{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:50:43Z","timestamp":1725558643550},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642143991"},{"type":"electronic","value":"9783642144004"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14400-4_37","type":"book-chapter","created":{"date-parts":[[2010,6,26]],"date-time":"2010-06-26T01:18:09Z","timestamp":1277515089000},"page":"476-489","source":"Crossref","is-referenced-by-count":5,"title":["Spam Email Filtering Using Network-Level Properties"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Cortez","sequence":"first","affiliation":[]},{"given":"Andr\u00e9","family":"Correia","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Rocha","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Rio","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","unstructured":"Beverly, R., Sollins, K.: Exploiting transport-level characteristics of spam. In: 5th Conference on Email and Anti-Spam, CEAS (2008)"},{"key":"37_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/9780470382868","volume-title":"Practical text mining with Perl","author":"R. Bilisoly","year":"2008","unstructured":"Bilisoly, R.: Practical text mining with Perl. Wiley Publishing, Chichester (2008)"},{"issue":"1","key":"37_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10462-009-9109-6","volume":"29","author":"E. Blanzieri","year":"2008","unstructured":"Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artificial Intelligence Review\u00a029(1), 63\u201392 (2008)","journal-title":"Artificial Intelligence Review"},{"issue":"1","key":"37_CR4","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/S0893-6080(03)00169-2","volume":"17","author":"V. Cherkassy","year":"2004","unstructured":"Cherkassy, V., Ma, Y.: Practical Selection of SVM Parameters and Noise Estimation for SVM Regression. Neural Networks\u00a017(1), 113\u2013126 (2004)","journal-title":"Neural Networks"},{"issue":"3","key":"37_CR5","first-page":"273","volume":"20","author":"C. Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support Vector Networks. Machine Learning\u00a020(3), 273\u2013297 (1995)","journal-title":"Machine Learning"},{"issue":"4","key":"37_CR6","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.dss.2009.05.016","volume":"47","author":"P. Cortez","year":"2009","unstructured":"Cortez, P., Cerdeira, A., Almeida, F., Matos, T., Reis, J.: Modeling wine preferences by data mining from physicochemical properties. Decision Support Systems\u00a047(4), 547\u2013553 (2009)","journal-title":"Decision Support Systems"},{"key":"37_CR7","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/WI-IAT.2009.30","volume-title":"Proceedings of the IEEE\/WIC\/ACM International Conference on Web Intelligence (WI 2009)","author":"P. Cortez","year":"2009","unstructured":"Cortez, P., Lopes, C., Sousa, P., Rocha, M., Rio, M.: Symbiotic Data Mining for Personalized Spam Filtering. In: Proceedings of the IEEE\/WIC\/ACM International Conference on Web Intelligence (WI 2009), pp. 149\u2013156. IEEE, Los Alamitos (2009)"},{"issue":"5","key":"37_CR8","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/72.788645","volume":"10","author":"H. Drucker","year":"1999","unstructured":"Drucker, H., Wu, D., Vapnik, V.N.: Support vector machines for spam categorization. IEEE Transactions on Neural networks\u00a010(5), 1048\u20131054 (1999)","journal-title":"IEEE Transactions on Neural networks"},{"key":"37_CR9","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T. Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recognition Letters\u00a027, 861\u2013874 (2006)","journal-title":"Pattern Recognition Letters"},{"key":"37_CR10","unstructured":"Flexer, A.: Statistical Evaluation of Neural Networks Experiments: Minimum Requirements and Current Practice. In: Proceedings of the 13th European Meeting on Cybernetics and Systems Research, Vienna, Austria, vol.\u00a02, pp. 1005\u20131008 (1996)"},{"key":"37_CR11","unstructured":"Leiba, B., Ossher, J., Rajan, V.T., Segal, R., Wegman, M.: SMTP path analysis. In: Proceedings of the Second Conference on E-mail and Anti-Spam, CEAS (2005)"},{"issue":"3","key":"37_CR12","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10994-007-5018-6","volume":"68","author":"H.T. Lin","year":"2007","unstructured":"Lin, H.T., Lin, C.J., Weng, R.C.: A note on Platts probabilistic outputs for support vector machines. Machine Learning\u00a068(3), 267\u2013276 (2007)","journal-title":"Machine Learning"},{"key":"37_CR13","unstructured":"MAAWG. Email Metrics Program: The Network Operators\u2019 Perspective. Report #10 \u2013 third and fourth quarter 2008, Messaging Anti-Abuse Working Group, S. Francisco, CA, USA (March 2009)"},{"key":"37_CR14","unstructured":"Metsis, V., Androutsopoulos, I., Paliouras, G.: Spam Filtering with Naive Bayes \u2013 Which Naive Bayes? In: Third Conference on Email and Anti-Spam, CEAS (2006)"},{"key":"37_CR15","first-page":"1","volume-title":"1st Usenix Workshop on Large-Scale Exploits and Emergent Threats","author":"B. Nelson","year":"2008","unstructured":"Nelson, B., Barreno, M., Chi, F., Joseph, A., Rubinstein, B., Saini, U., Sutton, C., Tygar, J., Xia, K.: Exploiting Machine Learning to Subvert Your Spam Filter. In: 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp. 1\u20139. ACM Press, New York (2008)"},{"key":"37_CR16","unstructured":"R Development Core Team. R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria (2009), ISBN 3-900051-00-3 \n                    \n                      http:\/\/www.R-project.org"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N.: Understanding the Network-Level Behavior of Spammers. In: ACM (ed.) SIGCOMM 2006, pp. 291\u2013302 (2006)","DOI":"10.1145\/1159913.1159947"}],"container-title":["Lecture Notes in Computer Science","Advances in Data Mining. Applications and Theoretical Aspects"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14400-4_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:26:22Z","timestamp":1619771182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14400-4_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642143991","9783642144004"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14400-4_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}