{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:07:27Z","timestamp":1725469647910},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540372776"},{"type":"electronic","value":"9783540372820"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11816102_71","type":"book-chapter","created":{"date-parts":[[2006,8,31]],"date-time":"2006-08-31T12:43:03Z","timestamp":1157028183000},"page":"672-681","source":"Crossref","is-referenced-by-count":0,"title":["NASC: A Novel Approach for Spam Classification"],"prefix":"10.1007","author":[{"given":"Gang","family":"Liang","sequence":"first","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Yaping","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiancheng","family":"Ni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"71_CR1","unstructured":"Crawford, E., Kay, J., McCreath, E.: IEMS \u2013 The Intelligent Email Sorter. In: Proc. of the Nineteenth International Conference on Machine Learning, Sydney, Australia (2002)"},{"key":"71_CR2","unstructured":"Brutlag, J.D., Meek, C.: Challenge of the E-mail Domain for Text Classification. In: International Conference on Machine Learning, pp. 103\u2013110 (2000)"},{"key":"71_CR3","doi-asserted-by":"crossref","unstructured":"Liu, B., Ma, Y., Yu, P.S.: Discovering unexpected information from your competitors\u2019 web sites. In: Proc. of the Seventh International Conference on Knowledge Discovery and Data Mining, San Francisco, USA (2001)","DOI":"10.1145\/502512.502534"},{"key":"71_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45571-X_48","volume-title":"Knowledge Discovery and Data Mining. Current Issues and New Applications","author":"Y. Diao","year":"2000","unstructured":"Diao, Y., Lu, H., Wu, D.: A Comparative Study of Classification Based Personal E-mail Filtering. In: Terano, T., Chen, A.L.P. (eds.) PAKDD 2000. LNCS, vol.\u00a01805, Springer, Heidelberg (2000)"},{"key":"71_CR5","unstructured":"Li, T.: Compute immunology, Publishing House of Electronics Industry, Beijing (2004)"},{"key":"71_CR6","doi-asserted-by":"crossref","unstructured":"Salton, G., Wong, A., Yang, C.S.: A vector space model for automatic indexing. Communications of the ACM, 613\u2013620 (1975)","DOI":"10.1145\/361219.361220"},{"key":"71_CR7","doi-asserted-by":"crossref","unstructured":"Lee, D.L., Chuang, H.: Document Ranking and the Vector-space model. IEEE Software, 67\u201375 (1997)","DOI":"10.1109\/52.582976"},{"key":"71_CR8","first-page":"11","volume":"33","author":"S. Fabrizio","year":"2002","unstructured":"Fabrizio, S.: Machine learning in automated text categorization. ACM Computing Surveys\u00a033, 11\u201312 (2002)","journal-title":"ACM Computing Surveys"},{"issue":"4","key":"71_CR9","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/1039621.1039625","volume":"3","author":"L. Zhang","year":"2004","unstructured":"Zhang, L., Zhu, J., Yao, T.: An Evaluation of Statistical Spam Filtering Techinques. ACM Transactions on Asian Language Information Processing (TALIP)\u00a03(4), 243\u2013269 (2004)","journal-title":"ACM Transactions on Asian Language Information Processing (TALIP)"},{"key":"71_CR10","doi-asserted-by":"crossref","unstructured":"Schneider, K.M.: A Comparison of Event Models for Naive Bayes Anti-Spam E-Mail Filtering. In: Pmc. 11th Conf. Euro, Chop. ACL, Budapest, Hungary (2003)","DOI":"10.3115\/1067807.1067848"},{"key":"71_CR11","series-title":"Lecture Notes in Computer Science","first-page":"72","volume-title":"A New Model for Dynamic Intrusion Detection","author":"T. Li","year":"2005","unstructured":"Li, T.: A New Model for Dynamic Intrusion Detection. LNCS, pp. 72\u201384. Springer, Berlin, Heidelberg, New York (2005)"},{"key":"71_CR12","doi-asserted-by":"crossref","unstructured":"Li, T.: An immune based dynamic intrusion detection model. Chinese Science Bulletin, 2650\u20132657 (2005)","DOI":"10.1007\/BF03183665"},{"key":"71_CR13","doi-asserted-by":"crossref","unstructured":"Li, T.: An immunity based network security risk estimation. Science in China Ser. F Information Sciences, 557\u2013578 (2005)","DOI":"10.1360\/04yf0140"},{"key":"71_CR14","series-title":"Lecture Notes in Computer Science","first-page":"59","volume-title":"An Immune-Based Model for Computer Virus Detection","author":"T. Li","year":"2005","unstructured":"Li, T.: An Immune-Based Model for Computer Virus Detection. LNCS, pp. 59\u201371. Springer, Berlin, Heidelberg, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Bioinformatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11816102_71.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:15:11Z","timestamp":1605626111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11816102_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540372776","9783540372820"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11816102_71","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}