{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T15:53:15Z","timestamp":1744213995949,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813368347"},{"type":"electronic","value":"9789813368354"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-33-6835-4_28","type":"book-chapter","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T09:20:32Z","timestamp":1612430432000},"page":"420-434","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Spam Classification Based on Supervised Learning Using Grasshopper Optimization Algorithm and Artificial Neural Network"],"prefix":"10.1007","author":[{"given":"Sanaa A. A.","family":"Ghaleb","sequence":"first","affiliation":[]},{"given":"Mumtazimah","family":"Mohamad","sequence":"additional","affiliation":[]},{"given":"Engku Fadzli Hasan Syed","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Waheed A. H. M.","family":"Ghanem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,5]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Mohammad, R.M.A.: A lifelong spam emails classification model. Appl. Comput. Inf., 1\u201310 (2020, in press)","DOI":"10.1016\/j.aci.2020.01.002"},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"101343","DOI":"10.1016\/j.tele.2020.101343","volume":"48","author":"Y Kwak","year":"2020","unstructured":"Kwak, Y., Lee, S., Damiano, A., Vishwanath, A.: Why do users not report spear phishing emails? Telematics Inform. 48, 101343 (2020)","journal-title":"Telematics Inform."},{"key":"28_CR3","unstructured":"Singh, M.: User-centered spam detection using linear and non-linear machine learning models. Dspace.library.uvic.ca. (2019)"},{"key":"28_CR4","doi-asserted-by":"publisher","unstructured":"Vidya Kumari, K.R., Kavitha, C.R.: Spam detection using machine learning in R. In: Smys, S., Bestak, R., Chen, J.Z., Kotuliak, I. (eds.) International Conference on Computer Networks and Communication Technologies. Lecture Notes on Data Engineering and Communications Technologies, vol. 15, pp. 55\u201364. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-10-8681-6_7","DOI":"10.1007\/978-981-10-8681-6_7"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Wijaya, A., Bisri, A.: Hybrid decision tree and logistic regression classifier for email SD. In: 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE), pp. 1\u20134. IEEE, October 2016","DOI":"10.1109\/ICITEED.2016.7863267"},{"key":"28_CR6","first-page":"1","volume":"6","author":"OE Taylor","year":"2020","unstructured":"Taylor, O.E., Ezekiel, P.S.: A Model to Detect Spam Email Using Support Vector Classifier and Random Forest Classifier. Int. J. Comput. Sci. Math. Theory 6, 1\u201311 (2020)","journal-title":"Int. J. Comput. Sci. Math. Theory"},{"key":"28_CR7","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.ins.2017.01.015","volume":"385","author":"Y Ren","year":"2017","unstructured":"Ren, Y., Ji, D.: Neural networks for deceptive opinion spam detection: an empirical study. Inf. Sci. 385, 213\u2013224 (2017)","journal-title":"Inf. Sci."},{"key":"28_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.engappai.2014.11.001","volume":"39","author":"I Idris","year":"2015","unstructured":"Idris, I., Selamat, A., Nguyen, N.T., Omatu, S., Krejcar, O., Kuca, K., Penhaker, M.: A combined negative selection algorithm\u2013particle swarm optimization for an email spam detection system. Eng. Appl. Artif. Intell. 39, 33\u201344 (2015)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"28_CR9","unstructured":"Renuka, D.K., Visalakshi, P., Sankar, T.: Improving E-mail spam classification using ant colony optimization algorithm. Int. J. Comput. Appl. ICICT 2015(2), 22\u201326 (2015)"},{"issue":"6","key":"28_CR10","doi-asserted-by":"publisher","first-page":"e01802","DOI":"10.1016\/j.heliyon.2019.e01802","volume":"5","author":"EG Dada","year":"2019","unstructured":"Dada, E.G., Bassi, J.S., Chiroma, H., Abdulhamid, S.M., Adetunmbi, A.O., Aji-buwa, O.E.: Machine learning for email spam filtering: review, approaches and open research problems. Heliyon 5(6), e01802 (2019)","journal-title":"Heliyon"},{"issue":"2","key":"28_CR11","doi-asserted-by":"publisher","first-page":"73","DOI":"10.17706\/jcp.15.2.73-84","volume":"15","author":"A Bibi","year":"2020","unstructured":"Bibi, A., Latif, R., Khalid, S., Ahmed, W., Shabir, R.A., Shahryar, T.: Spam mail scanning using machine learning algorithm. JCP 15(2), 73\u201384 (2020)","journal-title":"JCP"},{"issue":"3","key":"28_CR12","first-page":"227","volume":"1","author":"I Idris","year":"2011","unstructured":"Idris, I.: E-mail spam classification with artificial neural network and negative selection algorithm. Int. J. Comput. Sci. Commun. Netw. 1(3), 227\u2013231 (2011)","journal-title":"Int. J. Comput. Sci. Commun. Netw."},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Faris, H., Aljarah, I., Alqatawna, J.F.: Optimizing feedforward neural networks using krill herd algorithm for e-mail SD. In: 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), pp. 1\u20135. IEEE, November 2015","DOI":"10.1109\/AEECT.2015.7360576"},{"issue":"01","key":"28_CR14","first-page":"19","volume":"9","author":"A Rodan","year":"2016","unstructured":"Rodan, A., Faris, H., Alqatawna, J.F.: Optimizing feedforward neural networks using biogeography based optimization for e-mail spam identification. Int. J. Commun. Netw. Syst. Sci. 9(01), 19 (2016)","journal-title":"Int. J. Commun. Netw. Syst. Sci."},{"key":"28_CR15","unstructured":"Jantan, A., Ghanem, W.A.H.M., Ghaleb, S.A.A.: Using modified bat algorithm to train neural networks for spam detection. J. Theoret. Appl. Inf. Technol. (JATIT) 95(24), 1\u201312 (2017)"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Singh, S., Chand, A., Lal, S.P.: Improving SD using neural networks trained by memetic algorithm. In: 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation, pp. 55\u201360. IEEE, September 2013","DOI":"10.1109\/CIMSim.2013.18"},{"key":"28_CR17","unstructured":"Manjusha, K., Kumar, R.: Spam mail classification using combined approach of Bayesian and neural network. In 2010 International Conference on Computational Intelligence and Communication Networks, pp. 145\u2013149. IEEE, November 2010"},{"issue":"4","key":"28_CR18","doi-asserted-by":"publisher","first-page":"3827","DOI":"10.1016\/j.asoc.2011.02.021","volume":"11","author":"AH Mohammad","year":"2011","unstructured":"Mohammad, A.H., Zitar, R.A.: Application of genetic optimized artificial immune system and neural networks in SD. Appl. Soft Comput. 11(4), 3827\u20133845 (2011)","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"28_CR19","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1162\/neco.1993.5.2.305","volume":"5","author":"J Park","year":"1993","unstructured":"Park, J., Sandberg, I.W.: Approximation and radial-basis-function networks. Neural Comput. 5(2), 305\u2013316 (1993)","journal-title":"Neural Comput."},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Ghanem, W.A.H., Jantan, A.: Swarm intelligence and neural network for data classification. In: 2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014), pp. 196\u2013201. IEEE, November 2014","DOI":"10.1109\/ICCSCE.2014.7072714"},{"key":"28_CR21","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.advengsoft.2017.01.004","volume":"105","author":"S Saremi","year":"2017","unstructured":"Saremi, S., Mirjalili, S., Lewis, A.: Grasshopper Optimisation algorithm: theory and application. Adv. Eng. Softw. 105, 30\u201347 (2017)","journal-title":"Adv. Eng. Softw."},{"issue":"1","key":"28_CR22","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1007\/s11063-019-10120-x","volume":"51","author":"WA Ghanem","year":"2020","unstructured":"Ghanem, W.A., Jantan, A.: Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization. Neural Process. Lett. 51(1), 905\u2013946 (2020). https:\/\/doi.org\/10.1007\/s11063-019-10120-x","journal-title":"Neural Process. Lett."},{"issue":"6","key":"28_CR23","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1007\/s12559-018-9588-3","volume":"10","author":"WA Ghanem","year":"2018","unstructured":"Ghanem, W.A., Jantan, A.: A cognitively inspired hybridization of artificial bee colony and dragonfly algorithms for training multi-layer perceptrons. Cognitive Computation 10(6), 1096\u20131134 (2018). https:\/\/doi.org\/10.1007\/s12559-018-9588-3","journal-title":"Cognitive Computation"},{"key":"28_CR24","doi-asserted-by":"publisher","unstructured":"Ghanem, W.A., Jantan, A.: A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm. Neural Comput. Appl., 1\u201334 (2019). https:\/\/doi.org\/10.1007\/s00521-019-04655-2","DOI":"10.1007\/s00521-019-04655-2"},{"key":"28_CR25","unstructured":"Hopkins, M., et al.: UCI Machine Learning Repository: SpamAssassin Data Set. https:\/\/www.kaggle.com\/beatoa\/spamassassin-public-corpus"},{"issue":"17","key":"28_CR26","doi-asserted-by":"publisher","first-page":"7941","DOI":"10.1007\/s00500-018-3424-2","volume":"23","author":"AA Heidari","year":"2019","unstructured":"Heidari, A.A., Faris, H., Aljarah, I., Mirjalili, S.: An efficient hybrid multilayer perceptron neural network with grasshopper optimization. Soft. Comput. 23(17), 7941\u20137958 (2019). https:\/\/doi.org\/10.1007\/s00500-018-3424-2","journal-title":"Soft. Comput."},{"key":"28_CR27","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.asoc.2014.05.002","volume":"22","author":"I Idris","year":"2014","unstructured":"Idris, I., Selamat, A.: Improved email SD model with negative selection algorithm and particle swarm optimization. Appl. Soft Comput. 22, 11\u201327 (2014)","journal-title":"Appl. Soft Comput."},{"key":"28_CR28","doi-asserted-by":"publisher","unstructured":"Davino, D., Camastra, F., Ciaramella, A., Staiano A.: Spam detection by machine learning-based content analysis. In: Esposito, A., Faundez-Zanuy, M., Morabito, F., Pasero, E. (eds.) Progresses in Artificial Intelligence and Neural Systems. Smart Innovation, Systems and Technologies, vol. 184, pp. 415\u2013422. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-5093-5_37","DOI":"10.1007\/978-981-15-5093-5_37"},{"issue":"8","key":"28_CR29","first-page":"596","volume":"3","author":"Z Razi","year":"2017","unstructured":"Razi, Z., Asghari, S.A.: Providing an improved feature extraction method for spam detection based on genetic algorithm in an immune. System 3(8), 596\u2013605 (2017)","journal-title":"System"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-6835-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T18:40:29Z","timestamp":1671043229000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-33-6835-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789813368347","9789813368354"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-6835-4_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}