{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T17:25:50Z","timestamp":1777051550764,"version":"3.51.4"},"reference-count":124,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100020970","name":"Rashtriya Uchchatar Shiksha Abhiyan","doi-asserted-by":"crossref","award":["F.24-51\/2014-U"],"award-info":[{"award-number":["F.24-51\/2014-U"]}],"id":[{"id":"10.13039\/501100020970","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11042-023-14689-3","type":"journal-article","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T16:38:51Z","timestamp":1677170331000},"page":"29227-29254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Comparison of machine learning techniques for spam detection"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7753-2425","authenticated-orcid":false,"given":"Argha","family":"Ghosh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4265-7097","authenticated-orcid":false,"given":"A.","family":"Senthilrajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,20]]},"reference":[{"issue":"1","key":"14689_CR1","doi-asserted-by":"publisher","first-page":"60","DOI":"10.5815\/ijcnis.2018.01.07","volume":"10","author":"S\u2019i M Abdulhamid","year":"2018","unstructured":"Abdulhamid S\u2019i M, Shuaib M, OluwafemiOsho II, Alhassan JK (2018) Comparative Analysis of Classification Algorithms for Email Spam Detection. Int J Comput Netw Inf Secur (IJCNIS) 10(1):60\u201367. https:\/\/doi.org\/10.5815\/ijcnis.2018.01.07","journal-title":"Int J Comput Netw Inf Secur (IJCNIS)"},{"key":"14689_CR2","doi-asserted-by":"publisher","unstructured":"Abiodun OI, Jantan A, Omolara AE, Dada KV, Mohamed NA, Arshad H (2018) \u201cState-of-the-art in artificial neural network applications: A survey\u201d, Heliyon, Volume 4, Issue 11, ISSN 2405\u20138440, https:\/\/doi.org\/10.1016\/j.heliyon.2018.e00938.","DOI":"10.1016\/j.heliyon.2018.e00938"},{"key":"14689_CR3","doi-asserted-by":"crossref","unstructured":"Ali ABM S, Xiang Y (2007) \u201cSpam Classification Using Adaptive Boosting Algorithm\u201d, 6th IEEE\/ACIS International Conference on Computer and Information Science (ICIS 2007)","DOI":"10.1109\/ICIS.2007.170"},{"key":"14689_CR4","doi-asserted-by":"publisher","unstructured":"Alzahrani A, Rawat DB (2019) \"Comparative Study of Machine Learning Algorithms for SMS Spam Detection,\" 2019 SoutheastCon, pp. 1\u20136, https:\/\/doi.org\/10.1109\/SoutheastCon42311.2019.9020530.","DOI":"10.1109\/SoutheastCon42311.2019.9020530"},{"key":"14689_CR5","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/2663761.2664230","volume-title":"An optimized support vector machine classifier to extract abnormal features from breast microwave tomography data. In Proceedings of the 2014 Conference on research in adaptive and convergent systems (RACS '14)","author":"S Aminikhanghahi","year":"2014","unstructured":"Aminikhanghahi S, Shin S, Wang W, Son SH, Jeon SI (2014) An optimized support vector machine classifier to extract abnormal features from breast microwave tomography data. In Proceedings of the 2014 Conference on research in adaptive and convergent systems (RACS '14). Association for Computing Machinery, New York, NY, pp 111\u2013115. https:\/\/doi.org\/10.1145\/2663761.2664230"},{"key":"14689_CR6","doi-asserted-by":"publisher","unstructured":"Anamika, KVL Padmini P, Guduru V, Sangeeta K (2015) Effect of Spam Filter on SPOT Algorithm. In Proceedings of the Third International Symposium on Women in Computing and Informatics (WCI '15). Association for Computing Machinery, New York, NY, USA, 640\u2013643. https:\/\/doi.org\/10.1145\/2791405.2791552","DOI":"10.1145\/2791405.2791552"},{"issue":"3","key":"14689_CR7","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1080\/19361610.2018.1463136","volume":"13","author":"M Bassiouni","year":"2018","unstructured":"Bassiouni M, Ali M, El-Dahshan EA (2018) Ham and spam E-mails classification using machine learning techniques. J Appl Secur Res 13(3):315\u2013331. https:\/\/doi.org\/10.1080\/19361610.2018.1463136","journal-title":"J Appl Secur Res"},{"key":"14689_CR8","doi-asserted-by":"publisher","unstructured":"Becker BG (1998) \"Visualizing decision table classifiers,\" Proceedings IEEE Symposium on Information Visualization (Cat. No.98TB100258), pp. 102\u2013105, https:\/\/doi.org\/10.1109\/INFVIS.1998.729565.","DOI":"10.1109\/INFVIS.1998.729565"},{"key":"14689_CR9","doi-asserted-by":"crossref","unstructured":"Bedmar IS, Samy D, Martinez JL. (2007) UC3M: classification of semantic relations between nominals using sequential minimal optimization. In Proceedings of the 4th International Workshop on Semantic Evaluations (SemEval '07). Association for Computational Linguistics, USA, 382\u2013385","DOI":"10.3115\/1621474.1621558"},{"key":"14689_CR10","doi-asserted-by":"publisher","unstructured":"Bertsimas D, Li ML (2020) \u201cScalable holistic linear regression\u201d, Oper Res Lett, https:\/\/doi.org\/10.1016\/j.orl.2020.02.008.","DOI":"10.1016\/j.orl.2020.02.008"},{"key":"14689_CR11","doi-asserted-by":"publisher","unstructured":"David Bienvenido-Huertas, Carlos Rubio-Bellido, Juan Luis P\u00e9rez-Ord\u00f3\u00f1ez, Miguel Jos\u00e9 Oliveira (2020) \u201cAutomation and optimization of in-situ assessment of wall thermal transmittance using a random Forest algorithm\u201d, Build Environ 168, ISSN 0360-1323, https:\/\/doi.org\/10.1016\/j.buildenv.2019.106479","DOI":"10.1016\/j.buildenv.2019.106479"},{"key":"14689_CR12","doi-asserted-by":"crossref","unstructured":"Bin AbdRazak S, Bin Mohamad AF (2013) \"Identification of spam email based on information from email header,\" 2013 13th International Conference on Intellient Systems Design and Applications, Bangi, pp. 347\u2013353","DOI":"10.1109\/ISDA.2013.6920762"},{"key":"14689_CR13","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1145\/130385.130401","volume-title":"A training algorithm for optimal margin classifiers. In proceedings of the fifth annual workshop on computational learning theory (COLT '92)","author":"BE Boser","year":"1992","unstructured":"Boser BE, Guyon IM, Vapnik VN (1992) A training algorithm for optimal margin classifiers. In proceedings of the fifth annual workshop on computational learning theory (COLT '92). Association for Computing Machinery, New York, NY, USA, pp 144\u2013152. https:\/\/doi.org\/10.1145\/130385.130401"},{"key":"14689_CR14","doi-asserted-by":"publisher","unstructured":"Braun AC, Weidner U, Hinz S (2011) \"Support vector machines, import vector machines and relevance vector machines for hyperspectral classification \u2014 A comparison,\" 2011 3rd Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing (WHISPERS), pp. 1\u20134, https:\/\/doi.org\/10.1109\/WHISPERS.2011.6080861.","DOI":"10.1109\/WHISPERS.2011.6080861"},{"key":"14689_CR15","doi-asserted-by":"publisher","unstructured":"Breiman, L (1996) Bagging Predict Mach Learn 24, 123\u2013140. https:\/\/doi.org\/10.1023\/A:1018054314350","DOI":"10.1023\/A:1018054314350"},{"key":"14689_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random For Mach Learn 45:5\u201332. https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Random For Mach Learn"},{"key":"14689_CR17","doi-asserted-by":"publisher","unstructured":"Bucurica M, Dogaru R, Dogaru I (2015) \"A comparison of Extreme Learning Machine and Support Vector Machine classifiers,\" 2015 IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 471\u2013474, https:\/\/doi.org\/10.1109\/ICCP.2015.7312705.","DOI":"10.1109\/ICCP.2015.7312705"},{"issue":"4","key":"14689_CR18","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1109\/COMST.2019.2926625","volume":"21","author":"M Chen","year":"2019","unstructured":"Chen M, Challita U, Saad W, Yin C, Debbah M (2019) Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial. IEEE Commun Surv Tutorials 21(4):3039\u20133071. https:\/\/doi.org\/10.1109\/COMST.2019.2926625","journal-title":"IEEE Commun Surv Tutorials"},{"key":"14689_CR19","doi-asserted-by":"publisher","unstructured":"Chharia A, Gupta RK (2013) \"Email classifier: An ensemble using probability and rules,\" 2013 Sixth International Conference on Contemporary Computing (IC3), pp. 130\u2013136, https:\/\/doi.org\/10.1109\/IC3.2013.6612176.","DOI":"10.1109\/IC3.2013.6612176"},{"key":"14689_CR20","doi-asserted-by":"publisher","unstructured":"Cho J, Kim S (2020) \u201cPersonal and social predictors of use and non-use of fitness\/diet app: application of random Forest algorithm\u201d, Telematics Inf 55, ISSN 0736-5853, https:\/\/doi.org\/10.1016\/j.tele.2019.101301","DOI":"10.1016\/j.tele.2019.101301"},{"key":"14689_CR21","unstructured":"Cristianni N, Shawe-Talyor J (2000) \u201cAn introduction to support vector machines\u201d, Cambridge Uninversity Press"},{"issue":"1","key":"14689_CR22","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.measurement.2010.10.004","volume":"44","author":"J Cui","year":"2011","unstructured":"Cui J, Wang Y (2011) A novel approach of analog circuit fault diagnosis using support vector machines classifier. Measurement 44(1):281\u2013289, ISSN 0263-2241. https:\/\/doi.org\/10.1016\/j.measurement.2010.10.004","journal-title":"Measurement"},{"key":"14689_CR23","doi-asserted-by":"publisher","unstructured":"Diale M, Van Der Walt C, Celik T, Modupe A (2016) \"Feature selection and support vector machine hyper-parameter optimisation for spam detection,\" 2016 Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech), pp. 1\u20137, https:\/\/doi.org\/10.1109\/RoboMech.2016.7813162.","DOI":"10.1109\/RoboMech.2016.7813162"},{"key":"14689_CR24","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1016\/j.procs.2018.05.024","volume":"132","author":"KS Digamberrao","year":"2018","unstructured":"Digamberrao KS, Prasad RS (2018) Author Identification using Sequential Minimal Optimization with rule-based Decision Tree on Indian Literature in Marathi. Proced Comput Sci 132:1086\u20131101, ISSN 1877\u20130509. https:\/\/doi.org\/10.1016\/j.procs.2018.05.024","journal-title":"Proced Comput Sci"},{"key":"14689_CR25","doi-asserted-by":"publisher","unstructured":"Dong Y, Ma X, Fu T (2020) Electrical load forecasting: A deep learning approach based on K-nearest neighbors, Appl Soft Comput J, https:\/\/doi.org\/10.1016\/j.asoc.2020.106900.","DOI":"10.1016\/j.asoc.2020.106900"},{"issue":"4","key":"14689_CR26","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/TSMC.1976.5408784","volume":"SMC-6","author":"SA Dudani","year":"1976","unstructured":"Dudani SA (1976) The distance-weighted k-nearest-neighbor rule. Trans Syst Man Cybern SMC-6(4):325\u2013327. https:\/\/doi.org\/10.1109\/TSMC.1976.5408784","journal-title":"Trans Syst Man Cybern"},{"key":"14689_CR27","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.1016\/j.procs.2018.05.116","volume":"132","author":"DR Edla","year":"2018","unstructured":"Edla DR, Mangalorekar K, Dhavalikar G, Dodia S (2018) Classification of EEG data for human mental state analysis using Random Forest Classifier. Procedia Comput Sci 132:1523\u20131532, ISSN 1877\u20130509. https:\/\/doi.org\/10.1016\/j.procs.2018.05.116","journal-title":"Procedia Comput Sci"},{"key":"14689_CR28","doi-asserted-by":"publisher","unstructured":"Ernawati S, Yulia ER, Frieyadie, Samudi (2018) \"Implementation of The Na\u00efve Bayes Algorithm with Feature Selection using Genetic Algorithm for Sentiment Review Analysis of Fashion Online Companies,\" 2018 6th International Conference on Cyber and IT Service Management (CITSM), pp. 1\u20135, https:\/\/doi.org\/10.1109\/CITSM.2018.8674286.","DOI":"10.1109\/CITSM.2018.8674286"},{"key":"14689_CR29","doi-asserted-by":"publisher","first-page":"2205","DOI":"10.1145\/3357384.3358092","volume-title":"Fast random Forest algorithm via incremental upper bound. In proceedings of the 28th ACM international conference on information and knowledge management (CIKM '19)","author":"Y Fujiwara","year":"2019","unstructured":"Fujiwara Y, Ida Y, Kanai S, Kumagai A, Arai J, Ueda N (2019) Fast random Forest algorithm via incremental upper bound. In proceedings of the 28th ACM international conference on information and knowledge management (CIKM '19). Association for Computing Machinery, New York, NY, USA, pp 2205\u20132208. https:\/\/doi.org\/10.1145\/3357384.3358092"},{"key":"14689_CR30","unstructured":"Garner SR (n.d.) \u201cWEKA: The Waikato Environment for Knowledge Analysis\u201d, Available: https:\/\/www.cs.waikato.ac.nz\/~ml\/publications\/1995\/Garner95-WEKA.pdf"},{"key":"14689_CR31","doi-asserted-by":"publisher","unstructured":"Gavankar SS, Sawarkar SD (2017) \"Eager decision tree,\" 2017 2nd International Conference for Convergence in Technology (I2CT), pp. 837\u2013840, https:\/\/doi.org\/10.1109\/I2CT.2017.8226246.","DOI":"10.1109\/I2CT.2017.8226246"},{"issue":"1","key":"14689_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.20286\/nova-jeas-060105","volume":"6","author":"DE Gbenga","year":"2017","unstructured":"Gbenga DE, Christopher N, Yetunde DC (2017) Performance Comparison of Machine Learning Techniques for Breast Cancer Detection. Nova J Eng Appl Sci 6(1):1\u20138. https:\/\/doi.org\/10.20286\/nova-jeas-060105","journal-title":"Nova J Eng Appl Sci"},{"key":"14689_CR33","doi-asserted-by":"crossref","unstructured":"Gomes SR et al. (2017) \"A comparative approach to email classification using Naive Bayes classifier and hidden Markov model,\" 2017 4th International Conference on Advances in Electrical Engineering (ICAEE), Dhaka, pp. 482\u2013487","DOI":"10.1109\/ICAEE.2017.8255404"},{"key":"14689_CR34","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.ijar.2021.08.006","volume":"138","author":"C Gong","year":"2021","unstructured":"Gong C, Zhi-gang S, Wang P-h, Wang Q, Yang Y (2021) Evidential instance selection for K-nearest neighbor classification of big data. Int. J. Approx. Reason. 138:123\u2013144, ISSN 0888-613X. https:\/\/doi.org\/10.1016\/j.ijar.2021.08.006","journal-title":"Int. J. Approx. Reason."},{"key":"14689_CR35","doi-asserted-by":"publisher","unstructured":"Guo Y., Bai L., Lao S., Wu S., Lew M.S. (2014) A Comparison between Artificial Neural Network and Cascade-Correlation Neural Network in Concept Classification. In: Ooi W.T., Snoek C.G.M., Tan H.K., Ho CK., Huet B., Ngo CW. (eds) Advances in Multimedia Information Processing \u2013 PCM 2014. PCM 2014. Lecture notes in computer science, vol 8879. Springer, Cham https:\/\/doi.org\/10.1007\/978-3-319-13168-9_26","DOI":"10.1007\/978-3-319-13168-9_26"},{"key":"14689_CR36","unstructured":"Gupta P, Dubey RK, Mishra S (2019) \u201cDetecting Spam Emails\/Sms Using Naive Bayes and Support Vector Machine\u201d, Int J Sci Technol Res, Volume 8, Issue 11"},{"key":"14689_CR37","doi-asserted-by":"crossref","unstructured":"Hassan MA, Mtetwa N (2018) \"Feature Extraction and Classification of Spam Emails,\" 2018 5th international conference on Soft Computing & Machine Intelligence (ISCMI), Nairobi, Kenya, pp. 93\u201398","DOI":"10.1109\/ISCMI.2018.8703222"},{"key":"14689_CR38","doi-asserted-by":"publisher","unstructured":"He L, Yang X, Lu H (2007) \"A Comparison of Support Vector Machines Ensemble for Classification,\" 2007 International Conference on Machine Learning and Cybernetics, pp. 3613\u20133617, https:\/\/doi.org\/10.1109\/ICMLC.2007.4370773.","DOI":"10.1109\/ICMLC.2007.4370773"},{"key":"14689_CR39","doi-asserted-by":"publisher","unstructured":"Heredia B, Khoshgoftaar TM, Prusa J, Crawford M (2016) \"An Investigation of Ensemble Techniques for Detection of Spam Reviews,\" 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 127\u2013133, https:\/\/doi.org\/10.1109\/ICMLA.2016.0029.","DOI":"10.1109\/ICMLA.2016.0029"},{"issue":"Part C","key":"14689_CR40","doi-asserted-by":"publisher","first-page":"1596","DOI":"10.1016\/j.neucom.2014.08.033","volume":"149","author":"X Huang","year":"2015","unstructured":"Huang X, Shi L, Suykens JAK (2015) Sequential minimal optimization for SVM with pinball loss. Neurocomputing 149(Part C):1596\u20131603, ISSN 0925-2312. https:\/\/doi.org\/10.1016\/j.neucom.2014.08.033","journal-title":"Neurocomputing"},{"key":"14689_CR41","doi-asserted-by":"publisher","unstructured":"Jain V, Phophalia A (2019) \"Exponential Weighted Random Forest for Hyperspectral Image Classification,\" IGARSS 2019\u20132019 IEEE International Geoscience and Remote Sensing Symposium, pp. 3297\u20133300, https:\/\/doi.org\/10.1109\/IGARSS.2019.8897862.","DOI":"10.1109\/IGARSS.2019.8897862"},{"key":"14689_CR42","doi-asserted-by":"publisher","unstructured":"Jiang L, Cai Z, Wang D, Jiang S (2007) \"Survey of Improving K-Nearest-Neighbor for Classification,\" Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007), pp. 679\u2013683, https:\/\/doi.org\/10.1109\/FSKD.2007.552.","DOI":"10.1109\/FSKD.2007.552"},{"key":"14689_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26622-6_6","volume-title":"Decision trees. In: Machine Learning and Artificial Intelligence","author":"AV Joshi","year":"2020","unstructured":"Joshi AV (2020) Decision trees. In: Machine Learning and Artificial Intelligence. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-26622-6_6"},{"key":"14689_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2513683.2513685","volume":"2","author":"F Kadl\u010dek","year":"2013","unstructured":"Kadl\u010dek F, Fu\u010d\u00edk O (2013) \u201cFast and energy efficient AdaBoost classifier\u201d, in proceedings of the 10th FPGAworld conference (FPGAworld '13). Assoc Comput Mach New York NY USA 2:1\u20135. https:\/\/doi.org\/10.1145\/2513683.2513685","journal-title":"Assoc Comput Mach New York NY USA"},{"key":"14689_CR45","doi-asserted-by":"publisher","unstructured":"Kalbhor M, Shrivastava S, Ujjainiya B (2013) \"An artificial immune system with local feature selection classifier for spam filtering,\" in 2013 fourth international conference on computing, communications and networking technologies (ICCCNT), Tiruchengode, India pp. 1\u20137.https:\/\/doi.org\/10.1109\/ICCCNT.2013.6726691","DOI":"10.1109\/ICCCNT.2013.6726691"},{"issue":"2","key":"14689_CR46","first-page":"01","volume":"7","author":"SR Kalmegh","year":"2018","unstructured":"Kalmegh SR (2018) Comparative analysis of the WEKA classifiers rules Conjunctiverule&Decisiontable on Indian news dataset by using different test mode. Int J Eng Sci Invent (IJESI) 7(2):01\u201309","journal-title":"Int J Eng Sci Invent (IJESI)"},{"key":"14689_CR47","doi-asserted-by":"publisher","unstructured":"Kang K, Gao F, Feng J (2018) \"A New Multi-Layer Classification Method Based on Logistic Regression,\" 2018 13th International Conference on Computer Science & Education (ICCSE), pp. 1\u20134, https:\/\/doi.org\/10.1109\/ICCSE.2018.8468725","DOI":"10.1109\/ICCSE.2018.8468725"},{"issue":"6","key":"14689_CR48","first-page":"83","volume":"8","author":"J Kaur","year":"2017","unstructured":"Kaur J, Baghla S (2017) Modified decision table classifier by using decision support and confidence in online shopping dataset. Int J Comput Eng Technol 8(6):83\u201388","journal-title":"Int J Comput Eng Technol"},{"key":"14689_CR49","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/3-540-59286-5_57","volume-title":"The power of decision tables. In proceedings of the 8th European conference on machine learning (ECML\u201995)","author":"R Kohavi","year":"1995","unstructured":"Kohavi R (1995) The power of decision tables. In proceedings of the 8th European conference on machine learning (ECML\u201995). Springer-Verlag, Berlin, Heidelberg, pp 174\u2013189. https:\/\/doi.org\/10.1007\/3-540-59286-5_57"},{"key":"14689_CR50","unstructured":"Kohavi R, Sommerfield D (1998) Targeting business users with decision table classifiers. In proceedings of the fourth international conference on knowledge discovery and data mining (KDD'98). AAAI press, 249\u2013253"},{"key":"14689_CR51","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/j.procs.2021.06.056","volume":"190","author":"Y Kontsewaya","year":"2021","unstructured":"Kontsewaya Y, Antonov E, Artamonov A (2021) Evaluating the effectiveness of machine learning methods for spam detection. Proced Comput Sci 190:479\u2013486, ISSN 1877-0509. https:\/\/doi.org\/10.1016\/j.procs.2021.06.056","journal-title":"Proced Comput Sci"},{"key":"14689_CR52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38652-7_2","volume-title":"K-nearest neighbors. In: dimensionality reduction with unsupervised nearest neighbors. Intelligent systems reference library, vol 51","author":"O Kramer","year":"2013","unstructured":"Kramer O (2013) K-nearest neighbors. In: dimensionality reduction with unsupervised nearest neighbors. Intelligent systems reference library, vol 51. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-38652-7_2"},{"key":"14689_CR53","doi-asserted-by":"publisher","unstructured":"Lei H, Long Q (2011) \"Locate potential Support Vectors for faster Sequential Minimal Optimization,\" 2011 Seventh International Conference on Natural Computation, pp. 367\u2013372, https:\/\/doi.org\/10.1109\/ICNC.2011.6022107.","DOI":"10.1109\/ICNC.2011.6022107"},{"key":"14689_CR54","doi-asserted-by":"publisher","unstructured":"Li J, Huang S, He R, Qian K (2008) \"Image Classification Based on Fuzzy Support Vector Machine,\" 2008 International Symposium on Computational Intelligence and Design, pp. 68\u201371, https:\/\/doi.org\/10.1109\/ISCID.2008.51.","DOI":"10.1109\/ISCID.2008.51"},{"issue":"2","key":"14689_CR55","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1109\/72.991432","volume":"13","author":"C-F Lin","year":"2002","unstructured":"Lin C-F, Wang S-D (2002) Fuzzy support vector machines. Trans Neural Netw 13(2):464\u2013471. https:\/\/doi.org\/10.1109\/72.991432","journal-title":"Trans Neural Netw"},{"key":"14689_CR56","doi-asserted-by":"publisher","unstructured":"Lin Z, Qiu D, Ergu D, Ying C, Liu K (2019) \u201cA study on predicting loan default based on the random forest algorithm\u201d, Proced Comput Sci, Volume 162, Pages 503\u2013513, ISSN 1877-0509, https:\/\/doi.org\/10.1016\/j.procs.2019.12.017.","DOI":"10.1016\/j.procs.2019.12.017"},{"key":"14689_CR57","doi-asserted-by":"publisher","unstructured":"Lin L, Dekkers IA, Tao Q, Lamb HJ (n.d.) \u201cNovel artificial neural network and linear regression based equation for estimating visceral adipose tissue volume, Clin Nutr\u201d, https:\/\/doi.org\/10.1016\/j.clnu.2020.02.013.","DOI":"10.1016\/j.clnu.2020.02.013"},{"key":"14689_CR58","doi-asserted-by":"publisher","first-page":"4360","DOI":"10.1109\/ICMLC.2005.1527705","volume":"7","author":"Y-Z Liu","year":"2005","unstructured":"Liu Y-Z, Yao H-X, Gao W, Zhao D-B (2005) Single sequential minimal optimization: an improved SVMs training algorithm. 2005 Int Conf Mach Learn Cybern 7:4360\u20134364. https:\/\/doi.org\/10.1109\/ICMLC.2005.1527705","journal-title":"2005 Int Conf Mach Learn Cybern"},{"key":"14689_CR59","doi-asserted-by":"publisher","unstructured":"Lv C, Chen D-R (2018) \u201cInterpretable Functional Logistic Regression\u201d, CSAE \u201818, October 22\u201324, Hohhot, China, https:\/\/doi.org\/10.1145\/3207677.3277962","DOI":"10.1145\/3207677.3277962"},{"key":"14689_CR60","doi-asserted-by":"publisher","unstructured":"Ma CJ, Ding ZS (2020) \"Improvement of k-nearest neighbor algorithm based on double filtering,\" 2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), pp. 1567\u20131570, https:\/\/doi.org\/10.1109\/ICMCCE51767.2020.00343.","DOI":"10.1109\/ICMCCE51767.2020.00343"},{"issue":"Issue \u2013 5","key":"14689_CR61","first-page":"337","volume":"7","author":"B Matharasi","year":"2017","unstructured":"Matharasi B, Senthilrajan A (2017) Sentiment Analysis of Twitter Data using Naive bayes with Unigran Approach. Int J Sci Res Publ 7(Issue \u2013 5) ISSN: 2250-3153:337\u2013341","journal-title":"Int J Sci Res Publ"},{"key":"14689_CR62","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.asoc.2018.12.008","volume":"76","author":"JR Mendez","year":"2019","unstructured":"Mendez JR, Cotos-Yanez TR, Ruano-Ordas D (2019) A new semantic-based feature selection method for spam filtering. Appl Soft Comput J 76:89\u2013104","journal-title":"Appl Soft Comput J"},{"key":"14689_CR63","doi-asserted-by":"publisher","unstructured":"Moon S-H, Kim Y-H (2019) \u201cAn improved forecast of precipitation type using correlation-based feature selection and multinomial logistic regression\u201d, Atmos Res, https:\/\/doi.org\/10.1016\/j.atmosres.2020.104928","DOI":"10.1016\/j.atmosres.2020.104928"},{"key":"14689_CR64","doi-asserted-by":"publisher","unstructured":"More AS, Rana DP (2017) \"Review of random forest classification techniques to resolve data imbalance,\" 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM), pp. 72\u201378, https:\/\/doi.org\/10.1109\/ICISIM.2017.8122151.","DOI":"10.1109\/ICISIM.2017.8122151"},{"key":"14689_CR65","doi-asserted-by":"crossref","unstructured":"Nasreen M Shajideen, BV (2018) \u201cSpam filtering: a comparison between different machine learning classifiers\u201d, proceedings of the 2nd international conference on electronics, communication and aerospace technology (ICECA 2018)","DOI":"10.1109\/ICECA.2018.8474778"},{"key":"14689_CR66","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.micpro.2019.06.007","volume":"69","author":"DH Noronha","year":"2019","unstructured":"Noronha DH, Torquato MF, Fernandes MAC (2019) A parallel implementation of sequential minimal optimization on FPGA. Microprocess Microsyst 69:138\u2013151, ISSN 0141-9331. https:\/\/doi.org\/10.1016\/j.micpro.2019.06.007","journal-title":"Microprocess Microsyst"},{"key":"14689_CR67","doi-asserted-by":"publisher","unstructured":"Okfalisa, IG, Mustakim, Reza NGI (2017) \"Comparative analysis of k-nearest neighbor and modified k-nearest neighbor algorithm for data classification,\" 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), pp. 294\u2013298, https:\/\/doi.org\/10.1109\/ICITISEE.2017.8285514.","DOI":"10.1109\/ICITISEE.2017.8285514"},{"key":"14689_CR68","doi-asserted-by":"publisher","unstructured":"Osegi EN, Jumbo EF (2021) \u201cComparative analysis of credit card fraud detection in simulated annealing trained artificial neural network and hierarchical temporal memory\u201d, Mach Learn Appl 6, ISSN 2666-8270, https:\/\/doi.org\/10.1016\/j.mlwa.2021.100080","DOI":"10.1016\/j.mlwa.2021.100080"},{"key":"14689_CR69","doi-asserted-by":"publisher","unstructured":"Paing MP, Pintavirooj C, Tungjitkusolmun S, Choomchuay S, Hamamoto K (2018) \"Comparison of Sampling Methods for Imbalanced Data Classification in Random Forest,\" 2018 11th Biomedical Engineering International Conference (BMEiCON), pp. 1\u20135, https:\/\/doi.org\/10.1109\/BMEiCON.2018.8609946.","DOI":"10.1109\/BMEiCON.2018.8609946"},{"key":"14689_CR70","doi-asserted-by":"publisher","unstructured":"Panhalkar AR, Doye DD (2021) \u201cOptimization of decision trees using modified African buffalo algorithm\u201d, J King Saud Univ Comput Inf Sci, ISSN 1319-1578, https:\/\/doi.org\/10.1016\/j.jksuci.2021.01.011.","DOI":"10.1016\/j.jksuci.2021.01.011"},{"key":"14689_CR71","doi-asserted-by":"publisher","unstructured":"Panigrahi PK (2012) \"A Comparative Study of Supervised Machine Learning Techniques for Spam E-mail Filtering,\" 2012 Fourth International Conference on Computational Intelligence and Communication Networks, pp. 506\u2013512, https:\/\/doi.org\/10.1109\/CICN.2012.14.","DOI":"10.1109\/CICN.2012.14"},{"key":"14689_CR72","first-page":"323","volume":"132","author":"R Panigrahi","year":"2018","unstructured":"Panigrahi R, Borah S (2018) Rank Allocation to J48 Group of Decision Tree Classifiers using Binary and Multiclass Intrusion Detection Datasets. Int Conf Comput Intell Data Sci (ICCIDS 2018), Procedia Comput Therm Sci 132:323\u2013332","journal-title":"Int Conf Comput Intell Data Sci (ICCIDS 2018), Procedia Comput Therm Sci"},{"key":"14689_CR73","doi-asserted-by":"publisher","unstructured":"Patel DR, Kiran MB (n.d.) \u201cA non-contact approach for surface roughness prediction in CNC turning using a linear regression model\u201d, Mater Today Proceed, https:\/\/doi.org\/10.1016\/j.matpr.2019.12.029","DOI":"10.1016\/j.matpr.2019.12.029"},{"key":"14689_CR74","doi-asserted-by":"publisher","unstructured":"Patel R, Thakkar P (2014) \"Opinion Spam Detection Using Feature Selection,\" 2014 International Conference on Computational Intelligence and Communication Networks, pp. 560\u2013564, https:\/\/doi.org\/10.1109\/CICN.2014.127.","DOI":"10.1109\/CICN.2014.127"},{"key":"14689_CR75","doi-asserted-by":"publisher","unstructured":"Patil S, Kulkarni U (2019) \"Accuracy Prediction for Distributed Decision Tree using Machine Learning approach,\" 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1365\u20131371, https:\/\/doi.org\/10.1109\/ICOEI.2019.8862580.","DOI":"10.1109\/ICOEI.2019.8862580"},{"key":"14689_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3009977.3010003","volume":"1","author":"A Paul","year":"2016","unstructured":"Paul A, Mukherjee DP (2016) Reinforced random forest. In proceedings of the tenth Indian conference on computer vision, graphics and image processing (ICVGIP '16). Assoc Comput Mach New York NY USA 1:1\u20138. https:\/\/doi.org\/10.1145\/3009977.3010003","journal-title":"Assoc Comput Mach New York NY USA"},{"key":"14689_CR77","doi-asserted-by":"publisher","unstructured":"Pelle R, Alc\u00e2ntara C, Moreira VP (2018) \u201cA Classifier Ensemble for Offensive Text Detection\u201d, WebMedia \u201818, October 16\u201319, Salvador-BA, Brazil, https:\/\/doi.org\/10.1145\/3243082.3243111","DOI":"10.1145\/3243082.3243111"},{"key":"14689_CR78","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.ins.2012.09.009","volume":"221","author":"X Peng","year":"2013","unstructured":"Peng X, Xu D (2013) A twin-hypersphere support vector machine classifier and the fast learning algorithm. Inf. Sci. 221:12\u201327, ISSN 0020-0255. https:\/\/doi.org\/10.1016\/j.ins.2012.09.009","journal-title":"Inf. Sci."},{"key":"14689_CR79","doi-asserted-by":"publisher","unstructured":"Pisner DA, Schnyer DM (2020) \u201cChapter 6 - Support vector machine\u201d, Editor(s): Andrea Mechelli, Sandra Vieira, Machine Learning, Academic Press, Pages 101\u2013121, ISBN 9780128157398, https:\/\/doi.org\/10.1016\/B978-0-12-815739-8.00006-7.","DOI":"10.1016\/B978-0-12-815739-8.00006-7"},{"key":"14689_CR80","unstructured":"Platt, J (1998) Sequential minimal optimization : a fast algorithm for training support vector machines. Microsoft Res Tech Rep"},{"key":"14689_CR81","first-page":"185","volume-title":"Fast training of support vector machines using sequential minimal optimization. Advances in kernel methods: support vector learning","author":"JC Platt","year":"1999","unstructured":"Platt JC (1999) Fast training of support vector machines using sequential minimal optimization. Advances in kernel methods: support vector learning. MIT press, Cambridge, MA, USA, pp 185\u2013208"},{"key":"14689_CR82","first-page":"557","volume-title":"Using analytic QP and sparseness to speed training of support vector machines. In proceedings of the 1998 conference on advances in neural information processing systems II","author":"JC Platt","year":"1999","unstructured":"Platt JC (1999) Using analytic QP and sparseness to speed training of support vector machines. In proceedings of the 1998 conference on advances in neural information processing systems II. MIT press, Cambridge, MA, USA, pp 557\u2013563"},{"key":"14689_CR83","unstructured":"Provost, J (1999) \u201cNa ive-Bayes vs. Rule-Learning in Classification of Email.\u201dAvailable: http:\/\/www.cs.utexas.edu\/ftp\/AI-Lab\/tech-reports\/UT-AI-TR-99-284.pdf"},{"issue":"1","key":"14689_CR84","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/234313.234346","volume":"28","author":"JR Quinlan","year":"1996","unstructured":"Quinlan JR (1996) Learning decision tree classifiers. ACM Comput Surv 28(1):71\u201372. https:\/\/doi.org\/10.1145\/234313.234346","journal-title":"ACM Comput Surv"},{"key":"14689_CR85","doi-asserted-by":"crossref","unstructured":"Rachida I, Abdelwahed N, Sanaa E F (2019) \u201cJ48 Algorithms of machine learning for predicting user\u2019s the acceptance of an E-orientation Systems\u201d, SCA2019, October 2\u20134, Casablanca, Morocco","DOI":"10.1145\/3368756.3368995"},{"key":"14689_CR86","doi-asserted-by":"publisher","unstructured":"Rathod SB, Pattewar TM (2015) \"Content based spam detection in email using Bayesian classifier,\" 2015 International Conference on Communications and Signal Processing (ICCSP), Melmaruvathur, pp. 1257\u20131261, https:\/\/doi.org\/10.1109\/ICCSP.2015.7322709.","DOI":"10.1109\/ICCSP.2015.7322709"},{"key":"14689_CR87","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","volume":"117","author":"OK Sahingoz","year":"2019","unstructured":"Sahingoz OK, Buber E, Onder Demir BD (2019) Machine learning based phishing detection from URLs. Exp Syst Appl 117:345\u2013357, ISSN 0957\u20134174. https:\/\/doi.org\/10.1016\/j.eswa.2018.09.029","journal-title":"Exp Syst Appl"},{"issue":"5","key":"14689_CR88","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1080\/17517575.2020.1712742","volume":"14","author":"SR Sahoo","year":"2020","unstructured":"Sahoo SR, Gupta BB (2020) Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection. Enterp Inf Syst 14(5):710\u2013736. https:\/\/doi.org\/10.1080\/17517575.2020.1712742","journal-title":"Enterp Inf Syst"},{"key":"14689_CR89","doi-asserted-by":"publisher","unstructured":"Saidani N, Adi K, Allili MS (2020) \u201cA semantic-based classification approach for an enhanced spam detection\u201d, Comput Secur 94, ISSN 0167-4048, https:\/\/doi.org\/10.1016\/j.cose.2020.101716","DOI":"10.1016\/j.cose.2020.101716"},{"key":"14689_CR90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41136-6_5","volume-title":"Empirical Inference","author":"RE Schapire","year":"2013","unstructured":"Schapire RE (2013) Explaining AdaBoost. In: Sch\u00f6lkopf B, Luo Z, Vovk V (eds) Empirical Inference. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-41136-6_5"},{"issue":"2","key":"14689_CR91","first-page":"145","volume":"18","author":"A ShafighAski","year":"2016","unstructured":"ShafighAski A, Sourati NK (2016) Proposed efficient algorithm to filter spam using machine learning techniques. Pac Sci Rev A Nat Sci Eng 18(2):145\u2013149","journal-title":"Pac Sci Rev A Nat Sci Eng"},{"key":"14689_CR92","doi-asserted-by":"publisher","unstructured":"Shah N, Jain S (2019) \"Detection of Disease in Cotton Leaf using Artificial Neural Network,\" 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 473\u2013476, https:\/\/doi.org\/10.1109\/AICAI.2019.8701311.","DOI":"10.1109\/AICAI.2019.8701311"},{"key":"14689_CR93","doi-asserted-by":"publisher","unstructured":"Shahbudin S, Hussain A, Samad SA, Md Tahir N (2008) \"Training and analysis of Support Vector Machine using Sequential Minimal Optimization,\" 2008 IEEE International Conference on Systems, Man and Cybernetics, pp. 373\u2013378, https:\/\/doi.org\/10.1109\/ICSMC.2008.4811304.","DOI":"10.1109\/ICSMC.2008.4811304"},{"key":"14689_CR94","doi-asserted-by":"publisher","unstructured":"Sharma A, Suryawanshi A (2016) \u201cA Novel Method for Detecting Spam Email using KNN Classification with Spearman Correlation as Distance Measure\u201d, Int J Comput Appl (0975\u20138887) Volume 136, No.6, https:\/\/doi.org\/10.5120\/ijca2016908471","DOI":"10.5120\/ijca2016908471"},{"key":"14689_CR95","doi-asserted-by":"crossref","unstructured":"Sharma AK, Yadav R (2015) \u201cSpam Mails Filtering Using Different Classifiers with Feature Selection and Reduction Techniques\u201d, 2015 Fifth International Conference on Communication Systems and Network Technologies","DOI":"10.1109\/CSNT.2015.11"},{"key":"14689_CR96","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1145\/1523103.1523191","volume-title":"Support vector machine (SVM) classifier for brain tumor detection. In proceedings of the international conference on advances in computing, communication and control (ICAC3 '09)","author":"DC Shubhangi","year":"2009","unstructured":"Shubhangi DC, Hiremath PS (2009) Support vector machine (SVM) classifier for brain tumor detection. In proceedings of the international conference on advances in computing, communication and control (ICAC3 '09). Association for Computing Machinery, New York, NY, USA, pp 444\u2013448. https:\/\/doi.org\/10.1145\/1523103.1523191"},{"key":"14689_CR97","doi-asserted-by":"crossref","unstructured":"Singh AK, Bhushan S, Vij S(2019) \u201cfiltering spam messages and mails using fuzzy C means algorithm\u201d, 2019 4th international conference on internet of things: smart innovation and usages (IoT-SIU), Ghaziabad, India, pp. 1\u20135","DOI":"10.1109\/IoT-SIU.2019.8777483"},{"key":"14689_CR98","doi-asserted-by":"crossref","unstructured":"Subasi A, Alzahrani S, Aljuhani A, Aljedani M (2018) \"Comparison of Decision Tree Algorithms for Spam E-mail Filtering,\" 2018 1st international conference on computer applications & information security (ICCAIS), Riyadh, pp. 1\u20135","DOI":"10.1109\/CAIS.2018.8442016"},{"key":"14689_CR99","doi-asserted-by":"publisher","unstructured":"Sun S, Huang R (2010) \"An adaptive k-nearest neighbor algorithm,\" 2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery, pp. 91\u201394, https:\/\/doi.org\/10.1109\/FSKD.2010.5569740.","DOI":"10.1109\/FSKD.2010.5569740"},{"key":"14689_CR100","doi-asserted-by":"publisher","unstructured":"Suriya Prakash J, Annamalai Vignesh K, Ashok C, Adithyan R (2012) \"Multi class Support Vector Machines classifier for machine vision application,\" 2012 International Conference on Machine Vision and Image Processing (MVIP), pp. 197\u2013199, https:\/\/doi.org\/10.1109\/MVIP.2012.6428794.","DOI":"10.1109\/MVIP.2012.6428794"},{"key":"14689_CR101","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.measurement.2019.05.102","volume":"146","author":"J Susai Mary","year":"2019","unstructured":"Susai Mary J, Sai Balaji MA, Krishnakumari A, Nakandhrakumar RS, Dinakaran D (2019) Monitoring of drill runout using Least Square support vector machine classifier. Measurement 146:24\u201334, ISSN 0263-2241. https:\/\/doi.org\/10.1016\/j.measurement.2019.05.102","journal-title":"Measurement"},{"key":"14689_CR102","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7641-3_9","volume-title":"Support vector machine. In: machine learning models and algorithms for big data classification. Integrated series in information systems, vol 36","author":"S Suthaharan","year":"2016","unstructured":"Suthaharan S (2016) Support vector machine. In: machine learning models and algorithms for big data classification. Integrated series in information systems, vol 36. Springer, Boston, MA. https:\/\/doi.org\/10.1007\/978-1-4899-7641-3_9"},{"key":"14689_CR103","unstructured":"Tina R Patil, SSS (2013) \u201cPerformance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification\u201d, Int J Comput Sci Appl Vol. 6, No.2 ISSN: 0974\u20131011"},{"key":"14689_CR104","doi-asserted-by":"publisher","unstructured":"Tran T, Tsai P, Jan T (2008) \"An adjustable combination of linear regression and modified probabilistic neural network for anti-spam filtering,\" in ICPR 2008 19th international conference on pattern recognition, Tampa, FLhttps:\/\/doi.org\/10.1109\/ICPR.2008.4761358","DOI":"10.1109\/ICPR.2008.4761358"},{"key":"14689_CR105","unstructured":"Tretyakov K (n.d.) \u201cMachine Learning Techniques in Spam Filtering\u201d, Available: https:\/\/courses.cs.ut.ee\/2004\/dm-seminar-spring\/uploads\/Main\/P06.pdf"},{"key":"14689_CR106","doi-asserted-by":"publisher","unstructured":"Tseng C, Chen M (2009) \"Incremental SVM Model for Spam Detection on Dynamic Email Social Networks,\" 2009 International Conference on Computational Science and Engineering, pp. 128\u2013135, https:\/\/doi.org\/10.1109\/CSE.2009.260.","DOI":"10.1109\/CSE.2009.260"},{"key":"14689_CR107","doi-asserted-by":"publisher","unstructured":"Tur\u010dan\u00edk M (2015) \"Packet filtering by artificial neural network,\" Int Conf Mil Technol (ICMT), 2015, pp. 1\u20134, https:\/\/doi.org\/10.1109\/MILTECHS.2015.7153739.","DOI":"10.1109\/MILTECHS.2015.7153739"},{"key":"14689_CR108","doi-asserted-by":"publisher","unstructured":"Urmaliya A, Singhai J (2013) \"Sequential minimal optimization for support vector machine with feature selection in breast cancer diagnosis,\" 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013), pp. 481\u2013486, https:\/\/doi.org\/10.1109\/ICIIP.2013.6707638.","DOI":"10.1109\/ICIIP.2013.6707638"},{"key":"14689_CR109","doi-asserted-by":"publisher","unstructured":"Vanhoenshoven F, N\u00e1poles G, Falcon R, Vanhoof K, K\u00f6ppen M (2016) \"Detecting malicious URLs using machine learning techniques,\" 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, pp. 1\u20138, https:\/\/doi.org\/10.1109\/SSCI.2016.7850079.","DOI":"10.1109\/SSCI.2016.7850079"},{"key":"14689_CR110","unstructured":"Vapnik VN (1998) Statistical learning theory. John Wiley & Sons"},{"issue":"5","key":"14689_CR111","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/72.788640","volume":"10","author":"VN Vapnik","year":"1999","unstructured":"Vapnik VN (1999) An overview of statistical learning theory. Trans Neural Netw 10(5):988\u2013999. https:\/\/doi.org\/10.1109\/72.788640","journal-title":"Trans Neural Netw"},{"key":"14689_CR112","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3264-1_6","volume-title":"Methods of pattern recognition. In: The Nature of Statistical Learning Theory. Statistics for Engineering and Information Science","author":"VN Vapnik","year":"2000","unstructured":"Vapnik VN (2000) Methods of pattern recognition. In: The Nature of Statistical Learning Theory. Statistics for Engineering and Information Science. Springer, New York, NY. https:\/\/doi.org\/10.1007\/978-1-4757-3264-1_6"},{"key":"14689_CR113","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.cose.2018.04.010","volume":"77","author":"R Vijayanand","year":"2018","unstructured":"Vijayanand R, Devaraj D, Kannapiran B (2018) Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Comput Secur 77:304\u2013314, ISSN 0167-4048. https:\/\/doi.org\/10.1016\/j.cose.2018.04.010","journal-title":"Comput Secur"},{"key":"14689_CR114","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0377-4_5","volume-title":"Artificial neural network. In: interdisciplinary computing in Java programming. The springer international series in engineering and computer science, vol 743","author":"SC Wang","year":"2003","unstructured":"Wang SC (2003) Artificial neural network. In: interdisciplinary computing in Java programming. The springer international series in engineering and computer science, vol 743. Springer, Boston, MA. https:\/\/doi.org\/10.1007\/978-1-4615-0377-4_5"},{"key":"14689_CR115","doi-asserted-by":"publisher","unstructured":"Wang L-S, Xu Y-T, Zhao L-S (2005) \"A kind of hybrid classification algorithm based on rough set and support vector machine,\" 2005 International Conference on Machine Learning and Cybernetics, pp. 1676-1679 Vol. 3, https:\/\/doi.org\/10.1109\/ICMLC.2005.1527214.","DOI":"10.1109\/ICMLC.2005.1527214"},{"issue":"6","key":"14689_CR116","doi-asserted-by":"publisher","first-page":"Article 69","DOI":"10.1145\/3232230","volume":"9","author":"S Wang","year":"2018","unstructured":"Wang S, Aggarwal C, Liu H (2018) Random-Forest-Inspired Neural Networks. ACM Trans Intell Syst Technol 9(6):Article 69. https:\/\/doi.org\/10.1145\/3232230","journal-title":"ACM Trans Intell Syst Technol"},{"key":"14689_CR117","doi-asserted-by":"publisher","first-page":"107521","DOI":"10.1016\/j.patcog.2020.107521","volume":"107","author":"F Wang","year":"2020","unstructured":"Wang F, Wang Q, Nie F, Li Z, Yu W, Ren F (2020, ISSN 0031-3203) A linear multivariate binary decision tree classifier based on K-means splitting. Pattern Recognit 107:107521. https:\/\/doi.org\/10.1016\/j.patcog.2020.107521","journal-title":"Pattern Recognit"},{"key":"14689_CR118","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.jspi.2019.12.004","volume":"207","author":"R Wei","year":"2020","unstructured":"Wei R, Ghosal S (2020) Contraction properties of shrinkage priors in logistic regression. J Stat Plann Infer 207:215\u2013229. https:\/\/doi.org\/10.1016\/j.jspi.2019.12.004","journal-title":"J Stat Plann Infer"},{"key":"14689_CR119","doi-asserted-by":"publisher","unstructured":"Witt G (2012) Chapter 3 - A brief history of rules, Editor(s): Graham Witt, Writing Effective Business Rules, Morgan Kaufmann, Pages 25\u201363, ISBN 9780123850515, https:\/\/doi.org\/10.1016\/B978-0-12-385051-5.00003-3.","DOI":"10.1016\/B978-0-12-385051-5.00003-3"},{"key":"14689_CR120","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/3219788.3219804","volume-title":"Website defacements detection based on support vector machine classification method. In proceedings of the 2018 international conference on computing and data engineering (ICCDE 2018)","author":"S Wu","year":"2018","unstructured":"Wu S, Tong X, Wang W, Xin G, Wang B, Zhou Q (2018) Website defacements detection based on support vector machine classification method. In proceedings of the 2018 international conference on computing and data engineering (ICCDE 2018). Association for Computing Machinery, New York, NY, USA, pp 62\u201366. https:\/\/doi.org\/10.1145\/3219788.3219804"},{"key":"14689_CR121","doi-asserted-by":"publisher","unstructured":"Yang F (2019) \"An Extended Idea about Decision Trees,\" 2019 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 349\u2013354, https:\/\/doi.org\/10.1109\/CSCI49370.2019.00068.","DOI":"10.1109\/CSCI49370.2019.00068"},{"key":"14689_CR122","doi-asserted-by":"crossref","unstructured":"Yasin W, Ibrahim H Intelligent Cooperative Least Recently Used Web Caching Policy based on J48 Classifier. iiWAS2014 Hanoi, Vietnam","DOI":"10.1145\/2684200.2684299"},{"key":"14689_CR123","doi-asserted-by":"publisher","unstructured":"Yuan P, Ren S, Xu H, Chen J (2018) \"Chrysanthemum Abnormal Petal Type Classification using Random Forest and Over-sampling,\" 2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 275\u2013278, https:\/\/doi.org\/10.1109\/BIBM.2018.8621234.","DOI":"10.1109\/BIBM.2018.8621234"},{"key":"14689_CR124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67340-0_1","volume-title":"Artificial neural network. In: Multivariate Time Series Analysis in Climate and Environmental Research","author":"Z Zhang","year":"2018","unstructured":"Zhang Z (2018) Artificial neural network. In: Multivariate Time Series Analysis in Climate and Environmental Research. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-67340-0_1"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14689-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14689-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14689-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T01:18:58Z","timestamp":1728955138000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14689-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":124,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["14689"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14689-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,20]]},"assertion":[{"value":"14 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest in the publication of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}