{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:40:32Z","timestamp":1729672832738,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/spw.2013.15","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T21:07:43Z","timestamp":1374786463000},"page":"143-150","source":"Crossref","is-referenced-by-count":8,"title":["Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations"],"prefix":"10.1109","author":[{"given":"Jelena","family":"Isacenkova","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Thonnard","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Costin","sequence":"additional","affiliation":[]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[]},{"given":"Aurelien","family":"Francillon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030395"},{"journal-title":"419 Scam Exploits of the Nigerian Con Man","year":"2006","author":"tive","key":"14"},{"journal-title":"A Multi-criteria Clustering Approach to Support Attack Attribution in Cyberspace","year":"2010","author":"thonnard","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_4"},{"journal-title":"Spamscatter Characterizing Internet Scam Hosting Infrastructure","year":"2007","author":"anderson","key":"3"},{"year":"0","key":"2","article-title":"Method and system for employing phone number analysis to detect and prevent spam and e-mail scams"},{"journal-title":"419 Scam Fake Lottery Fraud Phone Directory","year":"0","key":"1"},{"key":"10","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/1897852.1897872","article-title":"Understanding scam victims: Seven principles for systems security","volume":"54","author":"stajano","year":"2011","journal-title":"Commun ACM"},{"key":"7","first-page":"161","article-title":"Knowledge-based information extraction: A case study of recognizing emails of nigerian frauds","author":"gao","year":"2005","journal-title":"NLDB'05"},{"key":"6","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/978-3-642-15512-3_23","article-title":"An Analysis of Rogue AV Campaigns","author":"cova","year":"2010","journal-title":"Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection RAID'10"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596056"},{"key":"4","article-title":"Investigating and Prosecuting Nigerian Fraud","author":"buchanan","year":"2001","journal-title":"High Tech and Investment Fraud"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555352"},{"key":"8","first-page":"235","article-title":"Nigerian advance fee fraud in transnational perspective","author":"oboh","year":"2010","journal-title":"Policing Multiple Communities"}],"event":{"name":"2013 IEEE CS Security and Privacy Workshops (SPW2013)","start":{"date-parts":[[2013,5,23]]},"location":"San Francisco, CA","end":{"date-parts":[[2013,5,24]]}},"container-title":["2013 IEEE Security and Privacy Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6564486\/6565207\/06565243.pdf?arnumber=6565243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:51:29Z","timestamp":1498063889000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6565243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/spw.2013.15","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}