{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:47Z","timestamp":1725889907259},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_20","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T15:29:56Z","timestamp":1497367796000},"page":"334-349","source":"Crossref","is-referenced-by-count":0,"title":["A Multi-layer Model to Detect Spam Email at Client Side"],"prefix":"10.1007","author":[{"given":"Kamini","family":"Bajaj","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Wang, D., Irani, D., Pu, C.: A social-spam detection framework. In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference 2011, pp. 46\u201354. ACM, Perth (2011)","DOI":"10.1145\/2030376.2030382"},{"key":"20_CR2","unstructured":"Bo, L., et al.: Filtering spam in social tagging system with dynamic behavior analysis. In: International Conference on Advances in Social Network Analysis and Mining, ASONAM 2009 (2009)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Wang, C., et al.: A behavior-based SMS antispam system. IBM J. Res. Develop. 54(6) (2010)","DOI":"10.1147\/JRD.2010.2066050"},{"key":"20_CR4","unstructured":"Europe, M.: AdaptiveMobile launches anti-spam app for operators. News Analysis (2011)"},{"issue":"6","key":"20_CR5","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MIC.2007.125","volume":"11","author":"P Heymann","year":"2007","unstructured":"Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: a survey of approaches and future challenges. IEEE Internet Comput. 11(6), 36\u201345 (2007)","journal-title":"IEEE Internet Comput."},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Clifford, M., et al.: Miracle cures and toner cartridges: finding solutions to the spam problem. In: 19th Annual Computer Security Applications Conference (ACSAC 2003) (2003)","DOI":"10.1109\/CSAC.2003.1254347"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Jung, J., Emil, S.: An empirical study of spam traffic and the use of DNS black lists. In: Internet Measurement Conference, Taormina, Italy (2004)","DOI":"10.1145\/1028788.1028838"},{"key":"20_CR8","unstructured":"Jaeyeon, J., Emil, S.: An empirical study of spam traffic and the use of DNS black lists. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement 2004. ACM, Taormina (2004)"},{"issue":"3","key":"20_CR9","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MC.2007.109","volume":"40","author":"N Leavitt","year":"2007","unstructured":"Leavitt, N.: Vendors fight spam\u2019s sudden rise. Computer 40(3), 16\u201319 (2007)","journal-title":"Computer"},{"key":"20_CR10","unstructured":"Mikko, S., Carl, S.: Effective anti spam strategies in companies: an international study. In: 39th Hawaiia International Conference on System Sciences. IEEE (2006)"},{"key":"20_CR11","unstructured":"Gina Spam statistics of third-quarter 2010. Panda Security Report (2010)"},{"key":"20_CR12","unstructured":"Shcherbakova, T., Vergelis, M., Demidova, N.: Spam and phishing in Q2 2015. Quarterly Spam Reports (2015)"},{"key":"20_CR13","unstructured":"Symantec, Symantec Intelligence Report: July 2015, p. 19, July 2015"},{"key":"20_CR14","unstructured":"Levenstein, J.: Email statistics report, 2013\u20132017. In: Radicati, S. (ed.) Reports. Radicate Group Inc.: 1900 Embarcadero Road, Suite 206, Palo Alto, CA 94303 (2013)"},{"key":"20_CR15","unstructured":"Meyer, T.A., Whateley, B.: SpamBayes: effective open-source, Bayesian based, email classification system. In: First Conference on Email and Anti-Spam (CEAS), Mountain View, CA (2004)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Pelletier, L., Almhana, J., Choulakian, V.: Adaptive filtering of spam. In: Proceedings of the Second Annual Conference on Communication Networks and Services Research (2004)","DOI":"10.1109\/DNSR.2004.1344731"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Saito, T.: Anti-spam system: another way of preventing spam. In: Proceedings of the Sixteenth International Workshop on Database and Expert Systems Applications (2005)","DOI":"10.1109\/DEXA.2005.51"},{"key":"20_CR18","unstructured":"Yan, Z., Mulekar, M.S., Nerellapalli, P.: Adaptive spam filtering using dynamic feature space. In: 17th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2005 (2005)"},{"issue":"3","key":"20_CR19","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.knosys.2006.05.016","volume":"20","author":"C-C Lai","year":"2007","unstructured":"Lai, C.-C.: An empirical study of three machine learning methods for spam filtering. Knowl. Based Syst. 20(3), 249\u2013254 (2007)","journal-title":"Knowl. Based Syst."},{"key":"20_CR20","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/978-1-4020-6264-3_67","volume-title":"Advances and Innovations in Systems, Computing Sciences and Software Engineering","author":"S Youn","year":"2007","unstructured":"Youn, S., McLeod, D.: A comparative study for email classification. In: Elleithy, K. (ed.) Advances and Innovations in Systems, Computing Sciences and Software Engineering, pp. 387\u2013391. Springer, Netherlands (2007)"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Karthika Renuka, D., et al.: Spam classification based on supervised learning using machine learning techniques. In: International Conference on Process Automation, Control and Computing (PACC 2011) (2011)","DOI":"10.1109\/PACC.2011.5979035"},{"key":"20_CR22","unstructured":"Zhang, Y., Yang, X., Liu, Y.: Improvement and optimization of spam text filtering system. In: 2nd International Conference on Computer Science and Network Technology (ICCSNT 2012) (2012)"},{"key":"20_CR23","unstructured":"Sarafijanovic, S., Le Boudec, J.-Y.: Artificial immune system for collaborative spam filtering"},{"key":"20_CR24","first-page":"39","volume-title":"Nature Inspired Cooperative Strategies for Optimization (NICSO 2007)","year":"2008","unstructured":"Krasnogor, N., et al. (eds.): Nature Inspired Cooperative Strategies for Optimization (NICSO 2007), pp. 39\u201351. Springer, Berlin (2008)"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Balakumar, M., Vaidehi, V.: Ontology based classification and categorization of email. In: International Conference on Signal Processing, Communications and Networking, ICSCN 2008 (2008)","DOI":"10.1109\/ICSCN.2008.4447188"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Chih-Chin, L., Ming-Chi, T.: An empirical performance comparison of machine learning methods for spam e-mail categorization. In: Fourth International Conference on Hybrid Intelligent Systems, HIS 2004 (2004)","DOI":"10.1109\/ICHIS.2004.21"},{"issue":"2","key":"20_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2089125.2089129","volume":"44","author":"G Caruana","year":"2012","unstructured":"Caruana, G., Li, M.: A survey of emerging approaches to spam filtering. ACM Comput. Surv. 44(2), 1\u201327 (2012)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"20_CR28","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s10462-009-9109-6","volume":"29","author":"E Blanzieri","year":"2008","unstructured":"Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artif. Intell. Rev. 29(1), 63\u201392 (2008)","journal-title":"Artif. Intell. Rev."},{"key":"20_CR29","unstructured":"Bajaj, K., Pieprzyk, J.: A case study of user-level spam filtering. In: Proceedings of the Twelfth Australasian Information Security Conference, vol. 1492014, pp. 67\u201375. Australian Computer Society, Inc., Auckland"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Wu, J., Deng, T.: Research in anti-spam method based on bayesian filtering. In: Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA 2008), pp. 887\u2013891 (2008)","DOI":"10.1109\/PACIIA.2008.180"},{"key":"20_CR31","unstructured":"Wei, Z., et al.: Active learning based spam filtering method. In: 2010 8th World Congress on Intelligent Control and Automation (WCICA) (2010)"},{"key":"20_CR32","unstructured":"Hu, Y., Zhang, C.: An improved bayesian algorithm for filtering spam e-mail. In: 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing (IPTC) (2011)"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Seibel, P.: Practical: a spam filter. In: Practical Common Lisp, pp. 291\u2013309 (2005)","DOI":"10.1007\/978-1-4302-0017-8_23"},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"Bajaj, S.K., Pieprzyk, J.: Can we CAN the email spam. In: 2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC) (2013)","DOI":"10.1109\/CTC.2013.15"},{"issue":"5","key":"20_CR35","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/72.788645","volume":"10","author":"H Drucker","year":"1999","unstructured":"Drucker, H., Donghui, W., Vapnik, V.N.: Support vector machines for spam categorization. IEEE Trans. Neural Netw. 10(5), 1048\u20131054 (1999)","journal-title":"IEEE Trans. Neural Netw."},{"key":"20_CR36","unstructured":"Chao, X., Yiming, Z.: Transductive support vector machine for personal inboxes spam categorization. In: International Conference on Computational Intelligence and Security Workshops, CISW 2007 (2007)"},{"key":"20_CR37","unstructured":"Androutsopoulos, J.K., Chandrinos, K.V., Paliouras, G., Spyropoulos, C.D.: An evaluation of naive bayesian anti-spam filtering. In: 11th European Conference on Machine Learning, Barcelona, Spain (2000)"},{"key":"20_CR38","doi-asserted-by":"crossref","unstructured":"Androutsopoulos, J.K., Chandrinos, K.V., Spyropoulos, C.D.: An experimental comparison of naive bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2000), Athens, Greece (2000)","DOI":"10.1145\/345508.345569"},{"key":"20_CR39","unstructured":"Metsis, V., Androutsopoulos, I., Paliouras, G.: Spam filtering with naive bayes\u2014which naive bayes? In: 3rd Conference on Email and Anti-Spam (CEAS 2006), Mountain View, CA, USA (2006)"},{"key":"20_CR40","unstructured":"Islam, M.R., Wanlei, Z., Chowdhury, M.U.: Email categorization using (2\u00a0+\u00a01)-tier classification algorithms. In: Seventh IEEE\/ACIS International Conference on Computer and Information Science, 2008. ICIS 2008 (2008)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T15:38:01Z","timestamp":1497368281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_20","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}