{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部分”:[[2023,10,7]],“日期-时间”:“2023-10-07T01:49:00Z”,“时间戳”:1696643340572},“发布者位置”:“美国纽约州纽约市”,“引用-计数”:14,“发布商”:“ACM”,“内容-域”:[“dl.ACM.org”],“交叉标记-striction“:true},”short-container-title“(限制):[],“published-print”:{“date-parts”:[[2013,8,25]]},“DOI”:“10.1145\/2492517.2500271”,“type”:“proceedings-article”,“created”:{“date-ports”:[2014,14]],“date-time”:“2014-01-14T13:40:06Z”,“timestamp”:1389706806000},《update-policy》:“http://\/dx.DOI.org\/10.1145\/crossmark-policy”,“source”:“Crossref”,“is-referenced-by-count”:6,“title”:[“识别荷兰推文中威胁的浅解析”],“前缀”:“10.1145”,“作者”:[{“given”:“Nelleke”,“family”:“Oostdijk”,“sequence”:“first”,“affiliation”:[}“name”:“Radboud University Nijmegen,Nijmegen,The Netherlands”}]},{“fixed”::“荷兰奈梅亨Radboud University Nijmegen”}]}],“member”:“320”,“published-on-line”:{“date-parts”:[[2013,8,25]]},“reference”:[{“key”:“e_1_3_2_1_1_1”,“unstructured”:“Alias-I”用于使用计算语言学处理文本的Lingpipe工具包\“http://Alias-I.com\/Lingpipe上次访问时间2013。Alias-I \“使用计算语言学处理文本的Lingpipe工具箱\”http://\/Alias-I.com/Lingpipe Last accessed 2013.“},{”key“:”e_1_3_2_1_2_1“,”doi-asserted-by“:”publisher“,“doi”:”10.2991\/itmr.2013.3.1.4“}”,{“key”:“e_3_2_3_1”,“unstructured”:“《国际信息技术杂志》2008 14 2使用Ad Infinium算法自动挖掘威胁电子邮件“},{“key”:“e_1_3_2_4_1”,“doi断言”:“publisher”,“doi”:“10.1109\/EASIC.2011.41”},{“key”:“e_1_3_2_5_1”,“volume title”:“Int.Conf.Information Technologies and Security ITSEC”,“author”:“Bouma H.”,“year”:“2012”},{key“:”e_1_3_2_1_6_1“,”非结构化“:”加拿大刑法。http://www.rcmp-grc.gc.ca\/qc\/pub\/cybercrime\/cybercrime-eng.htm加拿大刑法。http://www.rcmp-grc.gc.ca\/qc\/pub\/cybercrime\/cyber-cirme-eng.htm“},{“key”:“e_1_3_2_1_7_1”,“volume-title”:“文本挖掘——应用和理论”,“author”:“Kontostathis A.”,“year”:“2010”},“key“:”:“e_1_3_2_1_8_1“,”volume-title“:”2012年10月24日。http://\/articles.latimes.com/2012\/oct\/24\/business\/la-fi-tn-twitter-secret-service-threats-20121024“,“作者”:“Nelson L.J.”},{“问题”:“4”,“密钥”:“e_1_3_2_1_9_1”,“article-title”:“使用增强的特征选择建模可疑电子邮件检测”,“卷”:“2”,“作者“:”:“Nizamani S.”,”年“:“2012”,“日志标题”:“国际J。建模与优化“},{“key”:“e_1_3_2_1_10_1”,“doi-asserted-by”:“publisher”,”doi“:”10.1007\/978-3642-37256-8_16“}”,{”key“:”e_1_ 3_2_11_1“,”volume-title“:”Springer“,”author“:”V.S.“,”year“:”2013“}法律词典。精选布莱克法律词典免费在线法律词典第二版。http://thelawdictionary.org//search2\/?cx=partner-pub-4620319056007131%3A7293005414&cof=FORID%3A11&ie=UTF-8&q=threat&x=6&y=6法律词典。精选Black’s Law Dictionary免费在线法律词典第二版。http://thelawdictionary.org//search2\/?cx=partner-pub-4620319056007131%3A7293005414&cof=FORID%3A11&ie=UTF-8&q=威胁&x=6&y=6“},{“key”:“e_1_3_2_13_1”,“首页”:“2”,“文章标题”:“Het Gebruik van Twitter voor Taalkundig Onderzoek”,《卷》:“39”,“作者”:“Tjong Kim Sang e.”,“年份”:“2011”,“新闻标题”:chap“},{”key“:”e_1_3_2_1_14_1“,”volume-title“:”硕士论文TU Eindhoven The Netherlands“,”author“:”Tromp E.“,”year“:”2011“}],”event“:”{“name”:“ASONAM’13:Advances in Social Networks Analysis and Mining 2013”,”location“:”Niagara Ontario Canada“,”缩写“:”ASONAM‘13“,”赞助商“:[”SIGKDD ACM Special Interest Group on Knowledge Discovery in Data“,”IEEE CS“]},”container-title“:[“”2013 IEEE\/ACM社会网络分析和挖掘进展国际会议论文集“],“original-title”:[],“link”:[{“URL”:“https:\/\/dl.ACM.org\/doi\/pdf\/10.1145\/2492517.2500271”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2023,1,5]],“date-time“:”2023-01-05T18:16:11Z“,”timestamp“:1672942571000},”score“:1,”resource“:{主要”:{“URL”:“https:\/\/dl.acm.org\/doi\/10.1145\/2492517.2500271”}},“副标题”:[],“短标题”:[],“已发布”:{“日期部分”:[[2013,8,25]]},(references-count):14,“alternative-id”:[“10.1145\/24925617.2500271]271“,”10.1145\/2492517“],”URL“:”http://\/dx.doi.org\/10.1145\/2492517.2500271“,”关系“:{},”主题“:[],”发布“:{”日期部分“:[[2013,8,25]]},“断言”:[{”值“:”2013-08-25“,”顺序“:2,”名称“:”发布“,”标签“:”已发布“,“组”:{“名称”:“publication_history”,“标签”:“发布历史”}}}}