{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T08:22:16Z","timestamp":1758961336960},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642047466"},{"type":"electronic","value":"9783642047473"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04747-3_39","type":"book-chapter","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T01:06:12Z","timestamp":1254791172000},"page":"457-464","source":"Crossref","is-referenced-by-count":1,"title":["Computing a Comprehensible Model for Spam Filtering"],"prefix":"10.1007","author":[{"given":"Amparo","family":"Ruiz-Sep\u00falveda","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 L.","family":"Trivi\u00f1o-Rodriguez","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Morales-Bueno","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","series-title":"Lecture Notes in Computer Science","first-page":"268","volume-title":"10th International Conference on Data Warehousing and Knowledge Discovery","author":"J.L. Trivi\u00f1o-Rodriguez","year":"2008","unstructured":"Trivi\u00f1o-Rodriguez, J.L., Ruiz-Sep\u00falveda, A., Morales-Bueno, R.: How an ensemble method can compute a comprehensible model. In: Song, I.-Y., Eder, J., Nguyen, T.M. (eds.) 10th International Conference on Data Warehousing and Knowledge Discovery. LNCS, vol.\u00a05182, pp. 268\u2013378. Springer, Heidelberg (2008)"},{"key":"39_CR2","first-page":"307","volume-title":"ACM Transactions on Information Systems","author":"W.W. Cohen","year":"1996","unstructured":"Cohen, W.W., Singer, Y.: Context-sensitive learning methods for text categorization. In: ACM Transactions on Information Systems, pp. 307\u2013315. ACM Press, New York (1996)"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Ruiz, M.E., Srinivasan, P.: Hierarchical neural networks for text categorization. In: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 281\u2013282 (1999)","DOI":"10.1145\/312624.312700"},{"key":"39_CR4","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/243199.243276","volume-title":"SIGIR 1996: Proceedings of the 19th annual international ACM SIGIR conference on Research and development in information retrieval","author":"L.S. Larkey","year":"1996","unstructured":"Larkey, L.S., Croft, W.B.: Combining classifiers in text categorization. In: SIGIR 1996: Proceedings of the 19th annual international ACM SIGIR conference on Research and development in information retrieval, pp. 289\u2013297. ACM, New York (1996)"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Schapire, R.E., Singer, Y., Singhal, A.: Boosting and rocchio applied to text filtering. In: Proceedings of ACM SIGIR, pp. 215\u2013223. ACM Press, New York (1998)","DOI":"10.1145\/290941.290996"},{"key":"39_CR6","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/72.788645","volume":"10","author":"H. Drucker","year":"1999","unstructured":"Drucker, H., Member, S., Wu, D., Member, S., Vapnik, V.N.: Support vector machines for spam categorization. IEEE Transactions on Neural Networks\u00a010, 1048\u20131054 (1999)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"39_CR7","unstructured":"Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Sakkis, G., Spyropoulos, C.D., Stamatopoulos, P.: Learning to filter spam e-mail: A comparison of a naive bayesian and a memory-based approach. CoRR cs.CL\/0009009 (2000)"},{"key":"39_CR8","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1145\/183422.183423","volume":"12","author":"C. Apte","year":"1994","unstructured":"Apte, C., Damerau, F., Weiss, S.M., Apte, C., Damerau, F., Weiss, S.M.: Automated learning of decision rules for text categorization. ACM Transactions on Information Systems\u00a012, 233\u2013251 (1994)","journal-title":"ACM Transactions on Information Systems"},{"key":"39_CR9","unstructured":"Spamassasin"},{"key":"39_CR10","unstructured":"Sakkis, G., Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Spyropoulos, C.D., Stamatopoulos, P.: A memory-based approach to anti-spam filtering (2001)"},{"key":"39_CR11","unstructured":"Carreras, X., Marquez, L.S., Salgado, J.G.: Boosting trees for anti-spam email filtering. In: Proceedings of RANLP 2001, 4th International Conference on Recent Advances in Natural Language Processing, Tzigov Chark, BG, 58\u201364 (2001)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Guzella, T.S., Caminhas, W.M.: A review of machine learning approaches to spam filtering. Expert Systems with Application. Corrected Proof (in press, 2009)","DOI":"10.1016\/j.eswa.2009.02.037"},{"key":"39_CR13","unstructured":"Quinlan, J.: Bagging, boosting, and c4.5. In: Proc. of the 13th Nat. Conf. on A.I. and the 8th Innovate Applications of A.I. Conf., pp. 725\u2013730. AAAI\/MIT Press (1996)"},{"key":"39_CR14","unstructured":"Tretyakov, K.: Machine learning techniques in spam filtering. Technical report, Institute of Computer Science, University of Tartu (2004)"},{"key":"39_CR15","first-page":"124","volume-title":"Proc. 16th International Conf. on Machine Learning","author":"Y. Freund","year":"1999","unstructured":"Freund, Y., Mason, L.: The alternating decision tree learning algorithm. In: Proc. 16th International Conf. on Machine Learning, pp. 124\u2013133. Morgan Kaufmann, San Francisco (1999)"},{"key":"39_CR16","series-title":"LNCS (LNAI)","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/11790853_9","volume-title":"Advances in Data Mining. Applications in Medicine, Web Mining, Marketing, Image and Signal Mining","author":"J.R. M\u00e9ndez","year":"2006","unstructured":"M\u00e9ndez, J.R., Fdez-Riverola, F., D\u00edaz, F., Iglesias, E.L., Corchado, J.M.: A comparative performance study of feature selection methods for the anti-spam filtering domain. In: Perner, P., Heidelberg, S.B. (eds.) ICDM 2006. LNCS (LNAI), vol.\u00a04065, pp. 106\u2013120. Springer, Heidelberg (2006)"},{"key":"39_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/978-3-540-87732-5_55","volume-title":"Advances in Neural Networks - ISNN 2008","author":"C. Chen","year":"2008","unstructured":"Chen, C., Gong, Y., Bie, R., Gao, X.: Searching for interacting features for spam filtering. In: Sun, F., Zhang, J., Tan, Y., Cao, J., Yu, W. (eds.) ISNN 2008, Part I. LNCS, vol.\u00a05263, pp. 491\u2013500. Springer, Heidelberg (2008)"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Kearns, M., Mansour, Y.: On the boosting ability of top-down decision tree learning algorithms. In: Twenty-eighth annual ACM symposium on Theory of computing, Philadelphia, Pennsylvania, United States, pp. 459\u2013468 (1996)","DOI":"10.1145\/237814.237994"},{"key":"39_CR19","first-page":"23","volume-title":"Second European Conference on Computational Learning Theory","author":"R. Schapire","year":"1995","unstructured":"Schapire, R., Freund, Y.: A decision-theoretic generalization of on-line learning and an application to boosting. In: Second European Conference on Computational Learning Theory, pp. 23\u201337. Springer, Heidelberg (1995)"},{"key":"39_CR20","first-page":"96","volume-title":"Proc. 13th International Conference on Machine Learning","author":"T. Dietterich","year":"1996","unstructured":"Dietterich, T., Kearns, M., Mansour, Y.: Applying the weak learning framework to understand and improve C4.5. In: Proc. 13th International Conference on Machine Learning, pp. 96\u2013104. Morgan Kaufmann, San Francisco (1996)"},{"issue":"2","key":"39_CR21","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","author":"D.H. Wolpert","year":"1992","unstructured":"Wolpert, D.H.: Stacked generalization. Neural Networks\u00a05(2), 241\u2013259 (1992)","journal-title":"Neural Networks"},{"key":"39_CR22","volume-title":"C4.5: Programs for Machine Learning","author":"J. Quinlan","year":"1993","unstructured":"Quinlan, J.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)"},{"key":"39_CR23","volume-title":"Data Mining: Practical machine learning tools and techniques","author":"I. Witten","year":"2005","unstructured":"Witten, I., Frank, E.: Data Mining: Practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Discovery Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04747-3_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T21:13:42Z","timestamp":1558559622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04747-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642047466","9783642047473"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04747-3_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}