{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:31:41Z","timestamp":1760707901800},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,2,1]],"date-time":"2008-02-01T00:00:00Z","timestamp":1201824000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1007\/s10489-008-0116-0","type":"journal-article","created":{"date-parts":[[2008,1,31]],"date-time":"2008-01-31T10:53:20Z","timestamp":1201776800000},"page":"107-121","source":"Crossref","is-referenced-by-count":17,"title":["Robust classification for spam filtering by back-propagation neural networks using behavior-based features"],"prefix":"10.1007","volume":"31","author":[{"given":"Chih-Hung","family":"Wu","sequence":"first","affiliation":[]},{"given":"Chiung-Hui","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,2,1]]},"reference":[{"key":"116_CR1","unstructured":"Aris A, Gemmell J, Lueder R (2004) Exploiting location and time for photo search and storytelling in Mylifebits. Technical report MSR-TR-2004-102, Microsoft Research"},{"issue":"4","key":"116_CR2","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/S0965-9978(98)00071-4","volume":"30","author":"NO Attoh-Okine","year":"1999","unstructured":"Attoh-Okine NO (1999) Analysis of learning rate and momentum term in backpropagation neural network algorithm trained to predict pavement performance. Adv Eng Softw 30(4):291\u2013302","journal-title":"Adv Eng Softw"},{"key":"116_CR3","doi-asserted-by":"crossref","unstructured":"Bezerra GB, Barra TV, Ferreira HM, Knidel H, de Castro LN, Von Zuben FJ (2006) An immunological filter for spam. In: Proceedings of the international conference on artificial immune systems. Oeiras, Portugal, pp 446\u2013458","DOI":"10.1007\/11823940_34"},{"key":"116_CR4","unstructured":"Blanzieri E, Bryl A (2006) A survey of anti-spam techniques. Technical report DIT-06-056, Informatica e Telecomunicazioni, University of Trento"},{"key":"116_CR5","unstructured":"Camastra F (2005) Kernel methods for clustering. In: Proceedings of the international workshop on natural and artificial immune systems, pp 1\u20139"},{"key":"116_CR6","first-page":"847","volume-title":"Lecture notes in computer science","author":"OAS Carpinteiro","year":"2006","unstructured":"Carpinteiro OAS, Lima I, Assis JMC, de Souza ACZ, Moreira EM, Pinheiro CAM (2006) A neural model in anti-spam systems. In: Lecture notes in computer science, vol 4132. Springer, Berlin, pp 847\u2013855"},{"issue":"3","key":"116_CR7","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1145\/321832.321839","volume":"21","author":"GJ Chaitin","year":"1974","unstructured":"Chaitin GJ (1974) Information theoretic limitations on formal systems. J Assoc Comput Mach 21(3):403\u2013424","journal-title":"J Assoc Comput Mach"},{"key":"116_CR8","doi-asserted-by":"crossref","unstructured":"Clark J, Koprinska I, Poon J (2003) A neural network based approach to automated e-mail classification. In: Proceedings of the 2003 IEEE\/WIC international conference on Web intelligence. Halifax, Canada, October 2003, pp 702\u2013705","DOI":"10.1109\/WI.2003.1241300"},{"key":"116_CR9","volume-title":"Sendmail","author":"B Costales","year":"2002","unstructured":"Costales B, Allman E (2002) Sendmail, 3rd edn. O\u2019Reilly & Associates, Sebastopol","edition":"3"},{"key":"116_CR10","unstructured":"Crawford E, Kay J, McCreath E (2001) Automatic induction of rules for e-mail classification. In: Proceedings of the 6th Australasian document computing symposium. Coffs Harbour, Australia, 7 December 2001, pp 13\u201320"},{"key":"116_CR11","doi-asserted-by":"crossref","unstructured":"Delany SJ, Cunningham P, Doyle D, Zamolotskikh A (2005) Generating estimates of classification confidence for a case-based spam filter. In: Munoz-Avila H, Ricci F (eds) Proceedings of the international conference on case-based reasoning. Chicago, Illinois, USA, pp 177\u2013190","DOI":"10.1007\/11536406_16"},{"key":"116_CR12","volume-title":"Neural networks","author":"G Dreyfus","year":"2005","unstructured":"Dreyfus G (2005) Neural networks, 1st edn. Springer, New York","edition":"1"},{"issue":"1","key":"116_CR13","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.eswa.2006.04.011","volume":"33","author":"F Fdez-Riverola","year":"2007","unstructured":"Fdez-Riverola F, Iglesias EL, D\u00edaz F, M\u00e9ndez JR, Corchado JM (2007) Applying lazy learning algorithms to tackle concept drift in spam filtering. Expert Syst Appl 33(1):36\u201348","journal-title":"Expert Syst Appl"},{"key":"116_CR14","unstructured":"Garner S (1995) WEKA: The waikato environment for knowledge analysis. In: Proceedings of the New Zealand computer science research students conference. New Zealand, pp 57\u201364"},{"key":"116_CR15","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1007\/11752912_54","volume-title":"Proceedings of the 4th Helenic conference on AI","author":"D Gavrilis","year":"2006","unstructured":"Gavrilis D, Tsoulos IG, Dermatas E (2006) Neural recognition and genetic features selection for robust detection of e-mail spam. In: Antoniou G, Potamias G, Spyropoulos C, Plexousakis D (eds) Proceedings of the 4th Helenic conference on AI, Heraklion, Crete, Greece. Lecture notes in computer science, vol 3955. Springer, Berlin, pp 498\u2013501"},{"key":"116_CR16","doi-asserted-by":"crossref","unstructured":"Gemmell J, Williams L, Wood K, Bell G, Lueder R (2004) Passive capture and ensuing issues for a personal lifetime store. In: Proceedings of the first ACM workshop on continuous archival and retrieval of personal experiences (CARPE04). New York, USA, pp 48\u201355","DOI":"10.1145\/1026653.1026660"},{"issue":"2","key":"116_CR17","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/1216016.1216021","volume":"50","author":"GA Grimes","year":"2007","unstructured":"Grimes GA (2007) Compliance with the CAN-SPAM Act of 2003. Commun ACM 50(2):56\u201362","journal-title":"Commun ACM"},{"key":"116_CR18","volume-title":"Neural networks: A comprehensive foundation","author":"S Haykin","year":"1998","unstructured":"Haykin S (1998) Neural networks: A comprehensive foundation, 2nd edn. Prentice Hall, New York","edition":"2"},{"key":"116_CR19","unstructured":"Hershkop S (2006) Behavior-based email analysis with application to spam detection. Ph.D. thesis, Columbia University"},{"key":"116_CR20","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MTAS.2006.1607720","volume":"25","author":"B Hoanca","year":"2006","unstructured":"Hoanca B (2006) How good are our weapons in the spam wars? IEEE Technol Soc Mag 25:22\u201330","journal-title":"IEEE Technol Soc Mag"},{"key":"116_CR21","unstructured":"Hopkins M, Reeber E, Forman G, Suermondt J (2005) Spam e-mail database from UCI machine learning repository. http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"key":"116_CR22","doi-asserted-by":"crossref","unstructured":"Jiang E (2006) Learning to semantically classify email messages. In: Proceedings of the international conference on intelligent computing. Kunming, China, pp 700\u2013711","DOI":"10.1007\/978-3-540-37256-1_86"},{"key":"116_CR23","doi-asserted-by":"crossref","unstructured":"Kanaris I, Kanaris K, Stamatatos E (2006) Spam detection using character n-grams. In: Antoniou G et al (eds) Proceedings of the Hellenic conference on artificial intelligence. Heraklion, Crete, Greece, pp 95\u2013104","DOI":"10.1007\/11752912_12"},{"key":"116_CR24","unstructured":"Lai C-C, Tsai M-C (2004) An empirical performance comparison of machine learning methods for spam e-mail categorization. In: Proceedings of the fourth international conference on hybrid intelligent systems. Kitakyushu, Japan"},{"key":"116_CR25","unstructured":"Luo X, Zincir-Heywood N (2005) Comparison of a SOM based sequence analysis system and naive Bayesian classifier for spam filtering. In: Proceedings of international joint conference on neural networks, vol 4. Montreal, Canada, pp 2571\u20132576"},{"key":"116_CR26","unstructured":"Mark B, Perrault RC (2005) Enron email dataset. http:\/\/www-2.cs.cmu.edu\/~enron\/"},{"key":"116_CR27","unstructured":"Massey B, Thomure M, Budrevich R, Long S (2005) The PSAM project. http:\/\/nexp.cs.pdx.edu\/~psam\/cgi-bin\/view\/PSAM\/CorpusSets"},{"key":"116_CR28","unstructured":"Mendez JR, Fdez-Riverola F, Iglesias EL, Diaz F, Corchado JM (2006) Tracking concept drift at feature selection stage in spam hunting: An anti-spam instance-based reasoning system. In: Roth-Berghofer TR et al (eds) Proceedings of the European conference on case-based reasoning. Fethiye, Turkey, pp 504\u2013518"},{"issue":"16","key":"116_CR29","doi-asserted-by":"crossref","first-page":"1819","DOI":"10.1016\/j.patrec.2004.07.004","volume":"25","author":"L \u00d6zg\u00fcr","year":"2004","unstructured":"\u00d6zg\u00fcr L, Gungor T, Gurgen F (2004) Adaptive anti-spam filtering for agglutinative languages: a special case for Turkish. Pattern Recognit Lett 25(16):1819\u20131833","journal-title":"Pattern Recognit Lett"},{"key":"116_CR30","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/s10994-006-9505-y","volume":"65","author":"R Pampapathi","year":"2006","unstructured":"Pampapathi R, Mirkin B, Levene M (2006) A suffix tree approach to anti-spam email filtering. Mach Learn 65:309\u2013338","journal-title":"Mach Learn"},{"issue":"5","key":"116_CR31","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","volume":"24","author":"G Salton","year":"1988","unstructured":"Salton G, Buckley C (1988) Term-weighting approaches in automatic text retrieval. Inf Process Manag 24(5):513\u2013523","journal-title":"Inf Process Manag"},{"key":"116_CR32","unstructured":"SpamArchive.org. (2005) Spamarchive project. http:\/\/spamarchive.org\/"},{"key":"116_CR33","unstructured":"SpamLinks.net. (2005) Spam links\u2014spam archives. http:\/\/spamlinks.net\/filter-archives.htm"},{"key":"116_CR34","unstructured":"The Spamhaus Project Ltd. (2007) The definition of spam. http:\/\/www.spamhaus.org\/definition.html"},{"key":"116_CR35","unstructured":"Trend Micro, Inc. (2005) Definition of \u201cspam\u201d. http:\/\/www.mail-abuse.com\/spam_def.html"},{"key":"116_CR36","unstructured":"Tseng L-S, Wu C-H (2003) Detection of spam e-mails by analyzing the distributing behaviors of e-mail servers. In: Proceedings of the third international conference on hybrid intelligent systems. Kitakyushu, Japan, pp 1024\u20131033"},{"key":"116_CR37","unstructured":"U.S. Senate and House of Representatives (2004) CAN-SPAM Act of 2003 (S. 877). http:\/\/www.cauce.org\/S877.pdf"},{"key":"116_CR38","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s10044-006-0045-7","volume":"9","author":"B Wang","year":"2006","unstructured":"Wang B, Jones GJF, Pan W (2006) Using online linear classifiers to filter spam emails. Pattern Anal Appl 9:339\u2013351","journal-title":"Pattern Anal Appl"},{"key":"116_CR39","doi-asserted-by":"crossref","unstructured":"Wang F, You Z, Man L (2006). Immune-based peer-to-peer model for anti-spam. In: Proceedings of the international conference on intelligent computing. Kunming, China, pp 660\u2013671","DOI":"10.1007\/11816102_70"},{"key":"116_CR40","doi-asserted-by":"crossref","unstructured":"Wang H-B, Yu Y, Liu Z (2005). SVM classifier incorporating feature selection using GA for spam detection. In: Proceedings of the 2005 international conference on embedded and ubiquitous computing. Nagasaki, Japan, pp 1147\u20131154","DOI":"10.1007\/11596356_113"},{"key":"116_CR41","doi-asserted-by":"crossref","unstructured":"Webb S, Chitti S, Pu C (2005). An experimental evaluation of spam filter performance and robustness against attack. In: Proceedings of the 1st international conference on collaborative computing: networking, applications and worksharing. San Jose, CA, USA, pp 19\u201321","DOI":"10.1109\/COLCOM.2005.1651219"},{"key":"116_CR42","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1007\/s00500-006-0116-0","volume":"11","author":"X Yue","year":"2007","unstructured":"Yue X, Abraham A, Chi Z-X, Hao Y-Y, Mo H (2007) Artificial immune system inspired behavior-based anti-spam filter. Soft Comput 11:729\u2013740","journal-title":"Soft Comput"},{"key":"116_CR43","doi-asserted-by":"crossref","unstructured":"Zhang X, Liu J, Zhang Y, Wang C (2006). Spam behavior recognition based on session layer data mining. In: Wang L et al (eds) Proceedings of third international conference on fuzzy systems and knowledge discovery. Xian, China, pp 1289\u20131298","DOI":"10.1007\/11881599_160"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-008-0116-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-008-0116-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-008-0116-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T14:25:41Z","timestamp":1559139941000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-008-0116-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,2,1]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["116"],"URL":"https:\/\/doi.org\/10.1007\/s10489-008-0116-0","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,2,1]]}}}