<node id="68610">
  <nid>68610</nid>
  <type>external_news</type>
  <uid>
    <user id="27345"><![CDATA[27345]]></user>
  </uid>
  <created>1309286406</created>
  <changed>1475893499</changed>
  <title><![CDATA[Watching the Suspicious Behavior of Spam]]></title>
  <body><![CDATA[<p>For years, network operators have fought spam by examining what messages say. Nick &shy;Feamster (CS), a member of Technology Review's TR35 for 2010, had a better idea.<em>Source: Technology Review</em></p>]]></body>
  <field_article_url>
    <item>
      <url><![CDATA[http://www.technologyreview.com/TR35/Profile.aspx?Cand=T&amp;TRID=958]]></url>
      <title><![CDATA[]]></title>
    </item>
  </field_article_url>
  <field_publication>
    <item>
      <value><![CDATA[ CREST D-Map ]]></value>
    </item>
  </field_publication>
  <field_dateline>
    <item>
      <value>2010-08-27</value>
      <timezone></timezone>
    </item>
  </field_dateline>
  <field_media>
        </field_media>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
    <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
