{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:10:39Z","timestamp":1749787839084,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319483078"},{"type":"electronic","value":"9783319483085"}],"license":[{"start":{"date-parts":[[2016,10,18]],"date-time":"2016-10-18T00:00:00Z","timestamp":1476748800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-48308-5_6","type":"book-chapter","created":{"date-parts":[[2016,11,29]],"date-time":"2016-11-29T21:54:37Z","timestamp":1480456477000},"page":"53-63","source":"Crossref","is-referenced-by-count":2,"title":["Semantic-Based Feature Reduction Approach for E-mail Classification"],"prefix":"10.1007","author":[{"given":"Eman M.","family":"Bahgat","sequence":"first","affiliation":[]},{"given":"Ibrahim F.","family":"Moawad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,18]]},"reference":[{"key":"6_CR1","unstructured":"Internet Threats Trend Report. Cyberoam\u00ae A SOPHOS Campany (2014)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1007\/11875581_94","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2006","author":"MD Castillo","year":"2006","unstructured":"Castillo, M.D., Serrano, J.I.: An interactive hybrid system for identifying and filtering unsolicited e-mail. In: Corchado, E., Yin, H., Botti, V., Fyfe, C. (eds.) IDEAL 2006. LNCS, vol. 4224, pp. 779\u2013788. Springer, Heidelberg (2006). doi: 10.1007\/11875581_94"},{"key":"6_CR3","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-3-642-33693-5_3","volume-title":"The Na\u00efve Bayes Model for Unsupervised Word Sense Disambiguation","author":"FT Hristea","year":"2013","unstructured":"Hristea, F.T.: Semantic WordNet-based feature selection. In: Hristea, F.T. (ed.) The Na\u00efve Bayes Model for Unsupervised Word Sense Disambiguation, pp. 17\u201333. Springer, Heidelberg (2013)"},{"key":"6_CR4","unstructured":"Lai, C.C., Tsai, M.C.: An empirical performance comparison of machine learning methods for spam e-mail categorization. In: Fourth International Conference on Hybrid Intelligent Systems, pp. 44\u201348. IEEE (2004)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-642-17187-1_24","volume-title":"Information Retrieval Technology","author":"M Islam","year":"2010","unstructured":"Islam, M., Mahmud, A.A., Islam, M.: Machine Learning Approaches for Modeling Spammer Behavior. In: Kan, M.-Y., Lam, W., Nakov, P., Cheng, P.-J. (eds.) AIRS 2010. LNCS, vol. 6458, pp. 251\u2013260. Springer, Heidelberg (2010)"},{"key":"6_CR6","unstructured":"Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Technical report DIT-06-056, University of Trento, Information Engineering and Computer Science Department (2008)"},{"key":"6_CR7","unstructured":"Mitchell, T.: Generative and discriminative classifiers: naive Bayes and logistic regression (2005). Manuscript http:\/\/www.cs.cm.edu\/~tom\/NewChapters.html"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Renuka, D.K., Hamsapriya, T., Chakkaravarthi, M.R., Surya, P.L.: Spam classification based on supervised learning using machine learning techniques. In: International Conference on Process Automation, Control and Computing (PACC), pp. 1\u20137. IEEE (2011)","DOI":"10.1109\/PACC.2011.5979035"},{"issue":"3","key":"6_CR9","first-page":"949","volume":"8","author":"L Shi","year":"2012","unstructured":"Shi, L., Wang, Q., Ma, X., Weng, M., Qiao, H.: Spam email classification using decision tree ensemble. J. Comput. Inf. Syst. 8(3), 949\u2013956 (2012)","journal-title":"J. Comput. Inf. Syst."},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1007\/978-3-540-72905-1_41","volume-title":"Algorithms and Architectures for Parallel Processing","author":"MR Islam","year":"2007","unstructured":"Islam, M.R., Zhou, W.: Architecture of adaptive spam filtering based on machine learning algorithms. In: Jin, H., Rana, O.F., Pan, Y., Prasanna, V.K. (eds.) ICA3PP 2007. LNCS, vol. 4494, pp. 458\u2013469. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-72905-1_41"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Islam, R., Xiang, Y.: Email classification using data reduction method. In: Proceedings of the 5th International ICST Conference on Communications and Networking in China, pp. 1\u20135. IEEE (2010)","DOI":"10.4108\/chinacom.2010.59"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Bhat, V.H., Malkani, V.R., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Classification of email using beaks: behavior and keyword stemming. In: TENCON IEEE Region 10 Conference, pp. 1139\u20131143. IEEE (2011)","DOI":"10.1109\/TENCON.2011.6129290"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Lee, S.M., Kim, D.S., Kim, J.H., Park, J.S.: Spam detection using feature selection and parameters optimization. In: Intelligent and Software Intensive Systems International Conference on Complex, pp. 883\u2013888. IEEE (2010)","DOI":"10.1109\/CISIS.2010.116"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Abdelrahim, A.A., Elhadi, A.A.E., Ibrahim, H., Elmisbah, N.: Feature selection and similarity coefficient based method for email spam filtering. In: International Conference on Computing, Electrical and Electronics Engineering (ICCEEE). IEEE (2013)","DOI":"10.1109\/ICCEEE.2013.6634013"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Ting, L., Qingsong, Y.: Spam feature selection based on the improved mutual information algorithm. In: Fourth International Conference on Multimedia Information Networking and Security (MINES). IEEE (2012)","DOI":"10.1109\/MINES.2012.203"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Wang, R., Youssef, A.M., Elhakeem, A.K.: On some feature selection strategies for spam filter design. In: Canadian Conference on Electrical and Computer Engineering, pp. 2186\u20132189, CCECE 2006. IEEE (2006)","DOI":"10.1109\/CCECE.2006.277770"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Shams, R., Mercer, R.E.: Classifying spam emails using text and readability features. In: 13th International Conference on Data Mining (ICDM). IEEE (2013)","DOI":"10.1109\/ICDM.2013.131"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"More, S., Kulkarni, S.: Data mining with machine learning applied for email deception. In: International Conference on Optical Imaging Sensor and Security. IEEE (2013)","DOI":"10.1109\/ICOISS.2013.6678403"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Sharaff, A., Nagwani, N.K., Dhadse, A.: Comparative study of classification algorithms for spam email detection. In: Emerging Research in Computing, Information, Communication and Applications, pp. 237\u2013244. Springer, India (2016)","DOI":"10.1007\/978-81-322-2553-9_23"},{"key":"6_CR20","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-319-26690-9_29","volume-title":"The 1st International Conference on Advanced Intelligent System and Informatics","author":"EM Bahgat","year":"2016","unstructured":"Bahgat, E.M., Rady, S., Gad, W.: An e-mail filtering approach using classification techniques. In: Gaber, T., Hassanien, A.E., El-Bendary, N., Dey, N. (eds.) The 1st International Conference on Advanced Intelligent System and Informatics. AISC, vol. 407, pp. 321\u2013331. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-26690-9_29"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Lu, Z., Ding, J.: An efficient semantic VSM based email categorization method. In: International Conference on Computer Application and System Modeling, vol. 11, pp. 511\u2013525. IEEE (2010)","DOI":"10.1109\/ICCASM.2010.5623150"},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/978-3-540-69858-6_43","volume-title":"Natural Language and Information Systems","author":"S Yoo","year":"2008","unstructured":"Yoo, S., Gates, D., Levin, L., Fung, S., Agarwal, S., Freed, M.: Using semantic features to improve task identification in email messages. In: Kapetanios, E., Sugumaran, V., Spiliopoulou, M. (eds.) NLDB 2008. LNCS, vol. 5039, pp. 355\u2013357. Springer, Heidelberg (2008)"},{"key":"6_CR23","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/S1005-8885(13)60256-3","volume":"20","author":"HJ Tang","year":"2013","unstructured":"Tang, H.J., Yan, D.F., Yuan, T.I.A.N.: Semantic dictionary based method for short text classification. J. China Univ. Posts Telecommun. 20, 15\u201319 (2013)","journal-title":"J. China Univ. Posts Telecommun."},{"key":"6_CR24","unstructured":"Enron-Spam datasets: CSMINING group, http:\/\/csmining.org\/index.php\/enron-spam-datasets.html . Accessed 7 July 2016"},{"issue":"1","key":"6_CR25","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newsl. 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD Explor. Newsl."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48308-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T22:47:58Z","timestamp":1749768478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48308-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,18]]},"ISBN":["9783319483078","9783319483085"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48308-5_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016,10,18]]}}}