{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T21:00:30Z","timestamp":1762981230452,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s11277-021-09221-5","type":"journal-article","created":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T04:29:44Z","timestamp":1635827384000},"page":"1913-1923","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Collaborative Abstraction Based Email Spam Filtering with Fingerprints"],"prefix":"10.1007","volume":"123","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8749-3693","authenticated-orcid":false,"given":"P.","family":"Rajendran","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Tamilarasi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Mynavathi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"key":"9221_CR1","doi-asserted-by":"publisher","unstructured":"Dada, E. G., Bassi, J. S., Chiroma, H., Abdulhamid, S. M., Adetunmbi, A. O., & Ajibuwa, O. M. (2019). Machine learning for email spam filtering: Review, approaches and open research problems. Heliyon. https:\/\/doi.org\/10.1016\/j.heliyon.2019.e01802.","DOI":"10.1016\/j.heliyon.2019.e01802"},{"key":"9221_CR2","doi-asserted-by":"publisher","unstructured":"Radovanovic, D., & Krstajic, B. (2018). Review spam detection using machine learning. In 23rd International Scientific-Professional Conference on Information Technology (IT), 1\u20134, https:\/\/doi.org\/10.1109\/SPIT.2018.8350457.","DOI":"10.1109\/SPIT.2018.8350457"},{"key":"9221_CR3","doi-asserted-by":"publisher","unstructured":"Liu, P., & Moh, T. (2016). Content based spam e-mail filtering. In International Conference on Collaboration Technologies and Systems (CTS), 218\u2013224, https:\/\/doi.org\/10.1109\/CTS.2016.0052.","DOI":"10.1109\/CTS.2016.0052"},{"key":"9221_CR4","doi-asserted-by":"publisher","unstructured":"Sokolov, M., Olufowobi, K., and Herndon, N. (2020). Visual spoofing in content-based spam detection. In 13th International Conference on Security of Information and Networks (SIN 2020). Association for Computing Machinery, 1\u20135. https:\/\/doi.org\/10.1145\/3433174.3433605.","DOI":"10.1145\/3433174.3433605"},{"key":"9221_CR5","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1770\/1\/012031","volume":"1770","author":"P Shyry","year":"2021","unstructured":"Shyry, P., & Jinila, B. (2021). Detection and prevention of spam mail with semantics-based text classification of collaborative and content filtering. Journal of Physics: Conference Series., 1770, 012031. https:\/\/doi.org\/10.1088\/1742-6596\/1770\/1\/012031","journal-title":"Journal of Physics: Conference Series."},{"key":"9221_CR6","doi-asserted-by":"publisher","unstructured":"Wang, S., Zhang, X., Cheng, Y., Jiang, F., Yu, W., & Peng, J. (2018). A fast content- based spam filtering algorithm with fuzzy-SVM and K-means. IEEE International Conference on Big Data and Smart Computing (BigComp). https:\/\/doi.org\/10.1109\/BigComp.2018.00051.","DOI":"10.1109\/BigComp.2018.00051"},{"key":"9221_CR7","doi-asserted-by":"publisher","unstructured":"Anitha, P. U. & Rao, C. V. G. & Babu, S. (2017). Email spam classification using neighbor probability based Na\u00efve Bayes algorithm. In 7th International Conference on Communication Systems and Network Technologies (CSNT), 350\u2013355.https:\/\/doi.org\/10.1109\/CSNT.2017.8418565","DOI":"10.1109\/CSNT.2017.8418565"},{"key":"9221_CR8","doi-asserted-by":"publisher","unstructured":"Ma, T.M., Yamamori, K., & Thida, A. (2020). A comparative approach to Na\u00efve Bayes classifier and support vector machine for email spam classification. In IEEE 9th Global Conference on Consumer Electronics (GCCE), 324\u2013326, https:\/\/doi.org\/10.1109\/GCCE50665.2020.9291921","DOI":"10.1109\/GCCE50665.2020.9291921"},{"key":"9221_CR9","doi-asserted-by":"publisher","unstructured":"Peng, W., Huang, L., Jia, J., & Ingram, E. (2018). Enhancing the Naive Bayes spam filter through intelligent text modification detection. In 17th IEEE International Conference on Trust, Security and Privacy In Computing And Communications\/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). 849\u2013854, https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00122.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00122"},{"key":"9221_CR10","unstructured":"Gupta, P., Dubey, R. K., Dr. Mishra, S. (2019). Detecting Spam emails\/sms using naive bayes and support vector machine. International Journal of Scientific & Technology Research, 8(11)"},{"key":"9221_CR11","doi-asserted-by":"publisher","first-page":"1508","DOI":"10.11591\/ijeecs.v14.i3.pp1508-1517","volume":"14","author":"N Samsudin","year":"2019","unstructured":"Samsudin, N., Foozy, M., Feresa, C., Alias, N., Shamala, P., Othman, N., Din, W., & Sofiah, W. I. (2019). Youtube spam detection framework using na\u00efve bayes and logistic regression. Indonesian Journal of Electrical Engineering and Computer Science., 14, 1508\u20131517.","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science."},{"key":"9221_CR12","doi-asserted-by":"publisher","unstructured":"Santoshi, K.U., Bhavya,S.S., Sri, Y.B., & Venkateswarlu, B. (2021). Twitter spam detection using na\u00efve bayes classifier. In 6th International Conference on Inventive Computation Technologies (ICICT), 773\u2013777. https:\/\/doi.org\/10.1109\/ICICT50816.2021.9358579.","DOI":"10.1109\/ICICT50816.2021.9358579"},{"key":"9221_CR13","doi-asserted-by":"publisher","unstructured":"Ahmad, S. B. S., Rafie, M., & Ghorabie, S. M. (2021). Spam detection on Twitter using a support vector machine and users\u2019 features by identifying their interactions. Multimedia Tools and Applications, 80, 11583\u201311605. https:\/\/doi.org\/10.1007\/s11042-020-10405-7.","DOI":"10.1007\/s11042-020-10405-7"},{"key":"9221_CR14","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/ICCMC.2017.8282698","volume":"2017","author":"S Mishra","year":"2017","unstructured":"Mishra, S., & Malathi, D. (2017). Behaviour analysis of SVM based spam filtering using various parameter values and accuracy comparison. International Conference on Computing Methodologies and Communication (ICCMC), 2017, 27\u201331. https:\/\/doi.org\/10.1109\/ICCMC.2017.8282698","journal-title":"International Conference on Computing Methodologies and Communication (ICCMC)"},{"key":"9221_CR15","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/j.procs.2017.08.075","volume":"112","author":"W Mahdi","year":"2017","unstructured":"Mahdi, W., Aziz, Q., Manel, M., & Florence, S. (2017). A topic-based hidden Markov model for real-time spam tweets filtering. Procedia Computer Science, 112, 833\u2013843. https:\/\/doi.org\/10.1016\/j.procs.2017.08.075","journal-title":"Procedia Computer Science"},{"key":"9221_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102317","author":"N El-Mawass","year":"2020","unstructured":"El-Mawass, N., Honeine, P., & Vercouter, L. (2020). SimilCatch: Enhanced social spammers detection on Twitter using Markov Random Fields. Information Processing & Management. https:\/\/doi.org\/10.1016\/j.ipm.2020.102317","journal-title":"Information Processing & Management"},{"key":"9221_CR17","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1007\/s10618-020-00693-w","volume":"34","author":"Z Wang","year":"2020","unstructured":"Wang, Z., Hu, R., Chen, Q., Gao, P., & Xu, X. (2020). ColluEagle: Collusive review spammer detection using Markov random fields. Data Mining and Knowledge Discovery., 34, 1621\u20131641. https:\/\/doi.org\/10.1007\/s10618-020-00693-w","journal-title":"Data Mining and Knowledge Discovery."},{"key":"9221_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106229","author":"BK Dedeturk","year":"2020","unstructured":"Dedeturk, B. K., & Akay, B. (2020). Spam filtering using a logistic regression model trained by an artificial bee colony algorithm. Applied Soft Computing. https:\/\/doi.org\/10.1016\/j.asoc.2020.106229","journal-title":"Applied Soft Computing"},{"key":"9221_CR19","doi-asserted-by":"publisher","unstructured":"Wijaya, A., & Bisri, A. (2016). Hybrid decision tree and logistic regression classifier for email spam detection. In 8th International Conference on Information Technology and Electrical Engineering (ICITEE), 1\u20134. https:\/\/doi.org\/10.1109\/ICITEED.2016.7863267","DOI":"10.1109\/ICITEED.2016.7863267"},{"issue":"4","key":"9221_CR20","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1109\/TCSS.2018.2878852","volume":"5","author":"S Madisetty","year":"2018","unstructured":"Madisetty, S., & Desarkar, M. S. (2018). A neural network-based ensemble approach for spam detection in twitter. IEEE Transactions on Computational Social Systems, 5(4), 973\u2013984. https:\/\/doi.org\/10.1109\/TCSS.2018.2878852","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"3","key":"9221_CR21","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1080\/19393555.2020.1722867","volume":"29","author":"T Sharmin","year":"2020","unstructured":"Sharmin, T., Di Troia, F., Potika, K., & Stamp, M. (2020). Convolutional neural networks for image spam detection. Information Security Journal: A Global Perspective, 29(3), 103\u2013117. https:\/\/doi.org\/10.1080\/19393555.2020.1722867","journal-title":"Information Security Journal: A Global Perspective"},{"key":"9221_CR22","doi-asserted-by":"publisher","unstructured":"AlMahmoud, A., Damiani, E., Otrok, H., & Al-Hammadi, Y. (2019). Spamdoop: A privacy-preserving big data platform for collaborative spam detection. IEEE Transactions on Big Data, 5(3), 293\u2013304. https:\/\/doi.org\/10.1109\/TBDATA.2017.2716409.","DOI":"10.1109\/TBDATA.2017.2716409"},{"issue":"2","key":"9221_CR23","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/TETC.2017.2771251","volume":"8","author":"MA Azad","year":"2020","unstructured":"Azad, M. A., Bag, S., Tabassum, S., & Hao, F. (2020). Privy: Privacy preserving collaboration across multiple service providers to combat telecom spams. IEEE Transactions on Emerging Topics in Computing, 8(2), 313\u2013327.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"9221_CR24","doi-asserted-by":"crossref","unstructured":"Balika, J., & Chelliah., Anand, Sasidharan., Dharmesh, Kumar, Singh., & Nilesh, Dangi. (2021). Collaborative and early detection of email spam using multitask learning. International Journal of Performability Engineering, 17(6), 528\u2013535.","DOI":"10.23940\/ijpe.21.06.p5.528535"},{"key":"9221_CR25","doi-asserted-by":"publisher","unstructured":"Chen, M., Sung, P., & Tseng, C. (2011). Cosdes: A collaborative spam detection system with a novel E-Mail abstraction scheme. IEEE Transactions on Knowledge & Data Engineering, 23(5), 669\u2013682. https:\/\/doi.org\/10.1109\/TKDE.2010.147","DOI":"10.1109\/TKDE.2010.147"},{"issue":"12","key":"9221_CR26","doi-asserted-by":"publisher","first-page":"9549","DOI":"10.1109\/JIOT.2020.3003802","volume":"8","author":"Z Guo","year":"2020","unstructured":"Guo, Z., Shen, Yu., Bashir, A., Imran, M., Kumar, N., Zhang, Di., & Yu, K. (2020). Robust spammer detection using collaborative neural network in internet of thing applications. IEEE Internet of Things Journal, 8(12), 9549\u20139558. https:\/\/doi.org\/10.1109\/JIOT.2020.3003802","journal-title":"IEEE Internet of Things Journal"},{"key":"9221_CR27","doi-asserted-by":"publisher","unstructured":"Shi, W., & Xie, M. (2013). A reputation-based collaborative approach for spam filtering. AASRI Procedia, 5, 220\u2013227. https:\/\/doi.org\/10.1016\/j.aasri.2013.10.082","DOI":"10.1016\/j.aasri.2013.10.082"},{"key":"9221_CR28","doi-asserted-by":"publisher","unstructured":"Sousa, P., Machado, A., Rocha, M., Cortez, P., & Rio, M. (2010). A collaborative approach for spam detection. 2nd international conference on evolving internet, 92\u201397, https:\/\/doi.org\/10.1109\/INTERNET.2010.25","DOI":"10.1109\/INTERNET.2010.25"},{"key":"9221_CR29","doi-asserted-by":"publisher","unstructured":"Hau, X., Pham, L., Nam-Hee, J. J., & Sadeghi-Niaraki, A. (2011). Collaborative spam filtering based on incremental ontology learning. Telecommunication Systems - TELSYS. https:\/\/doi.org\/10.1007\/s11235-011-9513-5","DOI":"10.1007\/s11235-011-9513-5"},{"key":"9221_CR30","doi-asserted-by":"publisher","unstructured":"Damiani, E., Vimercati, S., Paraboschi, S., & Samarati, P. (2004). P2P-based collaborative spam detection and filtering. In 4th International Conference on Peer-to-Peer Computing, 176\u2013183. https:\/\/doi.org\/10.1109\/PTP.2004.1334945","DOI":"10.1109\/PTP.2004.1334945"},{"key":"9221_CR31","doi-asserted-by":"publisher","unstructured":"Koggalahewa, D. N., Xu, Y., & Ernest, F. (2020). Spam detection in social networks based on peer acceptance. In Proceedings of the Australasian Computer Science Week Multiconference (ACSW '20). Association for Computing Machinery, 1\u20137. https:\/\/doi.org\/10.1145\/3373017.3373025","DOI":"10.1145\/3373017.3373025"},{"key":"9221_CR32","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321581","author":"M Pera","year":"2007","unstructured":"Pera, M., & Ng, Y.-K. (2007). Using word similarity to eradicate junk emails. International Conference on Information and Knowledge Management. https:\/\/doi.org\/10.1145\/1321440.1321581","journal-title":"International Conference on Information and Knowledge Management"},{"key":"9221_CR33","doi-asserted-by":"publisher","unstructured":"Moniza, P., & Asha, P. (2012). An assortment of spam detection system. In International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 860\u2013867, https:\/\/doi.org\/10.1109\/ICCEET.2012.6203823","DOI":"10.1109\/ICCEET.2012.6203823"},{"key":"9221_CR34","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/612970","author":"P-T Ho","year":"2014","unstructured":"Ho, P.-T., & Kim, S.-R. (2014). Fingerprint-based near-duplicate document detection with applications to SNS spam detection. International Journal of Distributed Sensor Networks. https:\/\/doi.org\/10.1155\/2014\/612970","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"9221_CR35","doi-asserted-by":"publisher","unstructured":"Jaiswal, S., Patel, S., Singh, & Ravi. (2016). Privacy preserving spam email filtering based on somewhat homomorphic using functional encryption. https:\/\/doi.org\/10.1007\/978-81-322-2695-6_49.","DOI":"10.1007\/978-81-322-2695-6_49"},{"key":"9221_CR36","unstructured":"Gopi, S., & Ketan, K. (2019). Incremental personalized E-mail spam filter using novel TFDCR feature selection with dynamic feature update, Expert Systems with Applications."},{"key":"9221_CR37","doi-asserted-by":"publisher","unstructured":"Henke, M., Santos, E., Souto, E., & Santin, A. O. (2021). Spam detection based on feature evolution to deal with concept drift. JUCS - Journal of Universal Computer Science, 27(4), 364\u2013386. https:\/\/doi.org\/10.3897\/jucs.66284.","DOI":"10.3897\/jucs.66284"},{"key":"9221_CR38","doi-asserted-by":"publisher","unstructured":"Luo, GuangJun, Shah, N., Khan, H. U., & Haq, A. U. (2020). Spam detection approach for secure mobile message communication using machine learning algorithms. Security and Communication Networks. https:\/\/doi.org\/10.1155\/2020\/8873639.","DOI":"10.1155\/2020\/8873639"},{"key":"9221_CR39","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2016.47","author":"J Ma","year":"2016","unstructured":"Ma, J., Zhang, Y., Liu, J., Yu, K., & Wang, X. (2016). Intelligent SMS spam filtering using topic model. International Conference on Intelligent Networking and Collaborative Systems (INCoS). https:\/\/doi.org\/10.1109\/INCoS.2016.47","journal-title":"International Conference on Intelligent Networking and Collaborative Systems (INCoS)"},{"key":"9221_CR40","doi-asserted-by":"publisher","unstructured":"El Kouari, O., Benaboud, H., & Lazaar, S. (2020). Using machine learning to deal with Phishing and spam detection: An overview. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security (NISS2020). Association for Computing Machinery, 1\u20137. https:\/\/doi.org\/10.1145\/3386723.3387891","DOI":"10.1145\/3386723.3387891"},{"key":"9221_CR41","doi-asserted-by":"publisher","unstructured":"Yeganeh & Mehdi (2012). A Model for fuzzy logic based machine learning approach for spam filtering. IOSR Journal of Computer Engineering. https:\/\/doi.org\/10.9790\/0661-0450710.","DOI":"10.9790\/0661-0450710"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09221-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09221-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09221-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T14:31:13Z","timestamp":1646749873000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09221-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["9221"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09221-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2021,11,2]]},"assertion":[{"value":"15 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article. The authors did not receive support from any organization for the submitted work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"(software application or custom code).The algorithm of the proposed work is included in this article itself.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}