{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:14:31Z","timestamp":1725578071658},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642194221"},{"type":"electronic","value":"9783642194238"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19423-8_20","type":"book-chapter","created":{"date-parts":[[2011,2,10]],"date-time":"2011-02-10T06:18:31Z","timestamp":1297318711000},"page":"189-197","source":"Crossref","is-referenced-by-count":1,"title":["Reducing Classification Times for Email Spam Using Incremental Multiple Instance Classifiers"],"prefix":"10.1007","author":[{"given":"Teng-Sheng","family":"Moh","sequence":"first","affiliation":[]},{"given":"Nicholas","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"20_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MTAS.2006.1607720","volume":"25","author":"B. Hoanca","year":"2006","unstructured":"Hoanca, B.: How good are our weapons in the spam wars? IEEE Technology and Society Magazine\u00a025(1), 22\u201330 (2006)","journal-title":"IEEE Technology and Society Magazine"},{"issue":"8","key":"20_CR2","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1016\/j.cose.2006.06.001","volume":"25","author":"J. Carpinter","year":"2006","unstructured":"Carpinter, J., Hunt, R.: Tightening the net: a review of current and next generation spam filtering tools. Computers & Security\u00a025(8), 566\u2013578 (2006)","journal-title":"Computers & Security"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/NPC.2007.152","volume-title":"2007 IFIP International Conference on Network and Parallel Computing Workshops","author":"M.R. Islam","year":"2007","unstructured":"Islam, M.R., Zhou, W.: An Innovative Analyser for email classification based on grey list analysis. In: 2007 IFIP International Conference on Network and Parallel Computing Workshops, pp. 176\u2013182. IEEE Computer Society, Washington, DC (2007)"},{"key":"20_CR4","first-page":"394","volume-title":"The Eighth IEEE\/ACIS International Conference on Computer and Information Science (ICIS)","author":"M.R. Islam","year":"2009","unstructured":"Islam, M.R., Zhou, W., Chowdhury, M.U.: MVGL Analyser for Multi-Classifier Based Spam Filtering System. In: The Eighth IEEE\/ACIS International Conference on Computer and Information Science (ICIS), pp. 394\u2013399. IEEE Computer Society, Washington, DC (2009)"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"3213","DOI":"10.1109\/ICIP.2006.312907","volume-title":"2006 IEEE International Conference on Image Processing","author":"F. Kang","year":"2006","unstructured":"Kang, F., Naphade, M.R.: A generalized multiple instance learning algorithm with multiple selection strategies for cross granular learning. In: 2006 IEEE International Conference on Image Processing, pp. 3213\u20133216. IEEE Press, New York (2006)"},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/ICTAI.2007.120","volume-title":"Nineteenth IEEE International Conference on Tools with Artificial Intelligence (ICTAI)","author":"Y. Zhou","year":"2007","unstructured":"Zhou, Y., Jorgensen, Z., Inge, M.: Combating good word attacks on statistical spam filters with multiple instance learning. In: Nineteenth IEEE International Conference on Tools with Artificial Intelligence (ICTAI), pp. 298\u2013305. IEEE Computer Society, Washington, DC (2007)"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"3392","DOI":"10.1109\/CEC.2007.4424910","volume-title":"2007 IEEE Congress on Evolutionary Computation (CEC)","author":"B. Sirisanyalak","year":"2007","unstructured":"Sirisanyalak, B., Sornil, O.: An artificial immunity-based spam detection system. In: 2007 IEEE Congress on Evolutionary Computation (CEC), pp. 3392\u20133398. IEEE Press, New York (2007)"},{"key":"20_CR8","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1109\/ICYCS.2008.434","volume-title":"Ninth International Conference for Young Computer Scientists (ICYCS)","author":"C.-C. Yeh","year":"2008","unstructured":"Yeh, C.-C., Chiang, S.-J.: Revisit Bayesian approaches for spam detection. In: Ninth International Conference for Young Computer Scientists (ICYCS), pp. 659\u2013664. IEEE Computer Society, Washington, DC (2008)"},{"key":"20_CR9","unstructured":"SPAM Track Guidelines - TREC 2005-2007, http:\/\/plg.uwaterloo.ca\/~gvcormac\/spam\/"},{"issue":"10","key":"20_CR10","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1002\/cpe.1435","volume":"21","author":"R. Islam","year":"2009","unstructured":"Islam, R., Zhou, W., Xiang, Y., Mahmood, A.N.: Spam filtering for network traffic security on a multi-core environment. Concurrency and Computation: Practice and Experience\u00a021(10), 1307\u20131320 (2009)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1109\/GrC.2007.123","volume-title":"2007 IEEE International Conference on Granular Computing (GRC)","author":"D. Tran","year":"2007","unstructured":"Tran, D., Ma, W., Sharma, D., Nguyen, T.: Possibility theory-based approach to spam email detection. In: 2007 IEEE International Conference on Granular Computing (GRC), p. 571. IEEE Computer Society, Washington, DC (2007)"}],"container-title":["Communications in Computer and Information Science","Information Intelligence, Systems, Technology and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19423-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T11:48:35Z","timestamp":1592308115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19423-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642194221","9783642194238"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19423-8_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}