","article-title":"A longitudinal and comprehensive study of the DANE ecosystem in email","volume":"3","author":"lee","year":"2020","journal-title":"Proc 29th USENIX Secur Symp"},{"key":"ref5","volume":"239","author":"wang","year":"2018","journal-title":"Hiding fast flux botnet in plain email sight"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.11.040"},{"key":"ref8","volume":"53","author":"gangavarapu","year":"2020","journal-title":"Applicability of machine learning in spam and phishing email filtering review and approaches"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e01802"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-6457-4"},{"key":"ref9","article-title":"Reputation Network Analysis for Email Filtering","author":"golbeck","year":"2004","journal-title":"Proc 1st Conf Email Anti-Spam"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00420.x"}],"event":{"name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","location":"PyeongChang Kwangwoon_Do, Korea, Republic of","start":{"date-parts":[[2022,2,13]]},"end":{"date-parts":[[2022,2,16]]}},"container-title":["2022 24th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9728250\/9728768\/09728878.pdf?arnumber=9728878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T21:29:16Z","timestamp":1653341356000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9728878\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,13]]},"references-count":12,"URL":"https:\/\/doi.org\/10.23919\/icact53585.2022.9728878","relation":{},"subject":[],"published":{"date-parts":[[2022,2,13]]}}}