{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:08:24Z","timestamp":1767337704772},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030335847"},{"type":"electronic","value":"9783030335854"}],"license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33585-4_57","type":"book-chapter","created":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T16:03:38Z","timestamp":1572105818000},"page":"581-590","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Automatic Detection of Suspicious Bangla Text Using Logistic Regression"],"prefix":"10.1007","author":[{"given":"Omar","family":"Sharif","sequence":"first","affiliation":[]},{"given":"Mohammed Moshiul","family":"Hoque","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"57_CR1","unstructured":"The Daily Jugantor. \n                  www.jugantor.com\/"},{"key":"57_CR2","unstructured":"The Daily Kaler Kantho. \n                  http:\/\/www.kalerkantho.com\/"},{"key":"57_CR3","unstructured":"Dhormockery Blog. \n                  https:\/\/www.dhormockery.com\/"},{"key":"57_CR4","unstructured":"Facebook Page Basher Kella. \n                  https:\/\/www.facebook.com\/basherkellanews\/"},{"key":"57_CR5","unstructured":"Istishoner Blog. \n                  www.istishon.com\/"},{"key":"57_CR6","unstructured":"Open Source Bengali Corpus. \n                  https:\/\/scdnlab.com\/corpus\/"},{"key":"57_CR7","unstructured":"U.S Department of Homeland Security. \n                  https:\/\/www.dhs.gov\/see-something-say-something\/what-suspicious-activity"},{"key":"57_CR8","doi-asserted-by":"crossref","unstructured":"Ahmad, A., Amin, M.R.: Bengali word embedding and it\u2019s application in solving document classification problem. In: International Conference Computer and Information Technology, pp. 425\u2013430. IEEE (2016)","DOI":"10.1109\/ICCITECHN.2016.7860236"},{"key":"57_CR9","unstructured":"Alami, S., Beqali, O.: Detecting suspicious profiles using text analysis within social media. J. Theor. Appl. Inf. Technol. 73(3) (2015)"},{"issue":"2","key":"57_CR10","first-page":"124","volume":"2","author":"S Alsaleem","year":"2011","unstructured":"Alsaleem, S., et al.: Automated arabic text categorization using SVM and NB. Int. Arab J. e-Technol. 2(2), 124\u2013128 (2011)","journal-title":"Int. Arab J. e-Technol."},{"key":"57_CR11","doi-asserted-by":"crossref","unstructured":"Chavan, G.S., Manjare, S., Hegde, P., Sankhe, A.: A survey of various machine learning techniques for text classification. Int. J. Eng. Trends Tech. 15(6) (2014)","DOI":"10.14445\/22315381\/IJETT-V15P255"},{"key":"57_CR12","doi-asserted-by":"crossref","unstructured":"Chy, A.N., Seddiqui, M.H., Das, S.: Bangla news classification using naive Bayes classifier. In: International Conference on Computer and Information Technology, pp. 366\u2013371. IEEE (2014)","DOI":"10.1109\/ICCITechn.2014.6997369"},{"key":"57_CR13","doi-asserted-by":"crossref","unstructured":"Harisinghaney, A., Dixit, A., Gupta, S., Arora, A.: Text and image based spam email classification using KNN, Na\u00efve Bayes and reverse DBSCAN algorithm. In: International Conference on Optimization, Reliability, and Information Technology, pp. 153\u2013155. IEEE (2014)","DOI":"10.1109\/ICROIT.2014.6798302"},{"key":"57_CR14","doi-asserted-by":"crossref","unstructured":"Hossain, M.R., Hoque, M.M.: Automatic Bengali document categorization based on word embedding and statistical learning approaches. In: International Conference on Computer, Communication, Chemical, Material and Electronic Engineering, pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/IC4ME2.2018.8465632"},{"key":"57_CR15","doi-asserted-by":"crossref","unstructured":"Ismail, S., Rahman, M.S.: Bangla word clustering based on n-gram language model. In: International Conference on Electrical Engineering and Information and Communication Technology, pp. 1\u20135. IEEE (2014)","DOI":"10.1109\/ICEEICT.2014.6919083"},{"key":"57_CR16","unstructured":"Jong, Y.Y., Dongmin, Y.: Classification scheme of unstructured text document using TF-IDF and naive Bayes classifier. In: Computer and Computing Science"},{"key":"57_CR17","doi-asserted-by":"crossref","unstructured":"Kaya, M., Fidan, G., Toroslu, I.H.: Sentiment analysis of Turkish political news. In: IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology, pp. 174\u2013180. IEEE Computer Society (2012)","DOI":"10.1109\/WI-IAT.2012.115"},{"key":"57_CR18","doi-asserted-by":"crossref","unstructured":"Krendzelak, M., Jakab, F.: Text categorization with machine learning and hierarchical structures. In: International Conference on Emerging eLearning Technologies and Applications, pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/ICETA.2015.7558486"},{"key":"57_CR19","doi-asserted-by":"crossref","unstructured":"Nizamani, S., Memon, N., Wiil, U.K., Karampelas, P.: Modeling suspicious email detection using enhanced feature selection. arXiv preprint \n                  arXiv:1312.1971\n                  \n                 (2013)","DOI":"10.7763\/IJMO.2012.V2.146"},{"key":"57_CR20","doi-asserted-by":"crossref","unstructured":"Sharma, M., Zhuang, D., Bilgic, M.: Active learning with rationales for text classification. In: Conference of the North American Chapter of the ACL: Human Language Technologies, pp. 441\u2013451 (2015)","DOI":"10.3115\/v1\/N15-1047"},{"issue":"1","key":"57_CR21","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1515\/jaiscr-2017-0005","volume":"7","author":"T Villmann","year":"2017","unstructured":"Villmann, T., Bohnsack, A., Kaden, M.: Can learning vector quantization be an alternative to SVM and deep learning? - recent trends and advanced variants of learning vector quantization for classification learning. J. Artif. Intell. Soft Comput. Res. 7(1), 65\u201381 (2017)","journal-title":"J. Artif. Intell. Soft Comput. Res."},{"key":"57_CR22","doi-asserted-by":"publisher","first-page":"55","DOI":"10.4236\/jsea.2012.512B012","volume":"5","author":"L Wei","year":"2012","unstructured":"Wei, L., Wei, B., Wang, B.: Text classification using support vector machine with mixture of kernel. J. Softw. Eng. Appl. 5, 55 (2012)","journal-title":"J. Softw. Eng. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing and Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33585-4_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T16:10:50Z","timestamp":1572106250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33585-4_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"ISBN":["9783030335847","9783030335854"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33585-4_57","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"27 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing & Optimization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Koh Samui","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ico0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}