{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T14:28:12Z","timestamp":1744900092746,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642153860"},{"type":"electronic","value":"9783642153877"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15387-7_60","type":"book-chapter","created":{"date-parts":[[2010,9,3]],"date-time":"2010-09-03T08:20:39Z","timestamp":1283502039000},"page":"566-575","source":"Crossref","is-referenced-by-count":5,"title":["Using Biased Discriminant Analysis for Email Filtering"],"prefix":"10.1007","author":[{"given":"Juan Carlos","family":"Gomez","sequence":"first","affiliation":[]},{"given":"Marie-Francine","family":"Moens","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","first-page":"37","volume":"6","author":"D.W. Aha","year":"1991","unstructured":"Aha, D.W., Kibler, D.F., Albert, M.K.: Instance-based learning algorithms. Machine Learning\u00a06, 37\u201366 (1991)","journal-title":"Machine Learning"},{"key":"60_CR2","series-title":"Lecture Notes in Artificial Intelligence","first-page":"9","volume-title":"Machine Learning: ECML 2000","author":"I. Androutsopoulos","year":"2000","unstructured":"Androutsopoulos, I., Koutsias, J., Chandrinos, K.V., Ch, K.V., Paliouras, G., Spyropoulos, C.D.: An evaluation of naive bayesian anti-spam filtering. In: Lopez de Mantaras, R., Plaza, E. (eds.) ECML 2000. LNCS (LNAI), vol.\u00a01810, pp. 9\u201317. Springer, Heidelberg (2000)"},{"issue":"10","key":"60_CR3","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1162\/089976600300014980","volume":"12","author":"G. Baudat","year":"2000","unstructured":"Baudat, G., Anouar, F.: Generalized discriminant analysis using a kernel approach. Neural Compututation\u00a012(10), 2385\u20132404 (2000)","journal-title":"Neural Compututation"},{"key":"60_CR4","doi-asserted-by":"crossref","unstructured":"Istv\u00e1n, B., J\u00e1cint, S., Bencz\u00far, A.A.: Latent dirichlet allocation in web spam filtering. In: AIRWeb 2008: Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, pp. 29\u201332 (2008)","DOI":"10.1145\/1451983.1451991"},{"key":"60_CR5","doi-asserted-by":"crossref","unstructured":"Bishop, C.: Neural Networks for Pattern Recognition. Clarendon Press, Oxford (1995)","DOI":"10.1201\/9781420050646.ptb6"},{"key":"60_CR6","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I., Lafferty, J.: Latent dirichlet allocation. Journal of Machine Learning Research\u00a03, 2003 (2003)"},{"key":"60_CR7","first-page":"2673","volume":"7","author":"A. Bratko","year":"2006","unstructured":"Bratko, A., Cormack, G., Filipic, B., Lynam, T., Zupan, B.: Spam filtering using statistical data compression models. Journal of Machine Learning Research\u00a07, 2673\u20132698 (2006)","journal-title":"Journal of Machine Learning Research"},{"key":"60_CR8","doi-asserted-by":"crossref","unstructured":"Breiman, L.: Bagging predictors. In: Machine Learning, pp. 123\u2013140 (1996)","DOI":"10.1007\/BF00058655"},{"key":"60_CR9","doi-asserted-by":"crossref","unstructured":"Cormack, G.V.: Spam track overview. In: TREC-2007: Sixteenth Text REtrieval Conference (2007)","DOI":"10.6028\/NIST.SP.500-274.spam-overview"},{"key":"60_CR10","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S. Deerwester","year":"1990","unstructured":"Deerwester, S., Dumais, S.T., Furnas, G.W., Landauer, T.K., Harshman, R.: Indexing by latent semantic analysis. Journal of the American Society for Information Science\u00a041, 391\u2013407 (1990)","journal-title":"Journal of the American Society for Information Science"},{"key":"60_CR11","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1145\/1242572.1242660","volume-title":"WWW 2007: Proceedings of the 16th International Conference on World Wide Web","author":"I. Fette","year":"2007","unstructured":"Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: WWW 2007: Proceedings of the 16th International Conference on World Wide Web, pp. 649\u2013656. ACM, New York (2007)"},{"key":"60_CR12","volume-title":"Introduction to Statistical Pattern Recognition","author":"K. Fukunaga","year":"1990","unstructured":"Fukunaga, K.: Introduction to Statistical Pattern Recognition. Academic Press, London (1990)"},{"issue":"4","key":"60_CR13","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1038\/scientificamerican0405-42","volume":"292","author":"J. Goodman","year":"2005","unstructured":"Goodman, J., Heckerman, D., Rounthwaite, R.: Stopping spam. Scientific American\u00a0292(4), 42\u201388 (2005)","journal-title":"Scientific American"},{"key":"60_CR14","doi-asserted-by":"crossref","unstructured":"Hofmann, T.: Probabilistic latent semantic indexing. In: Uncertainty in Artificial Intelligence, pp. 50\u201357 (1999)","DOI":"10.1145\/312624.312649"},{"issue":"4","key":"60_CR15","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/JPROC.2008.916364","volume":"96","author":"T.S. Huang","year":"2008","unstructured":"Huang, T.S., Dagli, C.K., Rajaram, S., Chang, E.Y., Mandel, M.I., Poliner, G.E., Ellis, D.P.W.: Active learning for interactive multimedia retrieval. Proceedings of the IEEE\u00a096(4), 648\u2013667 (2008)","journal-title":"Proceedings of the IEEE"},{"issue":"6","key":"60_CR16","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1142\/S0218213007003692","volume":"16","author":"I. Kanaris","year":"2007","unstructured":"Kanaris, I., Kanaris, K., Houvardas, I., Stamatatos, E.: Words vs. character n-grams for anti-spam filtering. Int. Journal on Artificial Intelligence Tools\u00a016(6), 1047\u20131067 (2007)","journal-title":"Int. Journal on Artificial Intelligence Tools"},{"key":"60_CR17","volume-title":"C4.5: Programs for Machine Learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Mateo (1993)"},{"key":"60_CR18","doi-asserted-by":"publisher","first-page":"10206","DOI":"10.1016\/j.eswa.2009.02.037","volume":"36","author":"T.S. Guzella","year":"2009","unstructured":"Guzella, T.S., Caminhas, W.M.: A review of machine learning approaches to spam filtering. Expert Systems with Applications\u00a036, 10206\u201310222 (2009)","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"60_CR19","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.knosys.2008.01.001","volume":"21","author":"B. Yu","year":"2008","unstructured":"Yu, B., Xu, Z.-b.: A comparative study for content-based dynamic spam classification using four machine learning algorithms. Knowledge-Based Systems\u00a021(4), 355\u2013362 (2008)","journal-title":"Knowledge-Based Systems"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based and Intelligent Information and Engineering Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15387-7_60.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T13:50:59Z","timestamp":1740491459000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15387-7_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642153860","9783642153877"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15387-7_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}