{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T19:46:58Z","timestamp":1778010418800,"version":"3.51.4"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030963040","type":"print"},{"value":"9783030963057","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96305-7_10","type":"book-chapter","created":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T11:06:50Z","timestamp":1646305610000},"page":"106-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Spam Filtering of\u00a0Mobile SMS Using CNN\u2013LSTM Based Deep Learning Model"],"prefix":"10.1007","author":[{"given":"Syed Md. Minhaz","family":"Hossain","sequence":"first","affiliation":[]},{"given":"Jayed Akbar","family":"Sumon","sequence":"additional","affiliation":[]},{"given":"Anik","family":"Sen","sequence":"additional","affiliation":[]},{"given":"Md.\u00a0Iftaker","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Khaleque Md. Aashiq","family":"Kamal","sequence":"additional","affiliation":[]},{"given":"Hamed","family":"Alqahtani","sequence":"additional","affiliation":[]},{"given":"Iqbal H.","family":"Sarker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,4]]},"reference":[{"issue":"6","key":"10_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00815-1","volume":"2","author":"IH Sarker","year":"2021","unstructured":"Sarker, I.H.: Deep learning: a comprehensive overview on techniques, taxonomy, applications and research directions. SN Comput. Sci. 2(6), 1\u201320 (2021)","journal-title":"SN Comput. Sci."},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"100393","DOI":"10.1016\/j.iot.2021.100393","volume":"14","author":"IH Sarker","year":"2021","unstructured":"Sarker, I.H.: CyberLearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet Things 14, 100393 (2021)","journal-title":"Internet Things"},{"key":"10_CR3","unstructured":"Morreale, M.: Daily SMS Mobile Usage Statistics (2017). https:\/\/www.smseagle.eu\/2017\/03\/06\/daily-sms-mobile-statistics\/, Accessed 15 June 2020"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1016\/j.future.2019.09.001","volume":"102","author":"PK Roy","year":"2020","unstructured":"Roy, P.K., Singh, J.P., Banerjee, S.: Deep learning to filter SMS Spam. Future Gener. Comput. Syst. 102, 524\u2013533 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"10_CR5","unstructured":"Tatango. Text Message Spam Infographic (2011). https:\/\/www.tatango.com\/blog\/textmessage-spam-infographic\/, Accessed 15 June 2020"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.cose.2017.12.006","volume":"73","author":"D Goel","year":"2018","unstructured":"Goel, D., Jain, A.K.: Mobile phishing attacks and defence mechanisms: state of art and open research challenges. Comput. Secur. 73, 519\u2013544 (2018)","journal-title":"Comput. Secur."},{"key":"10_CR7","first-page":"21","volume":"12","author":"AK Jain","year":"2020","unstructured":"Jain, A.K., Yadav, S.K., Choudhary, N.: A novel approach to detect spam and smishing SMS using machine learning techniques. IJESMA 12, 21\u201338 (2020)","journal-title":"IJESMA"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1016\/j.future.2020.03.021","volume":"108","author":"S Mishra","year":"2020","unstructured":"Mishra, S., Soni, D.: Smishing detector: a security model to detect smishing through SMS content analysis and URL behavior analysis. Future Gener. Comput. Syst. 108, 803\u2013815 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"10_CR9","unstructured":"Zhou, C., Sun, C., Liu, Z., Lau, F.C.M.: A C-LSTM neural network for text classification. arXiv arXiv:cs.CL\/1511.08630 (2015)"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s11235-016-0269-9","volume":"66","author":"JW Joo","year":"2017","unstructured":"Joo, J.W., Moon, S.Y., Singh, S., Park, J.H.: S-Detector: an enhanced security model for detecting Smishing attack for mobile computing. Telecommun. Syst. 66, 29\u201338 (2017)","journal-title":"Telecommun. Syst."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Arifin, D.D., Bijaksana, M.A.: Enhancing spam detection on mobile phone Short Message Service (SMS) performance using FP-growth and Naive Bayes Classifier. In: Proceedings of the 2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), Bandung, Indonesia, 13\u201315 September 2016, pp. 80\u201384 (2016)","DOI":"10.1109\/APWiMob.2016.7811442"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1093\/comjnl\/bxy039","volume":"61","author":"G Sonowal","year":"2018","unstructured":"Sonowal, G., Kuppusamy, K.S.: SmiDCA: an anti-smishing model with machine learning approach. Comput. J. 61, 1143\u20131157 (2018)","journal-title":"Comput. J."},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"17","DOI":"10.4018\/JITR.2019040102","volume":"12","author":"AK Jain","year":"2019","unstructured":"Jain, A.K., Gupta, B.B.: Feature based approach for detection of smishing messages in the mobile environment. J. Inf. Technol. Res. 12, 17\u201335 (2019)","journal-title":"J. Inf. Technol. Res."},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1016\/j.procs.2017.12.079","volume":"125","author":"AK Jain","year":"2018","unstructured":"Jain, A.K., Gupta, B.: Rule-based framework for detection of smishing messages in mobile environment. Procedia Comput. Sci. 125, 617\u2013623 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.knosys.2016.05.001","volume":"108","author":"TA Almeida","year":"2016","unstructured":"Almeida, T.A., Silva, T.P., Santos, I., Hidalgo, J.M.G.: Text normalization and semantic indexing to enhance Instant Messaging and SMS spam filtering. Knowl. Based Syst. 108, 25\u201332 (2016)","journal-title":"Knowl. Based Syst."},{"key":"10_CR16","unstructured":"SMS Spam Collection Dataset. https:\/\/www.kaggle.com\/uciml\/sms-spam-collection-dataset, Accessed 28 Feb 2020"}],"container-title":["Lecture Notes in Networks and Systems","Hybrid Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96305-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T18:25:52Z","timestamp":1726770352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96305-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030963040","9783030963057"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96305-7_10","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"his2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/his21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}