{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:21:30Z","timestamp":1743009690329,"version":"3.40.3"},"publisher-location":"Cham","reference-count":60,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319336206"},{"type":"electronic","value":"9783319336220"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/2.5"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33622-0_36","type":"book-chapter","created":{"date-parts":[[2016,4,20]],"date-time":"2016-04-20T14:42:39Z","timestamp":1461163359000},"page":"399-411","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SPAM Detection: Na\u00efve Bayesian Classification and RPN Expression-Based LGP Approaches Compared"],"prefix":"10.1007","author":[{"given":"Clyde","family":"Meli","sequence":"first","affiliation":[]},{"given":"Zuzana Kominkova","family":"Oplatkova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,21]]},"reference":[{"key":"36_CR1","unstructured":"Cohen, W.: Learning rules that classify e-mail. In: Papers from the AAAI Spring Symposium on Machine Learning in Information Access, pp. 18\u201325. AAAI Press"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Clack, C., Farringdon, J., Lidwell, P., Yu, T.: Autonomous document classification for business. In: Proceedings of the first international conference on Autonomous Agents, pp. 201\u2013208. ACM, New York, NY, USA (1997)","DOI":"10.1145\/267658.267716"},{"key":"36_CR3","unstructured":"Brameier, M.: On linear genetic programming (2004). https:\/\/eldorado.tu-dortmund.de\/handle\/2003\/20098"},{"key":"36_CR4","unstructured":"Brameier, M.F., Banzhaf, W.: Linear Genetic Programming. Springer (2006)"},{"key":"36_CR5","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/4235.910462","volume":"5","author":"M Brameier","year":"2001","unstructured":"M. Brameier, W. Banzhaf, A comparison of linear genetic programming and neural networks in medical data mining. IEEE Trans. Evol. Comput. 5, 17\u201326 (2001)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"36_CR6","unstructured":"Androutsopoulos, I., Koutsias, J., Chandrinos, K.V., Paliouras, G., Spyropoulos, C.D.: An evaluation of Naive Bayesian anti-spam filtering (2000). arXiv:cs\/0006013"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Duda, R.O., Hart, P.E., Nilsson, N.J.: Subjective bayesian methods for rule-based inference systems. In: Proceedings of the June 7\u201310, 1976, National Computer Conference and Exposition, pp. 1075\u20131082. ACM, New York, NY, USA (1976)","DOI":"10.1145\/1499799.1499948"},{"key":"36_CR8","unstructured":"Mitchell, T.M.: Machine Learning. McGraw-Hill Science\/Engineering\/Math (1997)"},{"key":"36_CR9","unstructured":"Zdziarski, J.: Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification. No Starch Press (2005)"},{"key":"36_CR10","unstructured":"Reports| Press Panda Security. http:\/\/press.pandasecurity.com\/press-room\/reports\/"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Cranor, L.F., LaMacchia, B.A.: Spam! Commun. ACM 41, 74\u201383 (1998)","DOI":"10.1145\/280324.280336"},{"key":"36_CR12","unstructured":"Graham, Paul: A Plan for Spam. http:\/\/www.paulgraham.com\/spam.html"},{"key":"36_CR13","unstructured":"Graham, P.: Better Bayesian Filtering. http:\/\/www.paulgraham.com\/better.html"},{"key":"36_CR14","unstructured":"Pantel, P., Lin, D.: SpamCop: A spam classification & organization program. In: Learning for Text Categorization: Papers from the 1998 Workshop, pp. 95\u201398 (1998)"},{"key":"36_CR15","unstructured":"Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A bayesian approach to filtering junk e-mail. In: Proceedings of AAAI-98 Workshop Learn. Text Categ. (1998)"},{"key":"36_CR16","unstructured":"SpamAssassin Homepage. http:\/\/spamassassin.apache.org\/"},{"key":"36_CR17","unstructured":"Bayler, G.: Penetrating Bayesian Spam Filters: Exploiting Redundancy in Natural Language to Disguise Spam Emails. Vdm Verlag Dr. M\u00fcller (2008)"},{"key":"36_CR18","unstructured":"Shmueli, G., Patel, N.R., Bruce, P.C.: Data Mining for Business Intelligence: Concepts, Techniques, and Applications in Microsoft Office Excel with XLMiner. Wiley (2011)"},{"key":"36_CR19","first-page":"89","volume":"2","author":"C Sangeetha","year":"2012","unstructured":"C. Sangeetha, P. Amudha, S. Sivakumari, Feature extraction approach for spam filtering. Int. J. Adv. Res. Technol. 2, 89\u201393 (2012)","journal-title":"Int. J. Adv. Res. Technol."},{"key":"36_CR20","unstructured":"Goweder, A.M., Rashed, T.E., Ali, S., Alhammi, H.A.: An Anti-spam system using artificial neural networks and genetic algorithms. Proc. 2008 Int. Arab Conf. Inf. Technol. 1\u20138 (2008)"},{"key":"36_CR21","first-page":"269","volume":"31","author":"A Khorsi","year":"2007","unstructured":"A. Khorsi, An overview of content-based spam filtering techniques. Inform. Slov. 31, 269\u2013277 (2007)","journal-title":"Inform. Slov."},{"key":"36_CR22","unstructured":"Katirai, H.: Filtering Junk E-Mail: A Performance Comparison Between Genetic Programming and Naive Bayes (1999). http:\/\/citeseer.ist.psu.edu\/310632.html"},{"key":"36_CR23","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-540-31989-4_8","volume-title":"Genetic Programming","author":"L Hirsch","year":"2005","unstructured":"L. Hirsch, M. Saeedi, R. Hirsch, Evolving rules for document classification, in Genetic Programming, ed. by M. Keijzer, A. Tettamanzi, P. Collet, J. van Hemert, M. Tomassini (Springer, Berlin, 2005), pp. 85\u201395"},{"key":"36_CR24","doi-asserted-by":"crossref","unstructured":"Shengen, L., Xiaofei, N., Peiqi, L., Lin, W.: Generating new features using genetic programming to detect link spam. In: Proceedings of the 2011 Fourth International Conference on Intelligent Computation Technology and Automation, vol. 01. pp. 135\u2013138. IEEE Computer Society, Washington, DC, USA (2011)","DOI":"10.1109\/ICICTA.2011.41"},{"key":"36_CR25","unstructured":"Payne, T., Payne, T.: Learning Email Filtering Rules with Magi A Mail Agent Interface. Presented at the Department of Computing Science, University of Aberdeen (1994)"},{"key":"36_CR26","unstructured":"Davenport, G.F., Ryan, M.D., Rayward-Smith, V.J.: Rule induction using a reverse polish representation. In: GECCO, pp. 990\u2013995 (1999)"},{"key":"36_CR27","unstructured":"Lichman, M.: UCI Machine Learning Repository, Irvine, CA, University of California, School of Information and Computer Science (2013). http:\/\/archive.ics.uci.edu\/ml"},{"key":"36_CR28","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"J Pearl","year":"1988","unstructured":"J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference (Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1988)"},{"key":"36_CR29","unstructured":"Koza J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. A Bradford Book (1992)"},{"key":"36_CR30","unstructured":"Koza J.R.: Genetic evolution and co-evolution of computer programs. In: Artificial Life II, pp. 603\u2013629. Addison-Wesley Publishing Company (1990)"},{"key":"36_CR31","unstructured":"Koza J.R., K.M.A.: Genetic Programming IV. Kluwer Academic Publishers (2003)"},{"key":"36_CR32","unstructured":"Downey, C.: Explorations in Parallel Linear Genetic Programming: A Thesis Submitted to the Victoria University of Wellington in Fulfilment of the Requirements for the Degree of Master of Science in Computer Science. Victoria University of Wellington (2011)"},{"key":"36_CR33","doi-asserted-by":"crossref","unstructured":"Downey, C., Zhang, M.: Parallel linear genetic programming. In: Proceedings of the 14th European conference on Genetic programming, pp. 178\u2013189. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-20407-4_16"},{"key":"36_CR34","unstructured":"Abraham, A., Ramos, V.: Web usage mining using artificial ant colony clustering and linear genetic programming. In: The 2003 Congress on Evolutionary Computation, 2003. CEC\u201903, vol. 2, pp. 1384\u20131391 (2003)"},{"key":"36_CR35","doi-asserted-by":"publisher","first-page":"963","DOI":"10.1617\/s11527-009-9559-y","volume":"43","author":"AH Gandomi","year":"2009","unstructured":"A.H. Gandomi, A.H. Alavi, M.G. Sahab, New formulation for compressive strength of CFRP confined concrete cylinders using linear genetic programming. Mater. Struct. 43, 963\u2013983 (2009)","journal-title":"Mater. Struct."},{"key":"36_CR36","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s12040-009-0022-9","volume":"118","author":"A Guven","year":"2009","unstructured":"A. Guven, Linear genetic programming for time-series modelling of daily flow rate. J. Earth Syst. Sci. 118, 137\u2013146 (2009)","journal-title":"J. Earth Syst. Sci."},{"key":"36_CR37","doi-asserted-by":"crossref","unstructured":"Song, D., Heywood, M.I., Zincir-Heywood, A.N.: A linear genetic programming approach to intrusion detection. In: Genetic and Evolutionary Computation\u2014GECCO 2003, pp. 2325\u20132336. Springer, Berlin (2003)","DOI":"10.1007\/3-540-45110-2_125"},{"key":"36_CR38","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/978-3-540-24677-0_65","volume-title":"Innovations in Applied Artificial Intelligence","author":"S Mukkamala","year":"2004","unstructured":"S. Mukkamala, A.H. Sung, A. Abraham, Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach, in Innovations in Applied Artificial Intelligence, ed. by B. Orchard, C. Yang, M. Ali (Springer, Berlin, 2004), pp. 633\u2013642"},{"key":"36_CR39","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/BFb0017015","volume-title":"Machine Learning\u2014EWSL-91","author":"I Kononenko","year":"1991","unstructured":"I. Kononenko, Semi-naive bayesian classifier, in Machine Learning\u2014EWSL-91, ed. by Y. Kodratoff (Springer, Berlin, 1991), pp. 206\u2013219"},{"key":"36_CR40","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1093\/comjnl\/5.3.210","volume":"5","author":"CL Hamblin","year":"1962","unstructured":"C.L. Hamblin, Translation to and from polish notation. Comput. J. 5, 210\u2013213 (1962)","journal-title":"Comput. J."},{"key":"36_CR41","unstructured":"RPN.: An Introduction To Reverse Polish Notation. http:\/\/h41111.www4.hp.com\/calculators\/uk\/en\/articles\/rpn.html"},{"key":"36_CR42","doi-asserted-by":"publisher","first-page":"53","DOI":"10.2307\/2001990","volume":"8","author":"AW Burks","year":"1954","unstructured":"A.W. Burks, Don W. Warren, J.B. Wright, An analysis of a logical machine using parenthesis-free notation. Math. Tables Aids Comput. 8, 53\u201357 (1954)","journal-title":"Math. Tables Aids Comput."},{"key":"36_CR43","unstructured":"galculator\u2014a GTK 2\/GTK 3 algebraic and RPN calculator. http:\/\/galculator.sourceforge.net\/"},{"key":"36_CR44","unstructured":"Bennett, P.N.: Assessing the Calibration of Naive Bayes\u2019 Posterior Estimates. School of Computer Science, Carnegie Mellon University (2000)"},{"key":"36_CR45","unstructured":"Monti, S., Cooper, G.F.: A Bayesian Network Classifier that Combines a Finite Mixture Model and a Naive Bayes Model (2013). arXiv:1301.6723"},{"key":"36_CR46","unstructured":"Safe Browsing Tool| WOT (Web of Trust). http:\/\/www.mywot.com\/"},{"key":"36_CR47","unstructured":"Safe Browsing API\u2014Google Developers. https:\/\/developers.google.com\/safe-browsing\/"},{"key":"36_CR48","unstructured":"Damodaram, R., Valarmathi, D.M.L.: RBL Global Toolbar with Clustering Algorithm for Fake Website Detection"},{"key":"36_CR49","doi-asserted-by":"publisher","first-page":"33","DOI":"10.2307\/2867517","volume":"8","author":"PE Bennett","year":"1957","unstructured":"P.E. Bennett, The statistical measurement of a stylistic trait in julius caesar and as you like it. Shakespeare Q. 8, 33\u201350 (1957)","journal-title":"Shakespeare Q."},{"key":"36_CR50","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1023\/A:1002681919510","volume":"35","author":"E Stamatatos","year":"2001","unstructured":"E. Stamatatos, N. Fakotakis, G. Kokkinakis, Computer-based authorship attribution without lexical measures. Comput. Humanit. 35, 193\u2013214 (2001)","journal-title":"Comput. Humanit."},{"key":"36_CR51","doi-asserted-by":"publisher","first-page":"83","DOI":"10.3103\/S0005105515030048","volume":"49","author":"VA Yatsko","year":"2015","unstructured":"V.A. Yatsko, Automatic text classification method based on Zipf\u2019s law. Autom. Doc. Math. Linguist. 49, 83\u201388 (2015)","journal-title":"Autom. Doc. Math. Linguist."},{"key":"36_CR52","first-page":"15","volume":"5","author":"M Basavaraju","year":"2010","unstructured":"M. Basavaraju, D.R. Prabhakar, A novel method of spam mail detection using text based clustering approach. Int. J. Comput. Appl. 5, 15\u201325 (2010)","journal-title":"Int. J. Comput. Appl."},{"key":"36_CR53","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/272991.272995","volume":"8","author":"M Matsumoto","year":"1998","unstructured":"M. Matsumoto, T. Nishimura, Mersenne Twister: A 623-dimensionally equidistributed uniform pseudorandom number generator. ACM Trans. Model. Comput. Simul. 8, 3\u201330 (1998)","journal-title":"ACM Trans. Model. Comput. Simul."},{"key":"36_CR54","unstructured":"Pdnsd: pdnsd homepage. http:\/\/members.home.nl\/p.a.rombouts\/pdnsd\/"},{"key":"36_CR55","doi-asserted-by":"crossref","unstructured":"Jong, K.A.D., Spears, W.M.: An analysis of the interacting roles of population size and crossover in genetic algorithms. In: Proceedings of the 1st Workshop on Parallel Problem Solving from Nature, pp. 38\u201347. Springer, London, UK (1991)","DOI":"10.1007\/BFb0029729"},{"key":"36_CR56","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/3-540-46695-9_16","volume-title":"Advanced Topics in Artificial Intelligence","author":"M Zhang","year":"1999","unstructured":"M. Zhang, V. Ciesielski, Genetic programming for multiple class object detection, in Advanced Topics in Artificial Intelligence, ed. by N. Foo (Springer, Berlin, 1999), pp. 180\u2013192"},{"key":"36_CR57","doi-asserted-by":"crossref","unstructured":"Piszcz, A., Soule, T.: Genetic programming: analysis of optimal mutation rates in a problem with varying difficulty. In: FLAIRS Conference, pp. 451\u2013456 (2006)","DOI":"10.1145\/1143997.1144166"},{"key":"36_CR58","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1247715.1247717","volume":"25","author":"GV Cormack","year":"2007","unstructured":"G.V. Cormack, T.R. Lynam, Online supervised spam filter evaluation. ACM Trans. Inf. Syst. 25, 11 (2007)","journal-title":"ACM Trans. Inf. Syst."},{"key":"36_CR59","unstructured":"Graham-Cumming, John: Understanding Spam Filter Accuracy (Newsletter). http:\/\/www.jgc.org\/antispam\/11162004-baafcd719ec31936296c1fb3d74d2cbd.pdf"},{"key":"36_CR60","unstructured":"Mark, C., O\u2019Brien, J.: An Analysis of Spam Filters. Computer Science Department, WPI (2003)"}],"container-title":["Advances in Intelligent Systems and Computing","Software Engineering Perspectives and Application in Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33622-0_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T06:37:41Z","timestamp":1700203061000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-33622-0_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319336206","9783319336220"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33622-0_36","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}