{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:57:06Z","timestamp":1774717026049,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319590400","type":"print"},{"value":"9783319590417","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59041-7_8","type":"book-chapter","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T02:43:06Z","timestamp":1493865786000},"page":"136-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Supervised Approach for Spam Detection Using Text-Based Semantic Representation"],"prefix":"10.1007","author":[{"given":"Nadjate","family":"Saidani","sequence":"first","affiliation":[]},{"given":"Kamel","family":"Adi","sequence":"additional","affiliation":[]},{"given":"Mouhand Said","family":"Allili","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,5]]},"reference":[{"key":"8_CR1","first-page":"2673","volume":"7","author":"A Bratko","year":"2006","unstructured":"Bratko, A., Cormack, G.V., et al.: Spam filtering using statistical data compression models. J. Mach. Learn. Res. 7, 2673\u20132698 (2006)","journal-title":"J. Mach. Learn. Res."},{"issue":"2","key":"8_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2089125.2089129","volume":"44","author":"G Caruana","year":"2012","unstructured":"Caruana, G., Li, M.: A survey of emerging approaches to spam filtering. ACM Comput. Surv. (CSUR) 44(2), 1\u201327 (2012)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/BFb0017011","volume-title":"Machine Learning \u2014 EWSL-91","author":"P Clark","year":"1991","unstructured":"Clark, P., Boswell, R.: Rule induction with CN2: some recent improvements. In: Kodratoff, Y. (ed.) EWSL 1991. LNCS, vol. 482, pp. 151\u2013163. Springer, Heidelberg (1991). doi:10.1007\/BFb0017011"},{"issue":"4","key":"8_CR4","first-page":"261","volume":"3","author":"P Clark","year":"1989","unstructured":"Clark, P., Niblett, T.: The CN2 induction algorithm. Mach. Learn. 3(4), 261\u2013283 (1989)","journal-title":"Mach. Learn."},{"issue":"4","key":"8_CR5","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1561\/1500000006","volume":"1","author":"GV Cormack","year":"2007","unstructured":"Cormack, G.V.: Email spam filtering: a systematic review. Found. Trends Inf. Retrieval 1(4), 335\u2013455 (2007)","journal-title":"Found. Trends Inf. Retrieval"},{"issue":"1","key":"8_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.patrec.2007.07.018","volume":"29","author":"A \u00c7iltik","year":"2008","unstructured":"\u00c7iltik, A., G\u00fcng\u00f6r, T.: Time-efficient spam e-mail filtering using n-gram models. Pattern Recogn. Lett. 29(1), 19\u201333 (2008)","journal-title":"Pattern Recogn. Lett."},{"key":"8_CR7","unstructured":"Gudkova, D., Vergelis, M., et al.: Spam and phishing in Q2 2016, pp. 1\u201322. Kaspersky Lab (2016)"},{"key":"8_CR8","unstructured":"Gudkova, D., Vergelis, M., Demidova, N.: Spam and phishing in Q2 2015, pp. 1\u201319. Kaspersky Lab (2015)"},{"issue":"7","key":"8_CR9","doi-asserted-by":"publisher","first-page":"10206","DOI":"10.1016\/j.eswa.2009.02.037","volume":"36","author":"TS Guzella","year":"2009","unstructured":"Guzella, T.S., Caminhas, W.M.: A review of machine learning approaches to spam filtering. Expert Syst. Appl. 36(7), 10206\u201310222 (2009)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"8_CR10","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/s10115-010-0356-2","volume":"29","author":"F Herrera","year":"2010","unstructured":"Herrera, F., Carmona del Jesus, C.J., et al.: An overview on subgroup discovery: foundations and applications. Knowl. Inf. Syst. 29(3), 495\u2013525 (2010). Published online first","journal-title":"Knowl. Inf. Syst."},{"issue":"3","key":"8_CR11","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.elerap.2011.11.004","volume":"11","author":"C Laorden","year":"2012","unstructured":"Laorden, C., Santos, I., et al.: Word sense disambiguation for spam filtering. Electron. Commer. Res. Appl. 11(3), 290\u2013298 (2012)","journal-title":"Electron. Commer. Res. Appl."},{"issue":"2","key":"8_CR12","first-page":"153","volume":"5","author":"N Lavrac","year":"2004","unstructured":"Lavrac, N., Kavsek, B., Flach, P., Todorovski, L.: Subgroup discovery with CN2-SD. J. Mach. Learn. Res. 5(2), 153\u2013188 (2004)","journal-title":"J. Mach. Learn. Res."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Renuka, D.K., Hamsapriya, T., et al.: Spam classification based on supervised learning using machine learning techniques. In: International Conference on Process Automation, Control and Computing (PACC), pp. 1\u20137. IEEE (2011)","DOI":"10.1109\/PACC.2011.5979035"},{"issue":"1","key":"8_CR14","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.eswa.2011.07.034","volume":"39","author":"I Santos","year":"2012","unstructured":"Santos, I., Laorden, C., Sanz, B., Bringas, P.G.: Enhanced topic-based vector space model for semantics aware spam filtering. Expert Syst. Appl. 39(1), 437\u2013444 (2012)","journal-title":"Expert Syst. Appl."},{"key":"8_CR15","unstructured":"Symantec. Internet Security Threat Report, vol. 21, pp. 1\u201377, April 2016"},{"issue":"1","key":"8_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-013-0658-2","volume":"41","author":"G Tang","year":"2014","unstructured":"Tang, G., Pei, J., Luk, W.S.: Email mining: tasks, common techniques, and tools. Knowl. Inf. Syst. 41(1), 1\u201331 (2014)","journal-title":"Knowl. Inf. Syst."},{"issue":"1","key":"8_CR17","first-page":"11","volume":"13","author":"ZS Torabi","year":"2015","unstructured":"Torabi, Z.S., Nadimi-Shahraki, M.H., et al.: Efficient support vector machines for spam detection: a survey. Int. J. Comput. Sci. Inf. Secur. 13(1), 11 (2015)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-319-11104-9_5","volume-title":"Proceedings of the 4th International Conference on Computer Engineering and Networks","author":"H Wang","year":"2015","unstructured":"Wang, H., Zheng, G., He, Y.: The improved bayesian algorithm to spam filtering. In: Wong, W.E. (ed.) Proceedings of the 4th International Conference on Computer Engineering and Networks, pp. 37\u201344. Springer, Cham (2015). doi:10.1007\/978-3-319-11104-9_5"}],"container-title":["Lecture Notes in Business Information Processing","E-Technologies: Embracing the Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59041-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:37:27Z","timestamp":1710355047000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59041-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319590400","9783319590417"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59041-7_8","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"5 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MCETECH","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on E-Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ottawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mcetech2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mcetech.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}