{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:30:59Z","timestamp":1725795059111},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076911"},{"type":"electronic","value":"9783319076928"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07692-8_5","type":"book-chapter","created":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T12:19:57Z","timestamp":1401365997000},"page":"47-57","source":"Crossref","is-referenced-by-count":1,"title":["A New Binary Particle Swarm Optimization for Feature Subset Selection with Support Vector Machine"],"prefix":"10.1007","author":[{"given":"Amir Rajabi","family":"Behjat","sequence":"first","affiliation":[]},{"given":"Aida","family":"Mustapha","sequence":"additional","affiliation":[]},{"given":"Hossein","family":"Nezamabadi-Pour","sequence":"additional","affiliation":[]},{"given":"Md. Nasir","family":"Sulaiman","sequence":"additional","affiliation":[]},{"given":"Norwati","family":"Mustapha","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Miller, T.: Social Engineering: Techniques that can Bypass Intrusion Detection Systems, \n                  \n                    http:\/\/www.stillhq.com\/pdfdb\/000186\/data.pdf"},{"key":"5_CR2","unstructured":"Gorton, A.S., Champion, T.G.: Combining Evasion Techniques to Avoid Network Intrusion Detection Systems. Skaion (2004)"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.cose.2006.10.009","volume":"26","author":"R.C. Dodge","year":"2007","unstructured":"Dodge, R.C., Carver, C., Ferguson, A.J.: Phishing for User Security Awareness. Computers & Security\u00a026(1), 73\u201380 (2007)","journal-title":"Computers & Security"},{"key":"5_CR4","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/0-387-31163-7_6","volume-title":"Advances in Digital Forensics","author":"M. Hoeschele","year":"2005","unstructured":"Hoeschele, M., Rogers, M.: Detecting Social Engineering. In: Pollitt, M., Shenoi, S. (eds.) Advances in Digital Forensics. IFIP, vol.\u00a0194, pp. 67\u201377. Springer, Heidelberg (2005)"},{"key":"5_CR5","unstructured":"Ashish, T.: Social Engineering: An Attack Vector Most Intricate to Tackle. Technical Report, Infosecwriters (2007)"},{"key":"5_CR6","unstructured":"Olivo, C.K., Santin, A.O., Oliveira, L.S.: Obtaining the Threat Model for E-mail Ohishing. Applied Soft Computing (2011)"},{"issue":"2","key":"5_CR7","first-page":"139","volume":"14","author":"G. Ruan","year":"2010","unstructured":"Ruan, G., Tan, Y.: A Three-Layer Back-Propagation Neural Network for Spam Detection using Artificial Immune Concentration. Soft Computing-A Fusion of Foundations, Methodologies and Applications\u00a014(2), 139\u2013150 (2010)","journal-title":"Soft Computing-A Fusion of Foundations, Methodologies and Applications"},{"key":"5_CR8","volume-title":"Fundamentals of Computational Swarm Intelligence","author":"A.P. Engelbrecht","year":"2005","unstructured":"Engelbrecht, A.P.: Fundamentals of Computational Swarm Intelligence, vol.\u00a01. Wiley, London (2005)"},{"issue":"1","key":"5_CR9","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1016\/j.asoc.2009.12.007","volume":"11","author":"E.S.M. El-Alfy","year":"2011","unstructured":"El-Alfy, E.S.M., Abdel-Aal, R.E.: Using GMDH-based Networks for Improved Spam Detection and Email Feature Analysis. Applied Soft Computing\u00a011(1), 477\u2013488 (2011)","journal-title":"Applied Soft Computing"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Ma, L., Ofoghi, B., Watters, P., Brown, S.: Detecting Phishing Emails using Hybrid Features. In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 49\u2013497 (2009)","DOI":"10.1109\/UIC-ATC.2009.103"},{"issue":"11","key":"5_CR11","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1016\/j.infsof.2010.05.009","volume":"52","author":"A.L.I. Oliveira","year":"2010","unstructured":"Oliveira, A.L.I., Braga, P.L., Lima, R.M.F., Cornelio, M.L.: GA-based Method for Feature Selection and Parameters Optimization for Machine Learning Regression Applied to Software Effort Estimation. Information and Software Technology\u00a052(11), 1155\u20131166 (2010)","journal-title":"Information and Software Technology"},{"key":"5_CR12","unstructured":"Chandrasekaran, M., Narayanan, K., Upadhyaya, S.: Phishing Email Detection based on Structural Properties. In: NYS Cyber Security Conference, pp. 1\u20137 (2006)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Toolan, F., Carthy, J.: Phishing Detection using Classifier Ensembles. In: eCrime Researchers Summit, pp. 1\u20139 (2009)","DOI":"10.1109\/ECRIME.2009.5342607"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Sirisanyalak, B., Sornil, O.: Artificial Immunity-based Feature Extraction for Spam Detection. In: International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing, pp. 359\u2013364 (2007)","DOI":"10.1109\/SNPD.2007.528"},{"key":"5_CR15","first-page":"165","volume-title":"Particle Swarm Optimization-aided Feature Selection for Spam Email Classification","author":"C.H. Lai","year":"2007","unstructured":"Lai, C.H.: Particle Swarm Optimization-aided Feature Selection for Spam Email Classification, p. 165. IEEE, Kumamoto (2007)"},{"issue":"1","key":"5_CR16","first-page":"51","volume":"2","author":"R.M. Ramadan","year":"2009","unstructured":"Ramadan, R.M., Abdel-Kader, R.F.: Face Recognition using Particle Swarm Optimization-based Selected Features. International Journal of Signal Processing, Image Processing and Pattern Recognition\u00a02(1), 51\u201366 (2009)","journal-title":"International Journal of Signal Processing, Image Processing and Pattern Recognition"},{"key":"5_CR17","unstructured":"Guyon, I., Matic, N., Vapnik, V.: Discovering Informative Patterns and Data Cleaning. In: KDD Workshop, pp. 145\u2013156 (1994)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Chen, J., Guo, C.: Online Detection and Prevention of Phishing Attacks. In: 1st Int. Conference on Communications and Networking, pp. 1\u20137 (2006)","DOI":"10.1109\/CHINACOM.2006.344718"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Sung, A.: Significant Feature Selection using Computational Intelligent Techniques for Intrusion Detection. In: Advanced Methods for Knowledge Discovery from Complex Data, pp. 285\u2013306 (2005)","DOI":"10.1007\/1-84628-284-5_11"},{"issue":"3","key":"5_CR20","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TIE.2010.2052533","volume":"58","author":"F. Macia-Perez","year":"2011","unstructured":"Macia-Perez, F., Mora-Gimeno, F., Marcos-Jorquera, D., Gil-Martinez-Abarca, J.A., Ramos-Morillo, H., Lorenzo-Fonseca, I.: Network Intrusion Detection System Embedded on a Smart Sensor. IEEE Transactions on Industrial Electronics\u00a058(3), 722\u2013732 (2011)","journal-title":"IEEE Transactions on Industrial Electronics"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances on Soft Computing and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07692-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T19:27:06Z","timestamp":1558898826000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07692-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076911","9783319076928"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07692-8_5","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}