{"60648":{"#nid":"60648","#data":{"type":"news","title":"Watching the Suspicious Behavior of Spam","body":"","field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EFor years, network operators have fought spam by examining what messages say. Nick \u0026shy;Feamster (CS), a member of Technology Review\u0027s TR35 for 2010, had a better idea. \u003Cem\u003ESource: Technology Review\u003C\/em\u003E\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":"","uid":"27174","created_gmt":"2010-08-27 11:30:52","changed_gmt":"2016-10-08 03:07:19","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2010-08-27T00:00:00-04:00","iso_date":"2010-08-27T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"related_links":[{"url":"http:\/\/www.technologyreview.com\/TR35\/Profile.aspx?Cand=T\u0026TRID=958","title":"http:\/\/www.technologyreview.com\/TR35\/Profile.aspx?..."}],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}