{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:55:51Z","timestamp":1761947751844},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642243547"},{"type":"electronic","value":"9783642243554"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24355-4_13","type":"book-chapter","created":{"date-parts":[[2011,9,28]],"date-time":"2011-09-28T10:39:39Z","timestamp":1317206379000},"page":"120-129","source":"Crossref","is-referenced-by-count":3,"title":["Survey on Anti-spam Single and Multi-objective Optimization"],"prefix":"10.1007","author":[{"given":"Iryna","family":"Yevseyeva","sequence":"first","affiliation":[]},{"given":"Vitor","family":"Basto-Fernandes","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 R.","family":"M\u00e9ndez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"MessageLabs Ltd., MessageLabs Intelligence, \n                    \n                      http:\/\/www.messagelabs.co.uk\/intelligence.aspx"},{"key":"13_CR2","volume-title":"Anti-Measures: Analysis and Design","author":"G. Schryen","year":"2007","unstructured":"Schryen, G.: Anti-Measures: Analysis and Design. Springer, Heidelberg (2007)"},{"key":"13_CR3","unstructured":"Dnswl.org, \n                    \n                      http:\/\/www.dnswl.org\/"},{"key":"13_CR4","unstructured":"SpamHaus Project Organization, The SpamHaus Project, \n                    \n                      http:\/\/www.spamhaus.org\/"},{"key":"13_CR5","unstructured":"Geeknet Inc.: Pyzor, \n                    \n                      http:\/\/pyzor.sf.net\/"},{"key":"13_CR6","unstructured":"Prakash, V.V.: Vipul\u2019s Razor, \n                    \n                      http:\/\/razor.sf.net\/"},{"key":"13_CR7","unstructured":"Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail - version 1, \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc4408.txt"},{"key":"13_CR8","unstructured":"DomainKeys Identified Mail (DKIM) Signatures, \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc4871.txt"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"2616","DOI":"10.1016\/j.comnet.2006.11.015","volume":"51","author":"Z. Duan","year":"2007","unstructured":"Duan, Z., Dong, Y., Gopalan, K.: DMTP: Controlling spam through message delivery differentiation. Computer Networks\u00a051, 2616\u20132630 (2007)","journal-title":"Computer Networks"},{"key":"13_CR10","unstructured":"Apache SpamAssassin Project, \n                    \n                      http:\/\/spamassassin.apache.org\/"},{"key":"13_CR11","unstructured":"Grindstone for SPAM, \n                    \n                      http:\/\/sing.ei.uvigo.es\/grindstone4spam"},{"key":"13_CR12","unstructured":"LingSpam dataset, \n                    \n                      http:\/\/www.aueb.gr\/users\/ion\/data\/lingspam\/public.tar.gz"},{"key":"13_CR13","unstructured":"Spambase dataset, \n                    \n                      http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"key":"13_CR14","unstructured":"SpamAssasin dataset, \n                    \n                      http:\/\/spamassassin.apache.org\/publiccorpus\/"},{"key":"13_CR15","unstructured":"PU1 dataset, \n                    \n                      http:\/\/www.iit.demokritos.gr\/skel\/i-config\/downloads\/pu1_encoded.tar.gz"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Androutsopoulos, I., Koutsias, J., Chandrinos, K., Spyropoulos, C.: An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 160\u2013167 (2000)","DOI":"10.1145\/345508.345569"},{"key":"13_CR17","unstructured":"TREC 2005 Spam Track Public Corpus, plg.uwaterloo.ca\/gvcormac\/treccorpus (2005)"},{"key":"13_CR18","unstructured":"Findlay, D., Birk, S.: Logistic Regression and Spam Filtering. Master Thesis (2007)"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Dudley, J., Barone, L., While, L.: Multi-objective spam filtering using an evolutionary algorithm Evolutionary Computation. In: IEEE World Congress on Computational Intelligence (CEC 2008), pp. 123 -130 (2008)","DOI":"10.1109\/CEC.2008.4630786"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K. Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agrawal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation\u00a06, 182\u2013197 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"13_CR21","unstructured":"Fonseca, C., Fleming, P.: Genetic algorithms for multi-objective optimisation: formulation, discussion, and generalisation. In: Fifth International Conference on Genetic Algorithms, pp. 416\u2013423 (1993)"},{"key":"13_CR22","volume-title":"Genetic Algorithms in Search, Optimization, and Machine Learning","author":"D. Goldberg","year":"1989","unstructured":"Goldberg, D.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley Professional, Reading (1989)"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"L\u00f3pez-Herrera, A., Herrera-Viedma, E., Herrera, F.: A Multiobjective Evolutionary Algorithm for Spam E-mail Filtering. In: 3rd International Conference on Intelligent System and Knowledge Engineering (2008)","DOI":"10.1109\/ISKE.2008.4730957"}],"container-title":["Communications in Computer and Information Science","ENTERprise Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24355-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T00:55:17Z","timestamp":1554684917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24355-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642243547","9783642243554"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24355-4_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}