{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:51:56Z","timestamp":1742914316607,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813368347"},{"type":"electronic","value":"9789813368354"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-33-6835-4_27","type":"book-chapter","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T09:20:32Z","timestamp":1612430432000},"page":"402-419","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Integrated Model to Email Spam Classification Using an Enhanced Grasshopper Optimization Algorithm to Train a Multilayer Perceptron Neural Network"],"prefix":"10.1007","author":[{"given":"Sanaa A. A.","family":"Ghaleb","sequence":"first","affiliation":[]},{"given":"Mumtazimah","family":"Mohamad","sequence":"additional","affiliation":[]},{"given":"Engku Fadzli Hasan Syed","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Waheed A. H. M.","family":"Ghanem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,5]]},"reference":[{"issue":"2","key":"27_CR1","first-page":"436","volume":"3","author":"AA Naem","year":"2018","unstructured":"Naem, A.A., Ghali, N.I., Saleh, A.A.: Antlion optimization and boosting classifier for spam email detection. Futur. Comput. Inf. J. 3(2), 436\u2013442 (2018)","journal-title":"Futur. Comput. Inf. J."},{"key":"27_CR2","unstructured":"ZhiWei, M., Singh, M.M., Zaaba, Z.F.: Email spam detection: a method of meta-classifiers stacking. In: The 6th International Conference on Computing and Informatics, pp. 750\u2013757 (2017)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Yang, L., Dumais, S.T., Bennett, P.N., Awadallah, A.H.: Characterizing and predicting enterprise email reply behavior. In: Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 235\u2013244, August 2017","DOI":"10.1145\/3077136.3080782"},{"issue":"2","key":"27_CR4","doi-asserted-by":"publisher","first-page":"316","DOI":"10.18178\/ijmlc.2020.10.2.937","volume":"10","author":"S Douzi","year":"2020","unstructured":"Douzi, S., AlShahwan, F., Lemoudden, M., Ouahidi, B.: Hybrid email spam detection model using artificial intelligence. Int. J. Mach. Learn. Comput. 10(2), 316\u2013322 (2020)","journal-title":"Int. J. Mach. Learn. Comput."},{"issue":"5","key":"27_CR5","first-page":"19","volume":"8","author":"A Yasin","year":"2016","unstructured":"Yasin, A., AbuAlrub, F.: Enhance RFID security against Brute force attack based on password strength and Markov model. Int. J. Netw. Secur. Appl 8(5), 19\u201338 (2016)","journal-title":"Int. J. Netw. Secur. Appl"},{"issue":"3","key":"27_CR6","first-page":"17","volume":"3","author":"F Temitayo","year":"2012","unstructured":"Temitayo, F., Stephen, O., Abimbola, A.: Hybrid GA-SVM for efficient feature selection in e-mail classification. Comput. Eng. Intell. Syst. 3(3), 17\u201328 (2012)","journal-title":"Comput. Eng. Intell. Syst."},{"key":"27_CR7","first-page":"9","volume":"2088\u20138708","author":"G Rawashdeh","year":"2019","unstructured":"Rawashdeh, G., Bin Mamat, R., Bakar, Z.B.A., Rahim, N.H.A.: Comparative between optimization feature selection by using classifiers algorithms on spam email. Int. J. Electr. Comput. Eng. 2088\u20138708, 9 (2019)","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"27_CR8","unstructured":"Statista. https:\/\/www.statista.com\/statistics\/255080\/number-of-e-mail-users-world-wide\/. Accessed 29 Nov 2020"},{"key":"27_CR9","unstructured":"Renuka, D.K., Visalakshi, P., Sankar, T.: Improving E-mail spam classification using ant colony optimization algorithm. Int. J. Comput. Appl. ICICT 2015, 22\u201326 (2015)"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Dada, E.G., Bassi, J.S., Chiroma, H., Abdulhamid, S.M., Adetunmbi, A.O., Aji-buwa, O.E.: Machine learning for email spam filtering: review, approaches and open research problems. Heliyon 5(6), e01802 (2019)","DOI":"10.1016\/j.heliyon.2019.e01802"},{"issue":"2","key":"27_CR11","doi-asserted-by":"publisher","first-page":"73","DOI":"10.17706\/jcp.15.2.73-84","volume":"15","author":"A Bibi","year":"2020","unstructured":"Bibi, A., Latif, R., Khalid, S., Ahmed, W., Shabir, R.A., Shahryar, T.: Spam mail scanning using machine learning algorithm. JCP 15(2), 73\u201384 (2020)","journal-title":"JCP"},{"issue":"01","key":"27_CR12","doi-asserted-by":"publisher","first-page":"1950008","DOI":"10.1142\/S0219649219500084","volume":"18","author":"OME Ebadati","year":"2019","unstructured":"Ebadati, O.M.E., Ahmadzadeh, F.: Classification spam email with elimination of unsuitable features with hybrid of GA-naive Bayes. J. Inf. Knowl. Manage. 18(01), 1950008 (2019)","journal-title":"J. Inf. Knowl. Manage."},{"issue":"3","key":"27_CR13","first-page":"227","volume":"1","author":"I Idris","year":"2011","unstructured":"Idris, I.: E-mail spam classification with artificial neural network and negative selection algorithm. Int. J. Comput. Sci. Commun. Netw. 1(3), 227\u2013231 (2011)","journal-title":"Int. J. Comput. Sci. Commun. Netw."},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Faris, H., Aljarah, I., Alqatawna, J.F.: Optimizing feedforward neural networks using krill herd algorithm for e-mail spam detection. In: 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), pp. 1\u20135. IEEE, November 2015","DOI":"10.1109\/AEECT.2015.7360576"},{"issue":"01","key":"27_CR15","first-page":"19","volume":"9","author":"A Rodan","year":"2016","unstructured":"Rodan, A., Faris, H., Alqatawna, J.F.: Optimizing feedforward neural networks using Biogeography based optimization for e-mail spam identification. Int. J. Commun. Netw. Syst. Sci. 9(01), 19 (2016)","journal-title":"Int. J. Commun. Netw. Syst. Sci."},{"issue":"24","key":"27_CR16","first-page":"6788","volume":"95","author":"A Jantan","year":"2017","unstructured":"Jantan, A., Ghanem, W.A., Ghaleb, S.A.: Using modified bat algorithm to train neural networks for spam detection. J. Theoret. Appl. Inf. Technol. 95(24), 6788\u20136799 (2017)","journal-title":"J. Theoret. Appl. Inf. Technol."},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Singh, S., Chand, A., Lal, S.P.: Improving spam detection using neural networks trained by memetic algorithm. In: 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation, pp. 55\u201360. IEEE, September 2013","DOI":"10.1109\/CIMSim.2013.18"},{"key":"27_CR18","unstructured":"Manjusha, K., Kumar, R.: Spam mail classification using combined approach of Bayesian and neural network. In: 2010 International Conference on Computational Intelligence and Communication Networks, pp. 145\u2013149. IEEE, November 2010"},{"issue":"4","key":"27_CR19","doi-asserted-by":"publisher","first-page":"3827","DOI":"10.1016\/j.asoc.2011.02.021","volume":"11","author":"AH Mohammad","year":"2011","unstructured":"Mohammad, A.H., Zitar, R.A.: Application of genetic optimized artificial immune system and neural networks in spam detection. Appl. Soft Comput. 11(4), 3827\u20133845 (2011)","journal-title":"Appl. Soft Comput."},{"key":"27_CR20","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.advengsoft.2017.01.004","volume":"105","author":"S Saremi","year":"2017","unstructured":"Saremi, S., Mirjalili, S., Lewis, A.: Grasshopper optimisation algorithm: theory and application. Adv. Eng. Softw. 105, 30\u201347 (2017)","journal-title":"Adv. Eng. Softw."},{"issue":"17","key":"27_CR21","doi-asserted-by":"publisher","first-page":"7941","DOI":"10.1007\/s00500-018-3424-2","volume":"23","author":"AA Heidari","year":"2019","unstructured":"Heidari, A.A., Faris, H., Aljarah, I., Mirjalili, S.: An efficient hybrid multilayer perceptron neural network with grasshopper optimization. Soft. Comput. 23(17), 7941\u20137958 (2019). https:\/\/doi.org\/10.1007\/s00500-018-3424-2","journal-title":"Soft. Comput."},{"issue":"1","key":"27_CR22","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s00521-016-2665-1","volume":"30","author":"WA Ghanem","year":"2018","unstructured":"Ghanem, W.A., Jantan, A.: Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems. Neural Comput. Appl. 30(1), 163\u2013181 (2018). https:\/\/doi.org\/10.1007\/s00521-016-2665-1","journal-title":"Neural Comput. Appl."},{"key":"27_CR23","doi-asserted-by":"publisher","unstructured":"Ghanem, W.A.H.M., Jantan, A.: A novel hybrid artificial bee colony with monarch butterfly optimization for global optimization problems. In: Vasant, P., Litvinchev, I., Marmolejo-Saucedo, J. (eds.) Modeling, Simulation, and Optimization. EAI\/Springer Innovations in Communication and Computing, pp. 27\u201338. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-70542-2_3","DOI":"10.1007\/978-3-319-70542-2_3"},{"issue":"1","key":"27_CR24","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/s00521-017-3021-9","volume":"31","author":"WA Ghanem","year":"2019","unstructured":"Ghanem, W.A., Jantan, A.: An enhanced Bat algorithm with mutation operator for numerical optimization problems. Neural Comput. Appl. 31(1), 617\u2013651 (2019). https:\/\/doi.org\/10.1007\/s00521-017-3021-9","journal-title":"Neural Comput. Appl."},{"key":"27_CR25","doi-asserted-by":"publisher","first-page":"130452","DOI":"10.1109\/ACCESS.2020.3009533","volume":"8","author":"WAH Ghanem","year":"2020","unstructured":"Ghanem, W.A.H., Jantan, A., Ghaleb, S.A.A., Nasser, A.B.: An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons. IEEE Access 8, 130452\u2013130475 (2020)","journal-title":"IEEE Access"},{"issue":"1","key":"27_CR26","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1007\/s11063-019-10120-x","volume":"51","author":"WA Ghanem","year":"2020","unstructured":"Ghanem, W.A., Jantan, A.: Training a neural network for cyberattack classification applications using hybridization of an artificial bee colony and monarch butterfly optimization. Neural Process. Lett. 51(1), 905\u2013946 (2020). https:\/\/doi.org\/10.1007\/s11063-019-10120-x","journal-title":"Neural Process. Lett."},{"issue":"6","key":"27_CR27","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1007\/s12559-018-9588-3","volume":"10","author":"WA Ghanem","year":"2018","unstructured":"Ghanem, W.A., Jantan, A.: A cognitively inspired hybridization of artificial bee colony and dragonfly algorithms for training multi-layer perceptrons. Cogn. Comput. 10(6), 1096\u20131134 (2018). https:\/\/doi.org\/10.1007\/s12559-018-9588-3","journal-title":"Cogn. Comput."},{"key":"27_CR28","doi-asserted-by":"publisher","unstructured":"Ghanem, W.A., Jantan, A.: A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm. Neural Comput. Appl., 1\u201334 (2019). https:\/\/doi.org\/10.1007\/s00521-019-04655-2","DOI":"10.1007\/s00521-019-04655-2"},{"key":"27_CR29","unstructured":"Ghanem, W.A.H., Jantan, A.: Using hybrid artificial bee colony algorithm and particle swarm optimization for training feed-forward neural networks. J. Theoret. Appl. Inf. Technol. 67(3), 664-674 (2014)"},{"key":"27_CR30","doi-asserted-by":"crossref","unstructured":"Ghanem, W.A.H. Jantan, A.: Swarm intelligence and neural network for data classification. In 2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014), pp. 196\u2013201. IEEE, November 2014","DOI":"10.1109\/ICCSCE.2014.7072714"},{"key":"27_CR31","unstructured":"Hopkins, M., et al.: UCI Machine Learning Repository: SpamAssassin Data Set. https:\/\/www.kaggle.com\/beatoa\/spamassassin-public-corpus"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-6835-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:00:27Z","timestamp":1619316027000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-33-6835-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789813368347","9789813368354"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-6835-4_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}