{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:06:13Z","timestamp":1774159573504,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319452425","type":"print"},{"value":"9783319452432","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45243-2_46","type":"book-chapter","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T13:41:42Z","timestamp":1474292502000},"page":"498-508","source":"Crossref","is-referenced-by-count":26,"title":["A Hybrid Approach Based on Particle Swarm Optimization and Random Forests for E-Mail Spam Filtering"],"prefix":"10.1007","author":[{"given":"Hossam","family":"Faris","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Aljarah","sequence":"additional","affiliation":[]},{"given":"Bashar","family":"Al-Shboul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","first-page":"7976","DOI":"10.1016\/j.eswa.2010.04.038","volume":"37","author":"MC Su","year":"2010","unstructured":"Su, M.C., Lo, H.H., Hsu, F.H.: A neural tree and its application to spam e-mail detection. Expert Syst. Appl. 37, 7976\u20137985 (2010)","journal-title":"Expert Syst. Appl."},{"key":"46_CR2","unstructured":"Carreras, X., Marquez, L.S., Salgado, J.G.: Boosting trees for anti-spam email filtering. In: Proceedings of 4th International Conference on Recent Advances in Natural Language Processing, RANLP 2001, Tzigov Chark, BG (2001)"},{"key":"46_CR3","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1016\/j.knosys.2011.04.006","volume":"24","author":"J Yang","year":"2011","unstructured":"Yang, J., Liu, Y., Liu, Z., Zhu, X., Zhang, X.: A new feature selection algorithm based on binomial hypothesis testing for spam filtering. Knowl.-Based Syst. 24, 904\u2013914 (2011)","journal-title":"Knowl.-Based Syst."},{"key":"46_CR4","doi-asserted-by":"crossref","first-page":"10206","DOI":"10.1016\/j.eswa.2009.02.037","volume":"36","author":"TS Guzella","year":"2009","unstructured":"Guzella, T.S., Caminhas, W.M.: A review of machine learning approaches to spam filtering. Expert Syst. Appl. 36, 10206\u201310222 (2009)","journal-title":"Expert Syst. Appl."},{"key":"46_CR5","unstructured":"Silva, R.M., Almeida, T.A., Yamakami, A.: Artificial neural networks for content-based web spam detection. In: Proceedings of the 14th International Conference on Artificial Intelligence (ICAI 2012), pp. 1\u20137 (2012)"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Faris, H., Aljarah, I., Alqatawna, J.: Optimizing feedforward neural networks using Krill Herd algorithm for e-mail spam detection. In: IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), Jordan, Amman (2015)","DOI":"10.1109\/AEECT.2015.7360576"},{"key":"46_CR7","first-page":"19","volume":"9","author":"A Rodan","year":"2016","unstructured":"Rodan, A., Faris, H., et al.: Optimizing feedforward neural networks using biogeography based optimization for e-mail spam identification. Int. J. Commun. Netw. Syst. Sci. 9, 19 (2016)","journal-title":"Int. J. Commun. Netw. Syst. Sci."},{"key":"46_CR8","doi-asserted-by":"crossref","unstructured":"Deshpande, V.P., Erbacher, R.F., Harris, C.: An evaluation of naive bayesian anti-spam filtering techniques. In: IEEE SMC Information Assurance and Security Workshopp, IAW 2007, pp. 333\u2013340. IEEE (2007)","DOI":"10.1109\/IAW.2007.381951"},{"key":"46_CR9","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1023\/A:1022948414856","volume":"6","author":"G Sakkis","year":"2003","unstructured":"Sakkis, G., Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Spyropoulos, C.D., Stamatopoulos, P.: A memory-based approach to anti-spam filtering for mailing lists. Inf. Retrieval 6, 49\u201373 (2003)","journal-title":"Inf. Retrieval"},{"key":"46_CR10","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/72.788645","volume":"10","author":"H Drucker","year":"1999","unstructured":"Drucker, H., Wu, D., Vapnik, V.N.: Support vector machines for spam categorization. IEEE Trans. Neural Netw. 10, 1048\u20131054 (1999)","journal-title":"IEEE Trans. Neural Netw."},{"key":"46_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1007\/978-3-540-73007-1_109","volume-title":"Computational and Ambient Intelligence","author":"\u00c1 Blanco","year":"2007","unstructured":"Blanco, \u00c1., Ricket, A.M., Mart\u00edn-Merino, M.: Combining SVM classifiers for email anti-spam filtering. In: Sandoval, F., Prieto, A.G., Cabestany, J., Gra\u00f1a, M. (eds.) IWANN 2007. LNCS, vol. 4507, pp. 903\u2013910. Springer, Heidelberg (2007)"},{"key":"46_CR12","unstructured":"Delany, S.J., Cunningham, P., Tsymbal, A.: A comparison of ensemble and case-base maintenance techniques for handling concept drift in spam filtering. In: FLAIRS Conference, pp. 340\u2013345 (2006)"},{"key":"46_CR13","doi-asserted-by":"crossref","first-page":"29","DOI":"10.5614\/itbj.ict.res.appl.2016.10.1.3","volume":"10","author":"BA Al-Shboul","year":"2016","unstructured":"Al-Shboul, B.A., Hakh, H., Faris, H., Aljarah, I., Alsawalqah, H.: Voting-based classification for e-mail spam detection. J. ICT Res. Appl. 10, 29\u201342 (2016)","journal-title":"J. ICT Res. Appl."},{"key":"46_CR14","first-page":"3133","volume":"15","author":"M Fern\u00e1ndez-Delgado","year":"2014","unstructured":"Fern\u00e1ndez-Delgado, M., Cernadas, E., Barro, S., Amorim, D.: Do we need hundreds of classifiers to solve real world classification problems? J. Mach. Learn. Res. 15, 3133\u20133181 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"46_CR15","unstructured":"DeBarr, D., Wechsler, H.: Spam detection using clustering, random forests, and active learning. In: Sixth Conference on Email and Anti-Spam, Mountain View, California (2009)"},{"key":"46_CR16","unstructured":"Rios, G., Zha, H.: Exploring support vector machines and random forests for spam detection. In: CEAS (2004)"},{"key":"46_CR17","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s10462-011-9285-z","volume":"40","author":"RA Zitar","year":"2013","unstructured":"Zitar, R.A., Hamdan, A.: Genetic optimized artificial immune system in spam detection: a review and a model. Artif. Intell. Rev. 40, 305\u2013377 (2013)","journal-title":"Artif. Intell. Rev."},{"key":"46_CR18","doi-asserted-by":"crossref","unstructured":"Fogel, D.B.: The advantages of evolutionary computation. In: BCEC, pp. 1\u201311. Citeseer (1997)","DOI":"10.1201\/9781420050387"},{"key":"46_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1007\/11752912_54","volume-title":"Advances in Artificial Intelligence","author":"D Gavrilis","year":"2006","unstructured":"Gavrilis, D., Tsoulos, I.G., Dermatas, E.: Neural recognition and genetic features selection for robust detection of e-mail spam. In: Antoniou, G., Potamias, G., Spyropoulos, C., Plexousakis, D. (eds.) SETN 2006. LNCS (LNAI), vol. 3955, pp. 498\u2013501. Springer, Heidelberg (2006)"},{"key":"46_CR20","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.knosys.2014.03.015","volume":"64","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Wang, S., Phillips, P., Ji, G.: Binary PSO with mutation operator for feature selection using decision tree applied to spam detection. Knowl.-Based Syst. 64, 22\u201331 (2014)","journal-title":"Knowl.-Based Syst."},{"key":"46_CR21","doi-asserted-by":"crossref","unstructured":"Lai, C.C., Wu, C.H.: Particle swarm optimization-aided feature selection for spam email classification. In: ICICIC, p. 165. IEEE (2007)","DOI":"10.1109\/ICICIC.2007.442"},{"key":"46_CR22","doi-asserted-by":"crossref","unstructured":"Tan, Y.: Particle swarm optimization algorithms inspired by immunity-clonal mechanism and their applications to spam detection. In: Innovations and Developments of Swarm Intelligence Applications, p. 182 (2012)","DOI":"10.4018\/978-1-4666-1592-2.ch011"},{"key":"46_CR23","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.C.: Particle swarm optimization. In: Proceedings of the IEEE International Conference on Neural Networks, Piscataway, NJ, USA, pp. 1942\u20131948 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"key":"46_CR24","doi-asserted-by":"crossref","first-page":"4831","DOI":"10.1016\/j.cnsns.2012.05.010","volume":"17","author":"AH Gandomi","year":"2012","unstructured":"Gandomi, A.H., Alavi, A.H.: Krill Herd: a new bio-inspired optimization algorithm. Commun. Nonlinear Sci. Numer. Simul. 17, 4831\u20134845 (2012)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"46_CR25","doi-asserted-by":"crossref","unstructured":"Aljarah, I., Ludwig, S.A.: A new clustering approach based on glowworm swarm optimization. In: 2013 IEEE Congress on Evolutionary Computation. Institute of Electrical & Electronics Engineers (IEEE) (2013)","DOI":"10.1109\/CEC.2013.6557888"},{"key":"46_CR26","first-page":"11","volume":"2008","author":"A Moraglio","year":"2008","unstructured":"Moraglio, A., Chio, C., Togelius, J., Poli, R.: Geometric particle swarm optimization. J. Artif. Evol. Appl. 2008, 11 (2008)","journal-title":"J. Artif. Evol. Appl."},{"key":"46_CR27","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"46_CR28","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.isprsjprs.2010.08.007","volume":"66","author":"L Guo","year":"2011","unstructured":"Guo, L., Chehata, N., Mallet, C., Boukir, S.: Relevance of airborne lidar and multispectral image data for urban scene classification using random forests. ISPRS J. Photogrammetry Remote Sens. 66, 56\u201366 (2011)","journal-title":"ISPRS J. Photogrammetry Remote Sens."},{"key":"46_CR29","first-page":"118","volume":"8","author":"J Alqatawna","year":"2015","unstructured":"Alqatawna, J., Faris, H., Jaradat, K., Al-Zewairi, M., Adwan, O.: Improving knowledge based spam detection methods: the effect of malicious related features in imbalance data distribution. Int. J. Commun. Netw. Syst. Sci. 8, 118 (2015)","journal-title":"Int. J. Commun. Netw. Syst. Sci."},{"key":"46_CR30","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R Kohavi","year":"1997","unstructured":"Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artif. Intell. 97, 273\u2013324 (1997)","journal-title":"Artif. Intell."},{"key":"46_CR31","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. ACM SIGKDD Explor. Newsl. 11, 10\u201318 (2009)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"46_CR32","doi-asserted-by":"crossref","first-page":"4626","DOI":"10.1016\/j.eswa.2008.05.027","volume":"36","author":"J Burez","year":"2009","unstructured":"Burez, J., Poel, D.: Handling class imbalance in customer churn prediction. Expert Syst. Appl. 36, 4626\u20134636 (2009)","journal-title":"Expert Syst. Appl."},{"key":"46_CR33","doi-asserted-by":"crossref","unstructured":"Wang, S., Tang, K., Yao, X.: Diversity exploration and negative correlation learning on imbalanced data sets. In: International Joint Conference on Neural Networks, IJCNN 2009, pp. 3259\u20133266. IEEE (2009)","DOI":"10.1109\/IJCNN.2009.5178836"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45243-2_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T20:08:29Z","timestamp":1657310909000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45243-2_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319452425","9783319452432"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45243-2_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}