{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T04:40:03Z","timestamp":1744000803519,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642330179"},{"type":"electronic","value":"9783642330186"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-33018-6_26","type":"book-chapter","created":{"date-parts":[[2012,8,23]],"date-time":"2012-08-23T09:14:19Z","timestamp":1345713259000},"page":"253-260","source":"Crossref","is-referenced-by-count":4,"title":["Combined Bayesian Classifiers Applied to Spam Filtering Problem"],"prefix":"10.1007","author":[{"given":"Karol","family":"Wr\u00f3tniak","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Wo\u017aniak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-12127-2_8","volume-title":"Multiple Classifier Systems","author":"B. Biggio","year":"2010","unstructured":"Biggio, B., Fumera, G., Roli, F.: Multiple Classifier Systems under Attack. In: El Gayar, N., Kittler, J., Roli, F. (eds.) MCS 2010. LNCS, vol.\u00a05997, pp. 74\u201383. Springer, Heidelberg (2010)"},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1145\/1081870.1081885","volume-title":"Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining","author":"S. Hershkop","year":"2005","unstructured":"Hershkop, S., Stolfo, S.J.: Combining email models for false positive reduction. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 98\u2013107. ACM, New York (2005)"},{"issue":"3","key":"26_CR3","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1093\/jigpal\/jzr011","volume":"20","author":"B. Kurlej","year":"2012","unstructured":"Kurlej, B., Wozniak, M.: Active learning approach to concept drift problem. Logic Journal of the IGPL\u00a020(3), 550\u2013559 (2012)","journal-title":"Logic Journal of the IGPL"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1531914.1531918","volume-title":"Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, AIRWeb 2009","author":"M. Erd\u00e9lyi","year":"2009","unstructured":"Erd\u00e9lyi, M., Bencz\u00far, A.A., Masan\u00e9s, J., Sikl\u00f3si, D.: Web spam filtering in internet archives. In: Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, AIRWeb 2009, pp. 17\u201320. ACM, New York (2009)"},{"key":"26_CR5","unstructured":"Pu, C., Webb, S.: Observed trends in spam construction techniques: A case study of spam evolution. In: CEAS (2006)"},{"issue":"2","key":"26_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/792550.792553","volume":"36","author":"M.R. Henzinger","year":"2002","unstructured":"Henzinger, M.R., Motwani, R., Silverstein, C.: Challenges in web search engines. SIGIR Forum\u00a036(2), 11\u201322 (2002)","journal-title":"SIGIR Forum"},{"key":"26_CR7","first-page":"44","volume-title":"Proceedings of the Fourth International Conference on Hybrid Intelligent Systems, HIS 2004","author":"C.C. Lai","year":"2004","unstructured":"Lai, C.C., Tsai, M.C.: An empirical performance comparison of machine learning methods for spam e-mail categorization. In: Proceedings of the Fourth International Conference on Hybrid Intelligent Systems, HIS 2004, pp. 44\u201348. IEEE Computer Society, Washington, DC (2004)"},{"key":"26_CR8","unstructured":"Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A bayesian approach to filtering junk E-mail. In: Learning for Text Categorization: Papers from the 1998 Workshop, Madison, Wisconsin. AAAI Technical Report WS-98-05 (1998)"},{"key":"26_CR9","unstructured":"Graham, P.: A plan for spam (August 2002), http:\/\/www.paulgraham.com\/spam.html"},{"key":"26_CR10","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/978-3-540-30116-5_38","volume-title":"Knowledge Discovery in Databases: PKDD 2004","author":"C. Siefkes","year":"2004","unstructured":"Siefkes, C., Assis, F., Chhabra, S., Yerazunis, W.S.: Combining Winnow and Orthogonal Sparse Bigrams for Incremental Spam Filtering. In: Boulicaut, J.-F., Esposito, F., Giannotti, F., Pedreschi, D. (eds.) PKDD 2004. LNCS (LNAI), vol.\u00a03202, pp. 410\u2013421. Springer, Heidelberg (2004)"},{"key":"26_CR11","series-title":"SCI","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-642-03999-7_3","volume-title":"Applications of Supervised and Unsupervised Ensemble Methods","author":"F. Gargiulo","year":"2009","unstructured":"Gargiulo, F., Penta, A., Picariello, A., Sansone, C.: A personal antispam system based on a behaviour-knowledge space approach. In: Okun, O., Valentini, G. (eds.) Applications of Supervised and Unsupervised Ensemble Methods. SCI, vol.\u00a0245, pp. 39\u201357. Springer, Heidelberg (2009)"},{"issue":"1","key":"26_CR12","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10462-009-9109-6","volume":"29","author":"E. Blanzieri","year":"2008","unstructured":"Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artif. Intell. Rev.\u00a029(1), 63\u201392 (2008)","journal-title":"Artif. Intell. Rev."},{"key":"26_CR13","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1964114.1964121","volume-title":"Proceedings of the 2011 Joint WICOW\/AIRWeb Workshop on Web Quality. WebQuality 2011","author":"M. Erd\u00e9lyi","year":"2011","unstructured":"Erd\u00e9lyi, M., Garz\u00f3, A., Bencz\u00far, A.A.: Web spam classification: a few features worth more. In: Proceedings of the 2011 Joint WICOW\/AIRWeb Workshop on Web Quality. WebQuality 2011, pp. 27\u201334. ACM, New York (2011)"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Kuncheva, L.I.: Combining pattern classifiers: methods and algorithms. Wiley-Interscience (2004)","DOI":"10.1002\/0471660264"},{"issue":"8","key":"26_CR15","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1016\/j.knosys.2006.05.002","volume":"19","author":"M. Wozniak","year":"2006","unstructured":"Wozniak, M.: Proposition of common classifier construction for pattern recognition with context task. Knowledge-Based Systems\u00a019(8), 617\u2013624 (2006)","journal-title":"Knowledge-Based Systems"},{"key":"26_CR16","volume-title":"Proceedings of the Eighth International Workshop on Frontiers in Handwriting Recognition, IWFHR 2002","author":"M. van Erp","year":"2002","unstructured":"van Erp, M., Vuurpijl, L., Schomaker, L.: An overview and comparison of voting methods for pattern recognition. In: Proceedings of the Eighth International Workshop on Frontiers in Handwriting Recognition, IWFHR 2002. IEEE Computer Society, Washington, DC (2002)"},{"key":"26_CR17","volume-title":"Pattern Recognition and Machine Learning (Information Science and Statistics)","author":"C.M. Bishop","year":"2006","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning (Information Science and Statistics). Springer-Verlag New York, Inc., Secaucus (2006)"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Duin, R.P.W.: The combining classifier: To train or not to train? In: International Conference on Pattern Recognition, vol.\u00a02, p. 20765 (2002)","DOI":"10.1109\/ICPR.2002.1048415"},{"issue":"5","key":"26_CR19","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1162\/neco.1995.7.5.867","volume":"7","author":"R.A. Jacobs","year":"1995","unstructured":"Jacobs, R.A.: Methods for combining experts\u2019 probability assessments. Neural Comput.\u00a07(5), 867\u2013888 (1995)","journal-title":"Neural Comput."},{"issue":"2","key":"26_CR20","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s10044-011-0201-6","volume":"15","author":"R. Burduk","year":"2012","unstructured":"Burduk, R.: Imprecise information in bayes classifier. Pattern Anal. Appl.\u00a015(2), 147\u2013153 (2012)","journal-title":"Pattern Anal. Appl."},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/S1566-2535(02)00051-9","volume":"3","author":"C.A. Shipp","year":"2002","unstructured":"Shipp, C.A., Kuncheva, L.I.: Relationships between combination methods and measures of diversity in combining classifiers. Information Fusion\u00a03, 135\u2013148 (2002)","journal-title":"Information Fusion"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33018-6_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T04:03:27Z","timestamp":1743998607000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33018-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642330179","9783642330186"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33018-6_26","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}