{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:46:45Z","timestamp":1771613205130,"version":"3.50.1"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00920-1","type":"journal-article","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:42:30Z","timestamp":1730302950000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3264-601X","authenticated-orcid":false,"given":"Mohamed Aly","family":"Bouke","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2177-1854","authenticated-orcid":false,"given":"Omar Imhemed","family":"Alramli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8321-9259","authenticated-orcid":false,"given":"Azizol","family":"Abdullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,30]]},"reference":[{"key":"920_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115742","volume":"186","author":"S Rao","year":"2021","unstructured":"Rao, S., Verma, A.K., Bhatia, T.: A review on social spam detection: challenges, open issues, and future directions. Expert Syst. Appl. 186, 115742 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2021.115742","journal-title":"Expert Syst. Appl."},{"key":"920_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109032","volume":"212","author":"M Macas","year":"2022","unstructured":"Macas, M., Wu, C., Fuertes, W.: A survey on deep learning for cybersecurity: progress, challenges, and opportunities. Comput. Netw. 212, 109032 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2022.109032","journal-title":"Comput. Netw."},{"key":"920_CR3","doi-asserted-by":"publisher","first-page":"100092","DOI":"10.1016\/j.teler.2023.100092","volume":"11","author":"MA Bouke","year":"2023","unstructured":"Bouke, M.A., Abdullah, A., ALshatebi, S.H., Zaid, S.A., El Atigh, H.: The intersection of targeted advertising and security: Unraveling the mystery of overheard conversations. Telemat. Inform. Rep. 11, 100092 (2023). https:\/\/doi.org\/10.1016\/j.teler.2023.100092","journal-title":"Telemat. Inform. Rep."},{"issue":"2024","key":"920_CR4","doi-asserted-by":"publisher","first-page":"22","DOI":"10.14209\/jcis.2024.3","volume":"39","author":"M Bouke","year":"2024","unstructured":"Bouke, M., Abdullah, A., Udzir, N., Samian, N.: Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review. J. Commun. Inf. Syst. 39(2024), 22\u201334 (2024). https:\/\/doi.org\/10.14209\/jcis.2024.3","journal-title":"J. Commun. Inf. Syst."},{"key":"920_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117193","volume":"201","author":"A Occhipinti","year":"2022","unstructured":"Occhipinti, A., Rogers, L., Angione, C.: A pipeline and comparative study of 12 machine learning models for text classification. Expert Syst. Appl. 201, 117193 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2022.117193","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"920_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.48185\/jitc.v4i1.653","volume":"4","author":"MA Bouke","year":"2023","unstructured":"Bouke, M.A., Abdullah, A., Abdullah, M.T.: A lightweight machine learning-based email spam detection model using word frequency pattern. J. Inf. Technol. Comput. 4(1), 15\u201328 (2023). https:\/\/doi.org\/10.48185\/jitc.v4i1.653","journal-title":"J. Inf. Technol. Comput."},{"key":"920_CR7","doi-asserted-by":"publisher","unstructured":"Aliza, H. Y. et al.: A comparative analysis of SMS spam detection employing machine learning methods. In: 2022 6th international conference on computing methodologies and communication (ICCMC), IEEE, pp. 916\u2013922 (2022). https:\/\/doi.org\/10.1109\/ICCMC53470.2022.9754002","DOI":"10.1109\/ICCMC53470.2022.9754002"},{"key":"920_CR8","doi-asserted-by":"crossref","unstructured":"Mohamad, M., Selamat, A.: An evaluation on the efficiency of hybrid feature selection in spam email classification. In: 2015 international conference on computer, communications, and control technology (I4CT), pp. 227\u2013231 (2015)","DOI":"10.1109\/I4CT.2015.7219571"},{"key":"920_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-030-36056-6_6","volume-title":"Recent advances on soft computing and data mining: proceedings of the fourth international conference on soft computing and data mining (SCDM 2020), Melaka, Malaysia, January 22\u201323, 2020","author":"SA Khamis","year":"2020","unstructured":"Khamis, S.A., Foozy, C.F.M., Aziz, M.F.A., Rahim, N.: Header based email spam detection framework using Support Vector Machine (SVM) Technique. In: Ghazali, R., Nawi, N.M., Deris, M.M., Abawajy, J.H. (eds.) Recent advances on soft computing and data mining: proceedings of the fourth international conference on soft computing and data mining (SCDM 2020), Melaka, Malaysia, January 22\u201323, 2020, pp. 57\u201365. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-36056-6_6"},{"key":"920_CR10","doi-asserted-by":"publisher","first-page":"100169","DOI":"10.1016\/j.egyai.2022.100169","volume":"9","author":"R Machlev","year":"2022","unstructured":"Machlev, R., et al.: Explainable artificial intelligence (XAI) techniques for energy and power systems: review, challenges and opportunities. Energy AI 9, 100169 (2022). https:\/\/doi.org\/10.1016\/j.egyai.2022.100169","journal-title":"Energy AI"},{"key":"920_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2023.102024","volume":"57","author":"PED Love","year":"2023","unstructured":"Love, P.E.D., Fang, W., Matthews, J., Porter, S., Luo, H., Ding, L.: Explainable artificial intelligence (XAI): precepts, models, and opportunities for research in construction. Adv. Eng. Inform. 57, 102024 (2023). https:\/\/doi.org\/10.1016\/j.aei.2023.102024","journal-title":"Adv. Eng. Inform."},{"key":"920_CR12","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.neunet.2022.08.002","volume":"155","author":"IC Kaadoud","year":"2022","unstructured":"Kaadoud, I.C., Bennetot, A., Mawhin, B., Charisi, V., D\u00edaz-Rodr\u00edguez, N.: Explaining Aha! moments in artificial agents through IKE-XAI: Implicit Knowledge Extraction for eXplainable AI. Neural Netw. 155, 95\u2013118 (2022). https:\/\/doi.org\/10.1016\/j.neunet.2022.08.002","journal-title":"Neural Netw."},{"key":"920_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.106668","volume":"156","author":"S Nazir","year":"2023","unstructured":"Nazir, S., Dickson, D.M., Akram, M.U.: Survey of explainable artificial intelligence techniques for biomedical imaging with deep neural networks. Comput. Biol. Med. 156, 106668 (2023). https:\/\/doi.org\/10.1016\/j.compbiomed.2023.106668","journal-title":"Comput. Biol. Med."},{"key":"920_CR14","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.procs.2021.08.025","volume":"192","author":"M Bellucci","year":"2021","unstructured":"Bellucci, M., Delestre, N., Malandain, N., Zanni-Merk, C.: Towards a terminology for a fully contextualized XAI. Proc. Comput. Sci. 192, 241\u2013250 (2021). https:\/\/doi.org\/10.1016\/j.procs.2021.08.025","journal-title":"Proc. Comput. Sci."},{"key":"920_CR15","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.gr.2022.08.004","volume":"123","author":"HAH Al-Najjar","year":"2022","unstructured":"Al-Najjar, H.A.H., Pradhan, B., Beydoun, G., Sarkar, R., Park, H.J., Alamri, A.: A novel method using explainable artificial intelligence (XAI)-based Shapley Additive Explanations for spatial landslide prediction using time-series SAR dataset. Gondwana Res. 123, 107\u2013124 (2022). https:\/\/doi.org\/10.1016\/j.gr.2022.08.004","journal-title":"Gondwana Res."},{"key":"920_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"920_CR17","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: Why should i trust you?\u2019 Explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp. 1135\u20131144 (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"920_CR18","unstructured":"Lundberg, S.M., Lee, S.-I.: A unified approach to interpreting model predictions. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"issue":"1","key":"920_CR19","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.ejor.2015.05.030","volume":"247","author":"S Lessmann","year":"2015","unstructured":"Lessmann, S., Baesens, B., Seow, H.-V., Thomas, L.C.: Benchmarking state-of-the-art classification algorithms for credit scoring: an update of research. Eur. J. Oper. Res. 247(1), 124\u2013136 (2015)","journal-title":"Eur. J. Oper. Res."},{"issue":"8","key":"920_CR20","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recognit. Lett. 27(8), 861\u2013874 (2006)","journal-title":"Pattern Recognit. Lett."},{"issue":"3","key":"920_CR21","doi-asserted-by":"publisher","first-page":"2023","DOI":"10.3390\/app13031971","volume":"13","author":"TO Omotehinwa","year":"1971","unstructured":"Omotehinwa, T.O., Oyewola, D.O.: Hyperparameter optimization of ensemble models for spam email detection. Appl. Sci. 13(3), 2023 (1971). https:\/\/doi.org\/10.3390\/app13031971","journal-title":"Appl. Sci."},{"key":"920_CR22","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1862888","author":"N Ahmed","year":"2022","unstructured":"Ahmed, N., Amin, R., Aldabbas, H., Koundal, D., Alouffi, B., Shah, T.: Machine learning techniques for spam detection in email and IoT platforms: analysis and research challenges. Secur. Commun. Netw. (2022). https:\/\/doi.org\/10.1155\/2022\/1862888","journal-title":"Secur. Commun. Netw."},{"key":"920_CR23","doi-asserted-by":"publisher","DOI":"10.1002\/9781118548387","volume-title":"Applied logistic regression","author":"DW Hosmer Jr","year":"2013","unstructured":"Hosmer, D.W., Jr., Lemeshow, S., Sturdivant, R.X.: Applied logistic regression, vol. 398. John Wiley & Sons, Hoboken (2013)"},{"key":"920_CR24","doi-asserted-by":"publisher","first-page":"111","DOI":"10.4135\/9781412983433","volume-title":"Applied logistic regression analysis","author":"S Menard","year":"2002","unstructured":"Menard, S.: Applied logistic regression analysis, 2nd edn., p. 111. Sage publications, Thousand Oaks (2002)","edition":"2"},{"key":"920_CR25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511615412","volume-title":"Logit models from economics and other fields","author":"JS Cramer","year":"2003","unstructured":"Cramer, J.S.: Logit models from economics and other fields. Cambridge University Press, Cambridge (2003)"},{"key":"920_CR26","volume-title":"Foundations of linear and generalized linear models","author":"A Agresti","year":"2015","unstructured":"Agresti, A.: Foundations of linear and generalized linear models. John Wiley & Sons, Hoboken (2015)"},{"issue":"12","key":"920_CR27","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1016\/S0895-4356(96)00236-3","volume":"49","author":"P Peduzzi","year":"1996","unstructured":"Peduzzi, P., Concato, J., Kemper, E., Holford, T.R., Feinstein, A.R.: A simulation study of the number of events per variable in logistic regression analysis. J. Clin. Epidemiol. 49(12), 1373\u20131379 (1996)","journal-title":"J. Clin. Epidemiol."},{"key":"920_CR28","volume-title":"The elements of statistical learning: data mining, inference, and prediction","author":"ZQ John Lu","year":"2010","unstructured":"John Lu, Z.Q.: The elements of statistical learning: data mining, inference, and prediction. Oxford University Press, Oxford (2010)"},{"key":"920_CR29","doi-asserted-by":"publisher","DOI":"10.1201\/9781420075779","volume-title":"Logistic regression models","author":"JM Hilbe","year":"2009","unstructured":"Hilbe, J.M.: Logistic regression models. CRC Press, Boca Raton (2009)"},{"issue":"3","key":"920_CR30","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1207\/s15327752jpa6803_3","volume":"68","author":"LJ Davis","year":"1997","unstructured":"Davis, L.J., Offord, K.P.: Logistic regression. J. Pers. Assess. 68(3), 497\u2013507 (1997)","journal-title":"J. Pers. Assess."},{"issue":"3","key":"920_CR31","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","volume":"46","author":"NS Altman","year":"1992","unstructured":"Altman, N.S.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46(3), 175\u2013185 (1992)","journal-title":"Am. Stat."},{"key":"920_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7138-7","volume-title":"An introduction to statistical learning","author":"G James","year":"2013","unstructured":"James, G., Witten, D., Hastie, T., Tibshirani, R.: An introduction to statistical learning, vol. 112. Springer, Berlin (2013)"},{"key":"920_CR33","doi-asserted-by":"crossref","unstructured":"Beyer, K., Goldstein, J., Ramakrishnan, R., Shaft, U.: When is \u2018nearest neighbor\u2019 meaningful?. In: Database theory\u2014ICDT\u201999: 7th international conference Jerusalem, Israel, January 10\u201312, 1999 Proceedings 7, pp. 217\u2013235 (1999)","DOI":"10.1007\/3-540-49257-7_15"},{"key":"920_CR34","unstructured":"Larose, D.T., Larose, C.D.: k-nearest neighbor algorithm (2014)"},{"key":"920_CR35","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-38652-7_2","volume-title":"Dimensionality reduction with unsupervised nearest neighbors","author":"O Kramer","year":"2013","unstructured":"Kramer, O.: K-nearest neighbors. In: Kramer, O. (ed.) Dimensionality reduction with unsupervised nearest neighbors, pp. 13\u201323. Springer, Berlin (2013). https:\/\/doi.org\/10.1007\/978-3-642-38652-7_2"},{"key":"920_CR36","unstructured":"Breiman, L., Friedman, J., Olshen, R., Stone, C.: Cart. Classif. Regres. Trees (1984)"},{"key":"920_CR37","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00116251","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1, 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"key":"920_CR38","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470","volume-title":"Classification and regression trees","author":"L Breiman","year":"2017","unstructured":"Breiman, L.: Classification and regression trees. Routledge, England (2017)"},{"key":"920_CR39","volume-title":"Data mining with decision trees: theory and applications","author":"OZ Maimon","year":"2014","unstructured":"Maimon, O.Z., Rokach, L.: Data mining with decision trees: theory and applications, vol. 81. World Scientific, Singapore (2014)"},{"key":"920_CR40","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10462-011-9272-4","volume":"39","author":"SB Kotsiantis","year":"2013","unstructured":"Kotsiantis, S.B.: Decision trees: a recent overview. Artif. Intell. Rev. 39, 261\u2013283 (2013)","journal-title":"Artif. Intell. Rev."},{"issue":"11","key":"920_CR41","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1016\/S0305-0548(03)00156-4","volume":"31","author":"K-M Osei-Bryson","year":"2004","unstructured":"Osei-Bryson, K.-M.: Evaluation of decision trees: a multi-criteria approach. Comput. Oper. Res. 31(11), 1933\u20131945 (2004)","journal-title":"Comput. Oper. Res."},{"issue":"12","key":"920_CR42","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1038\/nbt1206-1565","volume":"24","author":"WS Noble","year":"2006","unstructured":"Noble, W.S.: What is a support vector machine? Nat. Biotechnol. 24(12), 1565\u20131567 (2006)","journal-title":"Nat. Biotechnol."},{"issue":"20","key":"920_CR43","first-page":"597","volume":"28","author":"D Meyer","year":"2015","unstructured":"Meyer, D., Wien, F.T.: Support vector machines. Interface Libsvm Packag. 28(20), 597 (2015)","journal-title":"Interface Libsvm Packag."},{"key":"920_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2020.103404","volume":"291","author":"J van der Waa","year":"2021","unstructured":"van der Waa, J., Nieuwburg, E., Cremers, A., Neerincx, M.: Evaluating XAI: a comparison of rule-based and example-based explanations. Artif. Intell. 291, 103404 (2021). https:\/\/doi.org\/10.1016\/j.artint.2020.103404","journal-title":"Artif. Intell."},{"key":"920_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121369","volume":"237","author":"YC Wang","year":"2024","unstructured":"Wang, Y.C., Chen, T.: Adapted techniques of explainable artificial intelligence for explaining genetic algorithms on the example of job scheduling. Expert Syst. Appl. 237, 121369 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2023.121369","journal-title":"Expert Syst. Appl."},{"key":"920_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100230","volume":"7","author":"A Saranya","year":"2023","unstructured":"Saranya, A., Subhashini, R.: A systematic review of explainable artificial intelligence models and applications: recent developments and future trends. Decis. Anal. J. 7, 100230 (2023). https:\/\/doi.org\/10.1016\/j.dajour.2023.100230","journal-title":"Decis. Anal. J."},{"key":"920_CR47","doi-asserted-by":"crossref","unstructured":"Harisinghaney, A., Dixit, A., Gupta, S., Arora, A.: Text and image based spam email classification using KNN, Na\u00efve Bayes and Reverse DBSCAN algorithm. In: 2014 international conference on reliability optimization and information technology (ICROIT), pp. 153\u2013155 (2014)","DOI":"10.1109\/ICROIT.2014.6798302"},{"issue":"10","key":"920_CR48","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1016\/j.patrec.2012.03.012","volume":"33","author":"D Debarr","year":"2012","unstructured":"Debarr, D., Wechsler, H.: Spam detection using random boost. Pattern Recognit. Lett. 33(10), 1237\u20131244 (2012). https:\/\/doi.org\/10.1016\/j.patrec.2012.03.012","journal-title":"Pattern Recognit. Lett."},{"key":"920_CR49","doi-asserted-by":"crossref","unstructured":"Faris, H., Aljarah, I., Alqatawna, J.: Optimizing feedforward neural networks using krill herd algorithm for e-mail spam detection. In: 2015 IEEE Jordan conference on applied electrical engineering and computing technologies (AEECT), pp. 1\u20135 (2015)","DOI":"10.1109\/AEECT.2015.7360576"},{"key":"920_CR50","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-201990","author":"NO Hamed","year":"2021","unstructured":"Hamed, N.O., Samak, A.H., Ahmad, M.A.: Cloud e-mail security: an accurate e-mail spam classification based on enhanced binary differential evolution (BDE) algorithm. J. Intell. Fuzzy Syst. (2021). https:\/\/doi.org\/10.3233\/JIFS-201990","journal-title":"J. Intell. Fuzzy Syst."},{"key":"920_CR51","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-981-32-9949-8_18","volume-title":"Data management, analytics and innovation: proceedings of ICDMAI 2019, Vol 1","author":"V Sri Vinitha","year":"2020","unstructured":"Sri Vinitha, V., Karthika Renuka, D.: MapReduce mRMR: random forests-based email spam classification in distributed environment. In: Sharma, N., Chakrabarti, A., Balas, V.E. (eds.) Data management, analytics and innovation: proceedings of ICDMAI 2019, Vol 1, pp. 241\u2013253. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-32-9949-8_18"},{"issue":"3","key":"920_CR52","doi-asserted-by":"publisher","first-page":"520","DOI":"10.21533\/pen.v9i3.2202","volume":"9","author":"HM Saleh","year":"2021","unstructured":"Saleh, H.M.: An Efficient feature selection algorithm for the spam email classification. Period. Eng. Nat. Sci. 9(3), 520\u2013531 (2021)","journal-title":"Period. Eng. Nat. Sci."},{"issue":"2","key":"920_CR53","first-page":"49","volume":"2","author":"F Soleimanian Gharehchopogh","year":"2020","unstructured":"Soleimanian Gharehchopogh, F., Mousavi, S.K.: A new feature selection in email spam detection by particle swarm optimization and fruit fly optimization algorithms. Comput. Knowl. Eng. 2(2), 49\u201362 (2020)","journal-title":"Comput. Knowl. Eng."},{"key":"920_CR54","doi-asserted-by":"publisher","unstructured":"Ibrahim, A., Mejri, M., Jaafar, F.: An explainable artificial intelligence approach for a trustworthy spam detection. In: 2023 IEEE Int. Conf. Cyber Secur. Resil., pp. 160\u2013167 (2023). https:\/\/doi.org\/10.1109\/csr57506.2023.10224956","DOI":"10.1109\/csr57506.2023.10224956"},{"key":"920_CR55","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Damiani, E., Al Hamadi, H., Yeun, C.Y., Taher, F.: Explainable artificial intelligence to detect image spam using convolutional neural network. In: Int. Conf. Cyber Resilience, ICCR 2022, pp. 1\u20135 (2022). https:\/\/doi.org\/10.1109\/ICCR56254.2022.9995839","DOI":"10.1109\/ICCR56254.2022.9995839"},{"key":"920_CR56","doi-asserted-by":"publisher","unstructured":"Reis, J.C.S., Correia, A., Murai, F., Veloso, A., Benevenuto, F.: Explainable machine learning for fake news detection. In: WebSci 2019 - Proc. 11th ACM Conf. Web Sci., pp. 17\u201326 (2019). https:\/\/doi.org\/10.1145\/3292522.3326027","DOI":"10.1145\/3292522.3326027"},{"key":"920_CR57","doi-asserted-by":"publisher","unstructured":"Zhang, D., Zhang, Q., Zhang, G., Lu, J.: FreshGraph: a spam-aware recommender system for cold start problem. In: Proc. IEEE 14th Int. Conf. Intell. Syst. Knowl. Eng. ISKE 2019, pp. 1211\u20131218 (2019). https:\/\/doi.org\/10.1109\/ISKE47853.2019.9170319","DOI":"10.1109\/ISKE47853.2019.9170319"},{"key":"920_CR58","doi-asserted-by":"publisher","first-page":"93575","DOI":"10.1109\/ACCESS.2022.3204171","volume":"10","author":"N Capuano","year":"2022","unstructured":"Capuano, N., Fenza, G., Loia, V., Stanzione, C.: Explainable artificial intelligence in cybersecurity: a survey. IEEE Access 10, 93575\u201393600 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3204171","journal-title":"IEEE Access"},{"issue":"1","key":"920_CR59","doi-asserted-by":"publisher","first-page":"20034","DOI":"10.1063\/5.0166577","volume":"2821","author":"KS Reddy","year":"2023","unstructured":"Reddy, K.S., Gayathri, A.: Classification of spam detection using random forest algorithm over naive bayes algorithm based on accuracy. AIP Conf. Proc. 2821(1), 20034 (2023). https:\/\/doi.org\/10.1063\/5.0166577","journal-title":"AIP Conf. Proc."},{"key":"920_CR60","unstructured":"Priyangka, R.: Multilingual spam detection using random forest. 12(04), 336\u2013338 (2023)"},{"key":"920_CR61","unstructured":"UCI machine learning repository: spambase data set. Accessed 07 May 2022. [Online]. Available: https:\/\/archive.ics.uci.edu\/ml\/datasets\/spambase"},{"key":"920_CR62","unstructured":"Kohavi, R. et al: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Ijcai, pp. 1137\u20131145 (1995)"},{"key":"920_CR63","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"920_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.48185\/jaai.v3i1.450","volume":"3","author":"MA Bouke","year":"2022","unstructured":"Bouke, M.A., Abdullah, A., ALshatebi, S.H., Abdullah, M.T.: E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm. J. Appl. Artif. Intell. 3(1), 1\u201316 (2022). https:\/\/doi.org\/10.48185\/jaai.v3i1.450","journal-title":"J. Appl. Artif. Intell."},{"issue":"3","key":"920_CR65","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/s10618-006-0040-z","volume":"13","author":"A Banerjee","year":"2006","unstructured":"Banerjee, A., Ghosh, J.: Scalable clustering algorithms with balancing constraints. Data Min. Knowl. Discov. 13(3), 365\u2013395 (2006). https:\/\/doi.org\/10.1007\/s10618-006-0040-z","journal-title":"Data Min. Knowl. Discov."},{"key":"920_CR66","doi-asserted-by":"publisher","DOI":"10.4172\/2229-8711.S1111","author":"AT Elhassan","year":"2016","unstructured":"Elhassan, A.T., Aljourf, M., Al-Mohanna, F., Shoukri, M.: Classification of Imbalance Data using Tomek Link (T-Link) Combined with Random Under-sampling (RUS) as a Data Reduction Method. Glob. J. Technol. Optim. (2016). https:\/\/doi.org\/10.4172\/2229-8711.S1111","journal-title":"Glob. J. Technol. Optim."},{"key":"920_CR67","doi-asserted-by":"publisher","first-page":"59386","DOI":"10.1109\/ACCESS.2023.3284975","volume":"11","author":"MA Bouke","year":"2023","unstructured":"Bouke, M.A., Abdullah, A., Frnda, J., Cengiz, K., Salah, B.: BukaGini: a stability-aware Gini index feature selection algorithm for robust model performance. IEEE Access 11, 59386\u201359396 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3284975","journal-title":"IEEE Access"},{"issue":"4","key":"920_CR68","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1587\/transinf.E94.D.855","volume":"E94-D","author":"H Park","year":"2011","unstructured":"Park, H., Kwon, H.C.: Improved Gini-index algorithm to correct feature-selection bias in text classification. IEICE Trans. Inf. Syst. E94-D(4), 855\u2013865 (2011). https:\/\/doi.org\/10.1587\/transinf.E94.D.855","journal-title":"IEICE Trans. Inf. Syst."},{"key":"920_CR69","doi-asserted-by":"publisher","unstructured":"Jain, V., Phophalia, A., Bhatt, J.S.: Investigation of a joint splitting criteria for decision tree classifier use of information gain and Gini index. In: IEEE Reg. 10 Annu. Int. Conf. Proceedings\/TENCON, 2018, pp. 2187\u20132192 (2019). https:\/\/doi.org\/10.1109\/TENCON.2018.8650485","DOI":"10.1109\/TENCON.2018.8650485"},{"key":"920_CR70","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1016\/j.proeng.2017.02.482","volume":"181","author":"S Lefkovits","year":"2017","unstructured":"Lefkovits, S., Lefkovits, L.: Gabor feature selection based on information gain. Proc. Eng. 181, 892\u2013898 (2017). https:\/\/doi.org\/10.1016\/j.proeng.2017.02.482","journal-title":"Proc. Eng."},{"issue":"1","key":"920_CR71","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s42979-022-01409-1","volume":"4","author":"G Canbek","year":"2022","unstructured":"Canbek, G., Taskaya Temizel, T., Sagiroglu, S.: PToPI: a comprehensive review, analysis, and knowledge representation of binary classification performance measures\/metrics. SN Comput. Sci. 4(1), 13 (2022)","journal-title":"SN Comput. Sci."},{"issue":"1","key":"920_CR72","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/226\/1\/012091","volume":"226","author":"NF Rusland","year":"2017","unstructured":"Rusland, N.F., Wahid, N., Kasim, S., Hafit, H.: Analysis of Na\u00efve Bayes algorithm for email spam filtering across multiple datasets. IOP Conf. Ser. Mater. Sci. Eng. 226(1), 012091 (2017). https:\/\/doi.org\/10.1088\/1757-899X\/226\/1\/012091","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"920_CR73","doi-asserted-by":"crossref","unstructured":"Shrivastava, A., Dubey, R.: Classification of spam mail using different machine learning algorithms. In: 2018 international conference on advanced computation and telecommunication (ICACAT), pp. 1\u201310 (2018)","DOI":"10.1109\/ICACAT.2018.8933787"},{"key":"920_CR74","doi-asserted-by":"crossref","unstructured":"Ravi Kumar, G., Murthuja, P., Anjan Babu, G., Nagamani, K.: An efficient email spam detection utilizing machine learning approaches. In: Innovative data communication technologies and application: proceedings of ICIDCA 2021, Springer, pp. 141\u2013151 (2022)","DOI":"10.1007\/978-981-16-7167-8_11"},{"issue":"1","key":"920_CR75","doi-asserted-by":"publisher","first-page":"29","DOI":"10.34028\/iajit\/20\/1\/4","volume":"20","author":"H Takci","year":"2023","unstructured":"Takci, H., Nusrat, F.: Highly accurate spam detection with the help of feature selection and data transformation. Int. Arab J. Inf. Technol. 20(1), 29\u201337 (2023). https:\/\/doi.org\/10.34028\/iajit\/20\/1\/4","journal-title":"Int. Arab J. Inf. Technol."},{"issue":"1","key":"920_CR76","first-page":"2020","volume":"6","author":"OE Taylor","year":"2020","unstructured":"Taylor, O.E., Ezekiel, P.S.: A model to detect spam email using support vector classifier and random forest classifier. Int. J. Comput. Sci. Math. Theory E 6(1), 2020 (2020)","journal-title":"Int. J. Comput. Sci. Math. Theory E"},{"key":"920_CR77","doi-asserted-by":"publisher","unstructured":"Hoffman, R.R., Mueller, S.T., Klein, G., Litman, J.: Metrics for explainable AI: challenges and prospects. (2018). https:\/\/doi.org\/10.48550\/arXiv.1812.04608","DOI":"10.48550\/arXiv.1812.04608"},{"key":"920_CR78","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2022.102684","author":"W Jin","year":"2023","unstructured":"Jin, W., Li, X., Fatehi, M., Hamarneh, G.: Guidelines and evaluation of clinical explainable AI in medical image analysis. Med. Image Anal. (2023). https:\/\/doi.org\/10.1016\/j.media.2022.102684","journal-title":"Med. Image Anal."},{"key":"920_CR79","doi-asserted-by":"crossref","unstructured":"Roy, S., Laberge, G., Roy, B., Khomh, F., Nikanjam, A., Mondal, S.: Why don\u2019t XAI techniques agree? Characterizing the disagreements between post-hoc explanations of defect predictions. In: 2022 IEEE international conference on software maintenance and evolution (ICSME), pp. 444\u2013448 (2022)","DOI":"10.1109\/ICSME55016.2022.00056"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00920-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00920-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00920-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:19:50Z","timestamp":1739337590000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00920-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,30]]},"references-count":79,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["920"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00920-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,30]]},"assertion":[{"value":"16 October 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"5"}}