{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T21:04:20Z","timestamp":1649192660326},"reference-count":26,"publisher":"International Academy Publishing (IAP)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.8.4.860-867","type":"journal-article","created":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T17:39:22Z","timestamp":1364837962000},"source":"Crossref","is-referenced-by-count":0,"title":["Personalized E-mail Filtering System Based on Usage Control"],"prefix":"10.17706","volume":"8","author":[{"given":"Changda","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tingting","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Patricia","family":"Ghann","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,4,1]]},"reference":[{"issue":"No.6","key":"ref1","first-page":"52","article-title":"The invasion and defense of spam","author":"Gao","year":"2008","unstructured":"[2] Qian Gao. The invasion and defense of spam, Computer Security, 2008, No.6, pages: 52-53.","journal-title":"Comput Secur","ISSN":"http:\/\/id.crossref.org\/issn\/0167-4048","issn-type":"print"},{"issue":"No.1","key":"ref2","first-page":"256","article-title":"Overview of spam filtering technologies","volume":"7","author":"Yi","year":"2010","unstructured":"[3] Zhian Yi, Yan Mao. Overview of spam filtering technologies, Journal of Yangtze University (Nat Sci Edit), 2010, Vol.7, No.1, pages: 256-258.","journal-title":"Journal of Yangtze University"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.4.3.245-250"},{"key":"ref4","first-page":"2p","volume-title":"Proceedings of the fourth international conference on peer-to-peer computing","author":"Damiani","year":"2004","unstructured":"[6] Damiani E, De Capitni di Vimercati S, Paraboschi S, Samarati P. P2p-based collaborative spam detection and filtering. Proceedings of the fourth international conference on peer-to-peer computing (P2P' 04), IEEE Computer Society, 2004, pages: 176\u2013183."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1109\/DNSR.2004.1344731","article-title":"Adaptive filtering of spam","volume-title":"Proceedings of the Second Annual Conference on Communication Networks and Services Research","author":"Pelletier","year":"2004","unstructured":"[10] Pelletier L, Almhana J, Choulakian V. Adaptive filtering of spam, Proceedings of the Second Annual Conference on Communication Networks and Services Research. Fredericton, NB, Canada 19-21, May 2004, pages: 218-224."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381951"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.4.3.271-275"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCET.2009.170"},{"key":"ref9","first-page":"2209","article-title":"Spam Filtering by Stages","volume-title":"Proceedings of International Conference on Convergence Information Technology","author":"Ming","year":"2007","unstructured":"[18] Ming L, Yunchun L, Wei L. Spam Filtering by Stages, Proceedings of International Conference on Convergence Information Technology, 2007, pages: 2209-2213."},{"issue":"No.28","key":"ref10","first-page":"95","article-title":"A method of spam filtering based on SVM algorithm","volume":"44","author":"Fan","year":"2008","unstructured":"[19] Jieting Fan, Huicheng Lai. A method of spam filtering based on SVM algorithm, Computer Engineering and Applications, 2008, Vol.44, No.28, pages: 95-97.","journal-title":"Computer Engineering and Applications"},{"key":"ref11","article-title":"An email classification scheme based on decision-theoretic rough set theory and analysis of email security.","volume-title":"Proceedings of IEEE Region 10 Annual International Conference","year":"2007","unstructured":"[20] Wenqing Zhao and Zhu Yongli . An email classification scheme based on decision-theoretic rough set theory and analysis of email security. Proceedings of IEEE Region 10 Annual International Conference, Melbourne, Australia, 2007."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2007.173"},{"key":"ref13","first-page":"35","article-title":"A LVQ-based neural network anti-spam email approach","author":"Chuan","year":"2004","unstructured":"[23] Zhan Chuan, Lu Xianlinag, Hou Mengshu,et al. A LVQ-based neural network anti-spam email approach, ACM SIGOPS Operating Systems Review, 2004, pages: 35-39.","journal-title":"ACM SIGOPS Operating Syst Rev","ISSN":"http:\/\/id.crossref.org\/issn\/0163-5980","issn-type":"print"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1108906.1108908"},{"issue":"No.11","key":"ref16","first-page":"189","article-title":"Self-adaptable spam filtering based on Bayesian algorithm","volume":"24","author":"Ning","year":"2007","unstructured":"[26] Shaojun Ning, Hengming Zou. Self-adaptable spam filtering based on Bayesian algorithm, Computer Applications and Software, 2007, Vol.24, No.11, pages: 189-191.","journal-title":"Computer Applications and Software"},{"key":"ref16","unstructured":"[1] 12321 \"Network adverse Spam Report Reception Center\", 2010-06-13. http:\/\/www.12321.cn\/viewnews.php?id= 12858."},{"key":"ref16","unstructured":"[5] David Anderson. Statistical Spam Filtering, EECS595, Fall 2006."},{"key":"ref16","doi-asserted-by":"crossref","unstructured":"[7] Jung J, Sit E. An empirical study of spam traffic and the use of DNS black lists, Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004. Taormina, Sicily, Italy, October 2004, pages: 370-378.","DOI":"10.1145\/1028788.1028838"},{"key":"ref16","doi-asserted-by":"crossref","unstructured":"[8] Gomes L H, Cazita C, Almeida J, Almeida V, Meira Jr W. Characterizing a spam traffic, Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC, 2004, pages: 356-369.","DOI":"10.1145\/1028788.1028837"},{"key":"ref16","doi-asserted-by":"crossref","unstructured":"[9] Wang C-C, Chen S-Y. Using header session messages to anti-spamming, computers & security 2007, Vol.26, No.5, pages: 381-390.","DOI":"10.1016\/j.cose.2006.12.012"},{"key":"ref16","unstructured":"[12] Leiba B, Fenton J. Domain keys identified mail (DKIM): Using digital signatures for domain verification, Proceedings of the 4th Conference on Email and Anti-Spam (CEAS 2007)."},{"key":"ref16","unstructured":"[13] Fleizach C, Voelker G M, Savage S. Slicing spam with occam's razor, Proceedings of the 4th Conference on Email and Anti-Spam, CEAS 2007."},{"key":"ref16","unstructured":"[15] Begriche Y, Labiod H. A prior distribution for anti-spam statistical Bayesian model, N2S'09: International Conference on Network and service Security. IEEE Piscataway, NJ, 2009, pages: 1-5."},{"key":"ref16","unstructured":"[22] Carpinteiro OAS, Lima I, Assis JMC, de Souza ACZ, Moreira EM, Pinheiro CAM. A neural model in anti-spam systems, Proceedings of the 16th International Conference on Artificial Neural Networks, ICANN. 2006, Vol.4132, pages: 847-855."}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T12:31:13Z","timestamp":1562848273000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/8373"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":26,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2013,4,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.8.4.860-867","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}