{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,20]],"date-time":"2026-05-20T02:35:16Z","timestamp":1779244516479,"version":"3.51.4"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000861","name":"Burroughs Wellcome Fund","doi-asserted-by":"publisher","award":["1021177"],"award-info":[{"award-number":["1021177"]}],"id":[{"id":"10.13039\/100000861","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s00500-020-05297-6","type":"journal-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T11:42:31Z","timestamp":1599738151000},"page":"2277-2293","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":287,"title":["Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8594-4742","authenticated-orcid":false,"given":"Indika","family":"Wickramasinghe","sequence":"first","affiliation":[]},{"given":"Harsha","family":"Kalutarage","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"issue":"9","key":"5297_CR1","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.3923\/itj.2012.1166.1174","volume":"11","author":"K Al-Aidaroos","year":"2012","unstructured":"Al-Aidaroos K, Bakar A, Othman Z (2012) Medical data classification with Naive Bayes approach. Inf Technol J 11(9):1166\u20131174","journal-title":"Inf Technol J"},{"key":"5297_CR2","volume-title":"Evading machine learning malware detection","author":"HS Anderson","year":"2017","unstructured":"Anderson HS, Kharkar A, Filar B, Roth P (2017) Evading machine learning malware detection. Black Hat, London"},{"key":"5297_CR3","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.asoc.2017.05.043","volume":"59","author":"\u00d6F Arar","year":"2017","unstructured":"Arar \u00d6F, Ayan K (2017) A feature dependent Naive Bayes approach and its application to the software defect prediction problem. Appl Soft Comput 59:197\u2013209","journal-title":"Appl Soft Comput"},{"key":"5297_CR4","doi-asserted-by":"crossref","unstructured":"Carbin M, Rinard MC (2010) Automatically identifying critical input regions and code in applications. In: Proceedings of the 19th international symposium on software testing and analysis. ACM, pp 37\u201348","DOI":"10.1145\/1831708.1831713"},{"key":"5297_CR5","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.watres.2015.08.035","volume":"85","author":"G Carvajal","year":"2015","unstructured":"Carvajal G, Roser DJ, Sisson SA, Keegan A, Khan SJ (2015) Modelling pathogen log10 reduction values achieved by activated sludge treatment using na\u00efve and semi na\u00efve bayes network models. Water Res 85:304\u2013315","journal-title":"Water Res"},{"issue":"4","key":"5297_CR6","doi-asserted-by":"publisher","first-page":"7346","DOI":"10.1016\/j.eswa.2008.10.027","volume":"36","author":"C Catal","year":"2009","unstructured":"Catal C, Diri B (2009) A systematic review of software fault prediction studies. Expert Syst Appl 36(4):7346\u20137354","journal-title":"Expert Syst Appl"},{"key":"5297_CR7","unstructured":"Chaba S, Kumar R, Pant R, Dave M (2017) Malware detection approach for android systems using system call logs. arXiv:1709.08805"},{"key":"5297_CR8","doi-asserted-by":"crossref","unstructured":"Clark P, Niblett T (1989) The CN2 induction algorithm. Mach Learn 3(4):261\u2013283","DOI":"10.1007\/BF00116835"},{"key":"5297_CR9","volume-title":"Elements of information theory","author":"TM Cover","year":"2012","unstructured":"Cover TM, Thomas JA (2012) Elements of information theory. Wiley, Hoboken"},{"issue":"4","key":"5297_CR10","doi-asserted-by":"publisher","first-page":"2086","DOI":"10.1007\/s10664-017-9571-8","volume":"23","author":"B Danglot","year":"2018","unstructured":"Danglot B, Preux P, Baudry B, Monperrus M (2018) Correctness attraction: a study of stability of software behavior under runtime perturbation. Empir Softw Eng 23(4):2086\u20132119","journal-title":"Empir Softw Eng"},{"key":"5297_CR11","doi-asserted-by":"crossref","unstructured":"Devasia T, Vinushree T, Hegde V (2016) Prediction of students performance using educational data mining. In: 2016 International conference on data mining and advanced computing (SAPIENCE). IEEE, pp 91\u201395","DOI":"10.1109\/SAPIENCE.2016.7684167"},{"key":"5297_CR12","unstructured":"Dhamodharan S (2014) Liver disease prediction using Bayesian classification. In: 4th national conference on advanced computing, applications & technologies, pp 1\u20133"},{"key":"5297_CR13","unstructured":"Domingos P, Pazzani M (1996) Beyond independence: conditions for the optimality of the simple Bayesian classifier. In: Saitta L (ed) Proceedings of the Thirteenth International Conference on Machine Learning. Morgan Kaufmann, San Francisco, CA, pp 105\u2013112"},{"key":"5297_CR14","unstructured":"Elkan C (1997) Boosting and Naive Bayesian learning. In: Proceedings of the international conference on knowledge discovery and data mining"},{"key":"5297_CR15","unstructured":"Ferreira J, Denison D, Hand D (2001) Weighted Naive Bayes modelling for data mining. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.29.1176&rep=rep1&type=pdf"},{"key":"5297_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.ins.2013.10.007","volume":"260","author":"MJ Flores","year":"2014","unstructured":"Flores MJ, G\u00e1mez JA, Mart\u00ednez AM (2014) Domains of competence of the semi-naive Bayesian network classifiers. Inf Sci 260:120\u2013148","journal-title":"Inf Sci"},{"key":"5297_CR17","unstructured":"Frank E, Hall M, Pfahringer B (2002) Locally weighted naive bayes. In: Proceedings of the nineteenth conference on uncertainty in artificial intelligence. Morgan Kaufmann Publishers Inc, pp 249\u2013256"},{"key":"5297_CR18","unstructured":"Friedman N, Goldszmidt M (1996) Building classifiers using Bayesian networks. In: Proceedings of the national conference on artificial intelligence, pp 1277\u20131284"},{"issue":"01","key":"5297_CR19","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1055\/s-0038-1634813","volume":"30","author":"A Gammerman","year":"1991","unstructured":"Gammerman A, Thatcher A (1991) Bayesian diagnostic probabilities without assuming independence of symptoms. Methods Inf Med 30(01):15\u201322","journal-title":"Methods Inf Med"},{"key":"5297_CR20","doi-asserted-by":"crossref","unstructured":"Garg A, Roth D (2001) Understanding probabilistic classifiers. In: European conference on machine learning. Springer, pp 179\u2013191","DOI":"10.1007\/3-540-44795-4_16"},{"issue":"2","key":"5297_CR21","doi-asserted-by":"publisher","first-page":"191","DOI":"10.3233\/JCS-2012-0460","volume":"21","author":"A Geigel","year":"2013","unstructured":"Geigel A (2013) Neural network trojan. J Comput Secur 21(2):191\u2013232","journal-title":"J Comput Secur"},{"key":"5297_CR22","unstructured":"Geigel A (2014) Unsupervised learning trojan. Ph.D. thesis"},{"key":"5297_CR23","doi-asserted-by":"crossref","unstructured":"Hall M (2006) A decision tree-based attribute weighting filter for Naive Bayes. In: International conference on innovative techniques and applications of artificial intelligence. Springer, pp 59\u201370","DOI":"10.1007\/978-1-84628-663-6_5"},{"issue":"1","key":"5297_CR24","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1177\/096228029200100104","volume":"1","author":"D Hand","year":"1992","unstructured":"Hand D (1992) Statistical methods in diagnosis. Stat Methods Med Res 1(1):49\u201367","journal-title":"Stat Methods Med Res"},{"issue":"3","key":"5297_CR25","first-page":"385","volume":"69","author":"DJ Hand","year":"2001","unstructured":"Hand DJ, Yu K (2001) Idiot\u2019s bayes-not so stupid after all? Int Stat Rev 69(3):385\u2013398","journal-title":"Int Stat Rev"},{"key":"5297_CR26","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.infsof.2014.11.006","volume":"59","author":"P He","year":"2015","unstructured":"He P, Li B, Liu X, Chen J, Ma Y (2015) An empirical study on software defect prediction with a simplified metric set. Inf Softw Technol 59:170\u2013190","journal-title":"Inf Softw Technol"},{"key":"5297_CR27","unstructured":"Hilden J, Bjerregaard B (1976) Computer-aided diagnosis and the atypical case. Decision making and medical care: can information science help, pp 365\u2013378"},{"issue":"3","key":"5297_CR28","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1016\/j.patrec.2010.11.016","volume":"32","author":"L Jiang","year":"2011","unstructured":"Jiang L (2011) Random one-dependence estimators. Pattern Recognit Lett 32(3):532\u2013539","journal-title":"Pattern Recognit Lett"},{"issue":"2","key":"5297_CR29","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1080\/0952813X.2012.721010","volume":"25","author":"L Jiang","year":"2013","unstructured":"Jiang L, Cai Z, Zhang H, Wang D (2013) Naive bayes text classifiers: a locally weighted learning approach. J Exp Theor Artif Intell 25(2):273\u2013286","journal-title":"J Exp Theor Artif Intell"},{"issue":"01","key":"5297_CR30","doi-asserted-by":"publisher","first-page":"1250007","DOI":"10.1142\/S0218213011004770","volume":"21","author":"L Jiang","year":"2012","unstructured":"Jiang L, Wang D, Cai Z (2012) Discriminatively weighted Naive Bayes and its application in text classification. Int J Artif Intell Tools 21(01):1250007","journal-title":"Int J Artif Intell Tools"},{"key":"5297_CR31","doi-asserted-by":"crossref","unstructured":"Jin W, Shi R, Chua TS (2004) A semi-naive Bayesian method incorporating clustering with pair-wise constraints for auto image annotation. In: Proceedings of the 12th annual ACM international conference on multimedia. ACM, pp\u00a0336\u2013339","DOI":"10.1145\/1027527.1027605"},{"key":"5297_CR32","unstructured":"John GH, Langley P (1995) Estimating continuous distributions in Bayesian classifiers. In: Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence"},{"issue":"3","key":"5297_CR33","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s11235-017-0296-1","volume":"66","author":"HK Kalutarage","year":"2017","unstructured":"Kalutarage HK, Nguyen HN, Shaikh SA (2017) Towards a threat assessment framework for apps collusion. Telecommun Syst 66(3):417\u2013430","journal-title":"Telecommun Syst"},{"key":"5297_CR34","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.compeleceng.2015.07.007","volume":"47","author":"HK Kalutarage","year":"2015","unstructured":"Kalutarage HK, Shaikh SA, Wickramasinghe IP, Zhou Q, James AE (2015) Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. Comput Electr Eng 47:327\u2013344","journal-title":"Comput Electr Eng"},{"key":"5297_CR35","unstructured":"Kohavi R (1996) Scaling up the accuracy of Naive-Bayes classifiers: a decision-tree hybrid. In: Kdd, vol\u00a096. Citeseer, pp 202\u2013207"},{"key":"5297_CR36","doi-asserted-by":"crossref","unstructured":"Kononenko I (1991) Semi-naive Bayesian classifier. In: European working session on learning. Springer, pp 206\u2013219","DOI":"10.1007\/BFb0017015"},{"issue":"7","key":"5297_CR37","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1016\/j.patrec.2005.12.001","volume":"27","author":"LI Kuncheva","year":"2006","unstructured":"Kuncheva LI (2006) On the optimality of Naive Bayes with dependent binary features. Pattern Recognit Lett 27(7):830\u2013837","journal-title":"Pattern Recognit Lett"},{"key":"5297_CR38","first-page":"223","volume":"90","author":"P Langley","year":"1992","unstructured":"Langley P, Iba W, Thompson K et al (1992) An analysis of Bayesian classifiers. AAAI 90:223\u2013228","journal-title":"AAAI"},{"key":"5297_CR39","doi-asserted-by":"crossref","unstructured":"Langley P, Sage S (1994) Induction of selective bayesian classifers. In: Proceedings of the Tenth Conference on Uncertainty in Articial Intelligence Uncertainty. Morgan Kaufmann, Seattle, WA, pp 399\u2013406","DOI":"10.1016\/B978-1-55860-332-5.50055-9"},{"key":"5297_CR40","doi-asserted-by":"crossref","unstructured":"Lee CH, Gutierrez F, Dou D (2011) Calculating feature weights in Naive Bayes with Kullback\u2013Leibler measure. In: 2011 IEEE 11th international conference on data mining. IEEE, pp 1146\u20131151","DOI":"10.1109\/ICDM.2011.29"},{"issue":"2","key":"5297_CR41","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/JBHI.2015.2407157","volume":"20","author":"X Liu","year":"2015","unstructured":"Liu X, Lu R, Ma J, Chen L, Qin B (2015) Privacy-preserving patient-centric clinical decision support system on Naive Bayesian classification. IEEE J Biomed Health Informatics 20(2):655\u2013668","journal-title":"IEEE J Biomed Health Informatics"},{"key":"5297_CR42","unstructured":"Lowd D, Meek C (2005) Good word attacks on statistical spam filters. In: CEAS, vol 2005"},{"key":"5297_CR43","doi-asserted-by":"crossref","unstructured":"Lv Z, Li X (2015) Virtual reality assistant technology for learning primary geography. In: International conference on web-based learning. Springer, pp 31\u201340","DOI":"10.1007\/978-3-319-32865-2_4"},{"key":"5297_CR44","doi-asserted-by":"crossref","unstructured":"Mani S, Pazzani MJ, West J (1997) Knowledge discovery from a breast cancer database. In: Conference on artificial intelligence in medicine in Europe. Springer, pp 130\u2013133","DOI":"10.1007\/BFb0029444"},{"key":"5297_CR45","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.aap.2015.06.014","volume":"84","author":"HR Marucci-Wellman","year":"2015","unstructured":"Marucci-Wellman HR, Lehto MR, Corns HL (2015) A practical tool for public health surveillance: semi-automated coding of short injury narratives from large administrative databases using na\u00efve bayes algorithms. Accid Anal Prev 84:165\u2013176","journal-title":"Accid Anal Prev"},{"issue":"1","key":"5297_CR46","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"33","author":"T Menzies","year":"2006","unstructured":"Menzies T, Greenwald J, Frank A (2006) Data mining static code attributes to learn defect predictors. IEEE Trans Softw Eng 33(1):2\u201313","journal-title":"IEEE Trans Softw Eng"},{"key":"5297_CR47","doi-asserted-by":"crossref","unstructured":"Nafea IT (2018) Machine learning in educational technology. In: Machine learning-advanced techniques and emerging applications. pp 175\u2013183","DOI":"10.5772\/intechopen.72906"},{"issue":"4","key":"5297_CR48","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/0010-4809(71)90022-X","volume":"4","author":"RA Nordyke","year":"1971","unstructured":"Nordyke RA, Kulikowski CA, Kulikowski CW (1971) A comparison of methods for the automated diagnosis of thyroid dysfunction. Comput Biomed Res 4(4):374\u2013389","journal-title":"Comput Biomed Res"},{"issue":"1","key":"5297_CR49","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/0933-3657(95)00018-6","volume":"8","author":"C Ohmann","year":"1996","unstructured":"Ohmann C, Moustakis V, Yang Q, Lang K, Group AAPS et al (1996) Evaluation of automatic knowledge acquisition techniques in the diagnosis of acute abdominal pain. Artif Intell Med 8(1):23\u201336","journal-title":"Artif Intell Med"},{"issue":"3","key":"5297_CR50","first-page":"290","volume":"3","author":"SA Pattekari","year":"2012","unstructured":"Pattekari SA, Parveen A (2012) Prediction system for heart disease using Na\u00efve Bayes. Int J Adv Comput Math Sci 3(3):290\u2013294","journal-title":"Int J Adv Comput Math Sci"},{"key":"5297_CR51","doi-asserted-by":"crossref","unstructured":"Pazzani MJ (1996) Searching for dependencies in Bayesian classifiers. In: Learning from data. Springer, pp 239\u2013248","DOI":"10.1007\/978-1-4612-2404-4_23"},{"key":"5297_CR52","doi-asserted-by":"crossref","unstructured":"Provan GM, Singh M (1996) Learning Bayesian networks using feature selection. In: Learning from Data. Springer, New York, NY, pp 291\u2013300","DOI":"10.1007\/978-1-4612-2404-4_28"},{"key":"5297_CR53","doi-asserted-by":"crossref","unstructured":"Queiroz R, Berger T, Czarnecki K (2016) Towards predicting feature defects in software product lines. In: Proceedings of the 7th international workshop on feature-oriented software development. ACM, pp 58\u201362","DOI":"10.1145\/3001867.3001874"},{"key":"5297_CR54","doi-asserted-by":"crossref","unstructured":"Rasmussen CE (2003) Gaussian processes in machine learning. In: Summer school on machine learning. Springer, pp 63\u201371","DOI":"10.1007\/978-3-540-28650-9_4"},{"issue":"17","key":"5297_CR55","first-page":"12","volume":"43","author":"C Ravi","year":"2012","unstructured":"Ravi C, Manoharan R (2012) Malware detection using windows api sequence and machine learning. Int J Comput Appl 43(17):12\u201316","journal-title":"Int J Comput Appl"},{"key":"5297_CR56","doi-asserted-by":"crossref","unstructured":"Razaque F, Soomro N, Shaikh SA, Soomro S, Samo JA, Kumar N, Dharejo H (2017) Using na\u00efve bayes algorithm to students\u2019 bachelor academic performances analysis. In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS). IEEE, pp 1\u20135","DOI":"10.1109\/ICETAS.2017.8277884"},{"key":"5297_CR57","unstructured":"Rennie JD, Shih L, Teevan J, Karger DR (2003) Tackling the poor assumptions of Naive Bayes text classifiers. In: Proceedings of the 20th international conference on machine learning (ICML-03), pp 616\u2013623"},{"key":"5297_CR58","unstructured":"Rish I et\u00a0al (2001) An empirical study of the Naive Bayes classifier. In: IJCAI 2001 workshop on empirical methods in artificial intelligence, vol\u00a03, pp 41\u201346"},{"key":"5297_CR59","doi-asserted-by":"crossref","unstructured":"Robles V, Larra\u00f1aga P, Pe\u00f1a J, P\u00e9rez M, Menasalvas E, Herves V (2003) Bayesian netwoks as consensed voting system in the construction of a multi-classifier for protein secondary structure prediction. Artif Intell Med","DOI":"10.1016\/j.artmed.2004.01.009"},{"issue":"6","key":"5297_CR60","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1016\/0010-4809(83)90040-X","volume":"16","author":"E Russek","year":"1983","unstructured":"Russek E, Kronmal RA, Fisher LD (1983) The effect of assuming independence in applying bayes\u2019 theorem to risk estimation and classification in diagnosis. Comput Biomed Res 16(6):537\u2013552","journal-title":"Comput Biomed Res"},{"key":"5297_CR61","unstructured":"Sayfullina L, Eirola E, Komashinsky D, Palumbo P, Miche Y, Lendasse A, Karhunen J (2015) Improved naive bayes classifier for android malware classification. In: The Proceedings of the 14th IEEE international conference on trust, security and privacy in computing and communications (IEEE TrustCom\u201915)(Aug. 2015). IEEE"},{"issue":"1","key":"5297_CR62","first-page":"46","volume":"4","author":"N Settouti","year":"2016","unstructured":"Settouti N, Bechar MEA, Chikh MA (2016) Statistical comparisons of the top 10 algorithms in data mining for classification task. Int J Interact Multimed Artif Intell 4(1):46\u201351","journal-title":"Int J Interact Multimed Artif Intell"},{"issue":"1","key":"5297_CR63","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1007\/s10586-017-0981-6","volume":"21","author":"F Shang","year":"2018","unstructured":"Shang F, Li Y, Deng X, He D (2018) Android malware detection method based on Naive Bayes and permission correlation algorithm. Cluster Comput 21(1):955\u2013966","journal-title":"Cluster Comput"},{"issue":"2","key":"5297_CR64","doi-asserted-by":"publisher","first-page":"145","DOI":"10.2307\/2981918","volume":"144","author":"D Titterington","year":"1981","unstructured":"Titterington D, Murray G, Murray L, Spiegelhalter D, Skene A, Habbema J, Gelpke G (1981) Comparison of discrimination techniques applied to a complex data set of head injured patients. J R Stat Soc Ser A (Gen) 144(2):145\u2013161","journal-title":"J R Stat Soc Ser A (Gen)"},{"issue":"04","key":"5297_CR65","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1055\/s-0038-1635048","volume":"33","author":"Ba Todd","year":"1994","unstructured":"Todd Ba, Stamper R (1994) The relative accuracy of a variety of medical diagnostic programs. Methods Inf Med 33(04):402\u2013416","journal-title":"Methods Inf Med"},{"issue":"9","key":"5297_CR66","first-page":"441","volume":"2","author":"K Vembandasamy","year":"2015","unstructured":"Vembandasamy K, Sasipriya R, Deepa E (2015) Heart diseases detection using Naive Bayes algorithm. Int J Innov Sci Eng Technol 2(9):441\u2013444","journal-title":"Int J Innov Sci Eng Technol"},{"issue":"22","key":"5297_CR67","first-page":"12693","volume":"12","author":"S Veni","year":"2017","unstructured":"Veni S, Srinivasan A (2017) Defect classification using Na\u00efve Bayes classification. Int J Appl Eng Res 12(22):12693\u201312700","journal-title":"Int J Appl Eng Res"},{"issue":"4","key":"5297_CR68","first-page":"816","volume":"4","author":"S Vijayarani","year":"2015","unstructured":"Vijayarani S, Dhayanand S (2015) Liver disease prediction using svm and Na\u00efve Bayes algorithms. Int J Sci Eng Technol Res (IJSETR) 4(4):816\u2013820","journal-title":"Int J Sci Eng Technol Res (IJSETR)"},{"key":"5297_CR69","unstructured":"Vinod P, Jaipur R, Laxmi V, Gaur M (2009) Survey on malware detection methods. In: Proceedings of the 3rd Hackers\u2019 workshop on computer and internet security (IITKHACK\u201909), pp 74\u201379"},{"key":"5297_CR70","doi-asserted-by":"crossref","unstructured":"Wickramasinghe I, Kalutarage H (2020) Naive Bayes: applications, variations and vulnerabilities\u2014a review of literature with code snippets for implementation. https:\/\/github.com\/HarshaKumaraKalutarage\/Naive-Bayes-Applications-and-Vulnerabilities","DOI":"10.1007\/s00500-020-05297-6"},{"key":"5297_CR71","unstructured":"Wittel GL, Wu SF (2004) On attacking statistical spam filters. In: CEAS"},{"issue":"1","key":"5297_CR72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X Wu","year":"2008","unstructured":"Wu X, Kumar V, Quinlan JR, Ghosh J, Yang Q, Motoda H, McLachlan GJ, Ng A, Liu B, Philip SY et al (2008) Top 10 algorithms in data mining. Knowl Inf Syst 14(1):1\u201337","journal-title":"Knowl Inf Syst"},{"key":"5297_CR73","unstructured":"Xiao H (2017) Adversarial and secure machine learning. Ph.D. thesis, Technische Universit\u201dAT M\u201d Unchen"},{"issue":"1","key":"5297_CR74","doi-asserted-by":"publisher","first-page":"118","DOI":"10.2478\/eurodl-2014-0008","volume":"17","author":"E Yukselturk","year":"2014","unstructured":"Yukselturk E, Ozekes S, T\u00fcrel YK (2014) Predicting dropout student: an application of data mining methods in an online education program. Eur J Open Distance e-Learn 17(1):118\u2013133","journal-title":"Eur J Open Distance e-Learn"},{"issue":"1","key":"5297_CR75","first-page":"1947","volume":"14","author":"NA Zaidi","year":"2013","unstructured":"Zaidi NA, Cerquides J, Carman MJ, Webb GI (2013) Alleviating Naive Bayes attribute independence assumption by attribute weighting. J Mach Learn Res 14(1):1947\u20131988","journal-title":"J Mach Learn Res"},{"issue":"2","key":"5297_CR76","first-page":"3","volume":"1","author":"H Zhang","year":"2004","unstructured":"Zhang H (2004) The optimality of Naive Bayes. AA 1(2):3","journal-title":"AA"},{"key":"5297_CR77","doi-asserted-by":"crossref","unstructured":"Zhang H, Sheng S (2004) Learning weighted Naive Bayes with accurate ranking. In: Fourth IEEE international conference on data mining (ICDM\u201904). IEEE, pp 567\u2013570","DOI":"10.1109\/ICDM.2004.10030"},{"issue":"1","key":"5297_CR78","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10994-011-5275-2","volume":"87","author":"F Zheng","year":"2012","unstructured":"Zheng F, Webb GI, Suraweera P, Zhu L (2012) Subsumption resolution: an efficient and effective technique for semi-naive Bayesian learning. Mach Learn 87(1):93\u2013125","journal-title":"Mach Learn"},{"key":"5297_CR79","unstructured":"Zheng Z, Webb GI, Ting KM (1999) Lazy bayesian rules: A lazy semi-naive bayesian learning technique competitive to boosting decision trees. In: Proceedings of 16th international conference on machine learning. Citeseer"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-020-05297-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-020-05297-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-020-05297-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T18:17:15Z","timestamp":1668709035000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-020-05297-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"references-count":79,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["5297"],"URL":"https:\/\/doi.org\/10.1007\/s00500-020-05297-6","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Author Indika Wickramasinghe declares that he has no conflict of interest. Author Harsha Kalutarage declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}