{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:31Z","timestamp":1740099091472,"version":"3.37.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319978871"},{"type":"electronic","value":"9783319978888"}],"license":[{"start":{"date-parts":[[2018,8,5]],"date-time":"2018-08-05T00:00:00Z","timestamp":1533427200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-97888-8_7","type":"book-chapter","created":{"date-parts":[[2018,8,4]],"date-time":"2018-08-04T18:58:20Z","timestamp":1533409100000},"page":"80-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Spam Detection Using Linear Genetic Programming"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3551-862X","authenticated-orcid":false,"given":"Clyde","family":"Meli","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vitezslav","family":"Nezval","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zuzana","family":"Kominkova Oplatkova","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Victor","family":"Buttigieg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,8,5]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Almeida, T.A., Yamakami, A.: Advances in spam filtering techniques. In: Computational Intelligence for Privacy and Security, pp. 199\u2013214. Springer, Heidelberg (2012)","DOI":"10.1007\/978-3-642-25237-2_12"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Androutsopoulos, I., et al.: An experimental comparison of naive bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 160\u2013167. ACM, New York (2000)","DOI":"10.1145\/345508.345569"},{"issue":"1","key":"7_CR3","first-page":"0975","volume":"16","author":"WA Awad","year":"2011","unstructured":"Awad, W.A., ELseuofi, S.M.: Machine learning methods for e-mail classification. Int. J. Comput. Appl. 16(1), 0975\u20138887 (2011)","journal-title":"Int. J. Comput. Appl."},{"key":"7_CR4","unstructured":"Blickle, T., Thiele, L.: A Comparison of selection schemes used in genetic algorithms. Gloriastrasse 35, CH-8092 Zurich: Swiss Federal Institute of Technology (ETH) Zurich, Computer Engineering and Communications Networks Lab (TIK (1995)"},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.ipm.2012.02.001","volume":"49","author":"Y Borodin","year":"2013","unstructured":"Borodin, Y., et al.: Live and learn from mistakes: a lightweight system for document classification. Inf. Process. Manag. 49(1), 83\u201398 (2013)","journal-title":"Inf. Process. Manag."},{"key":"7_CR6","unstructured":"Brameier, M.: On linear genetic programming. Fachbereich Informatik, Universit\u00e4t Dortmund (2004)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Cid, I., et al.: The impact of noise in spam filtering: a case study. In: Perner, P. (ed.) Advances in Data Mining. Medical Applications, E-Commerce, Marketing, and Theoretical Aspects, pp. 228\u2013241. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-70720-2_18"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Cormack, G.V., Lynam, T.: TREC 2005 spam track overview. In: The Fourteenth Text REtrieval Conference (TREC 2005) Proceedings (2005)","DOI":"10.6028\/NIST.SP.500-266.spam-overview"},{"key":"7_CR9","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"MR Garey","year":"1979","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, San Francisco (1979)"},{"key":"7_CR10","unstructured":"Graham, P.: Better Bayesian Filtering. http:\/\/www.paulgraham.com\/better.html"},{"key":"7_CR11","unstructured":"Graham, P.: A Plan for Spam. http:\/\/www.paulgraham.com\/spam.html"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Gr\u017eini\u0107, T., et al.: CROFlux\u2014Passive DNS method for detecting fast-flux domains. In: 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1376\u20131380 (2014)","DOI":"10.1109\/MIPRO.2014.6859782"},{"key":"7_CR13","unstructured":"Harris, E.: The Next Step in the Spam Control War: Greylisting. http:\/\/projects.puremagic.com\/greylisting\/whitepaper.html"},{"key":"7_CR14","unstructured":"Holz, T., et al.: Measuring and detecting fast-flux service networks. In: 15th Network and Distributed System Security Symposium (NDSS) (2008)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Hunt, R., Carpinter, J.: Current and new developments in spam filtering. In: 2006 14th IEEE International Conference on Networks, pp. 1\u20136 (2006)","DOI":"10.1109\/ICON.2006.302641"},{"key":"7_CR16","unstructured":"Gon\u00e7alves, I.: Controlling Overfitting in Genetic Programming. CISUG (2011)"},{"key":"7_CR17","unstructured":"Juknius, J., \u010cenys, A.: Intelligent botnet attacks in modern Information warfare. In: 15th International Conference on Information and Software Technology, pp. 37\u201339 (2009)"},{"key":"7_CR18","unstructured":"Kolari, P., et al.: Detecting spam blogs: a machine learning approach. In: Proceedings of the National Conference on Artificial Intelligence, p. 1351. AAAI Press\/MIT Press, Menlo Park\/Cambridge 1999 (2006)"},{"key":"7_CR19","unstructured":"Lai, C.-C., Tsai, M.-C.: An empirical performance comparison of machine learning methods for spam e-mail categorization. In: Fourth International Conference on Hybrid Intelligent Systems, HIS 2004, pp. 44\u201348 IEEE (2004)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Lee, K., et al.: Uncovering social spammers: social honeypots\u2009+\u2009machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 435\u2013442 ACM, New York (2010)","DOI":"10.1145\/1835449.1835522"},{"key":"7_CR21","unstructured":"Sahami, M., et al.: A Bayesian approach to filtering junk e-mail. In: Proceedings of AAAI-98 Workshop on Learning for Text Categorization (1998)"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Meli, C., Oplatkova, Z.K.: SPAM detection: Na\u00efve Bayesian classification and RPN expression-based LGP approaches compared. In: Software Engineering Perspectives and Application in Intelligent Systems, pp. 399\u2013411. Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-319-33622-0_36"},{"key":"7_CR23","unstructured":"Meli, C.: Application and improvement of genetic algorithms and genetic programming towards the fight against spam and other internet malware. Submitted Ph.D. thesis, University of Malta, Malta (2017)"},{"issue":"4","key":"7_CR24","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s10579-005-8622-8","volume":"39","author":"A Miranda-Garc\u00eda","year":"2005","unstructured":"Miranda-Garc\u00eda, A., Calle-Mart\u00edn, J.: Yule\u2019s characteristic K revisited. Lang. Resour. Eval. 39(4), 287\u2013294 (2005)","journal-title":"Lang. Resour. Eval."},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Ntoulas, A., et al.: Detecting spam web pages through content analysis. In: Proceedings of the 15th International Conference on World Wide Web, pp. 83\u201392. ACM, New York (2006)","DOI":"10.1145\/1135777.1135794"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Oltean, M., Grosan, C.: Evolving evolutionary algorithms using multi expression programming. In: ECAL, pp. 651\u2013658 (2003)","DOI":"10.1007\/978-3-540-39432-7_70"},{"key":"7_CR27","unstructured":"Oltean, M., Dumitrescu, D.: Multi expression programming. Babes-Bolyai University (2002)"},{"issue":"3","key":"7_CR28","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1257\/jep.26.3.87","volume":"26","author":"JM Rao","year":"2012","unstructured":"Rao, J.M., Reiley, D.H.: The economics of spam. J. Econ. Perspect. 26(3), 87\u2013110 (2012)","journal-title":"J. Econ. Perspect."},{"issue":"2","key":"7_CR29","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s00500-009-0440-2","volume":"14","author":"G Ruan","year":"2009","unstructured":"Ruan, G., Tan, Y.: A three-layer back-propagation neural network for spam detection using artificial immune concentration. Soft. Comput. 14(2), 139\u2013150 (2009)","journal-title":"Soft. Comput."},{"issue":"1","key":"7_CR30","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TIT.2002.806137","volume":"49","author":"D Spinellis","year":"2003","unstructured":"Spinellis, D.: Reliable identification of bounded-length viruses is NP-complete. IEEE Trans. Inf. Theory 49(1), 280\u2013284 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Stuart, I., et al.: A neural network classifier for junk e-mail. In: Document Analysis Systems VI, pp. 442\u2013450. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-28640-0_42"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Wang, Z.-Q., et al.: An efficient SVM-based spam filtering algorithm. In: 2006 International Conference on Machine Learning and Cybernetics, pp. 3682\u20133686. IEEE (2006)","DOI":"10.1109\/ICMLC.2006.258626"},{"issue":"3\u20134","key":"7_CR33","first-page":"363","volume":"30","author":"GU Yule","year":"1939","unstructured":"Yule, G.U.: On sentence- length as a statistical characteristic of style in prose: with application to two cases of disputed authorship. Biometrika 30(3\u20134), 363\u2013390 (1939)","journal-title":"Biometrika"},{"issue":"4","key":"7_CR34","first-page":"243","volume":"3","author":"L Zhang","year":"2004","unstructured":"Zhang, L., et al.: An evaluation of statistical spam filtering. Techniques 3(4), 243\u2013269 (2004)","journal-title":"Techniques"},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, M., Fogelberg, C.G.: Genetic programming for image recognition: an LGP approach. In: EvoWorkshops 2007, pp. 340\u2013350. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-71805-5_37"},{"key":"7_CR36","unstructured":"RPN, An Introduction To Reverse Polish Notation. http:\/\/h41111.www4.hp.com\/calculators\/uk\/en\/articles\/rpn.html"},{"key":"7_CR37","unstructured":"Symantec Internet Security Report (2016). https:\/\/resource.elq.symantec.com\/LP=2899"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances in Soft Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-97888-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T23:09:50Z","timestamp":1720480190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-97888-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,5]]},"ISBN":["9783319978871","9783319978888"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-97888-8_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,8,5]]}}}