{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T13:51:57Z","timestamp":1698846717044},"reference-count":0,"publisher":"Faculty of Electrical Engineering and Computing, Univ. of Zagreb","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CIT"],"published-print":{"date-parts":[[2007]]},"DOI":"10.2498\/cit.1000984","type":"journal-article","created":{"date-parts":[[2007,2,8]],"date-time":"2007-02-08T12:21:43Z","timestamp":1170937303000},"page":"161","source":"Crossref","is-referenced-by-count":7,"title":["Suspicious E-mail Detection via Decision Tree: A Data Mining Approach"],"prefix":"10.20532","volume":"15","author":[{"given":"Appavu","family":"Balamurugan","sequence":"first","affiliation":[]},{"given":"Ramasamy","family":"Rajaram","sequence":"additional","affiliation":[]}],"member":"8460","container-title":["Journal of Computing and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/cit.fer.hr\/index.php\/CIT\/article\/view\/1636\/1340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T15:23:20Z","timestamp":1481556200000},"score":1,"resource":{"primary":{"URL":"http:\/\/cit.srce.unizg.hr\/index.php\/CIT\/article\/view\/1636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,6]]}},"URL":"https:\/\/doi.org\/10.2498\/cit.1000984","relation":{},"ISSN":["1330-1136","1846-3908"],"issn-type":[{"value":"1330-1136","type":"print"},{"value":"1846-3908","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007]]}}}