{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T15:05:14Z","timestamp":1770563114238,"version":"3.49.0"},"reference-count":110,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100007297","name":"International Islamic University Malaysia Research","doi-asserted-by":"publisher","award":["RIGS16-364-0528"],"award-info":[{"award-number":["RIGS16-364-0528"]}],"id":[{"id":"10.13039\/501100007297","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2666785","type":"journal-article","created":{"date-parts":[[2017,2,13]],"date-time":"2017-02-13T21:35:44Z","timestamp":1487021744000},"page":"15650-15666","source":"Crossref","is-referenced-by-count":80,"title":["A Review on Mobile SMS Spam Filtering Techniques"],"prefix":"10.1109","volume":"5","author":[{"given":"Shafi'I Muhammad","family":"Abdulhamid","sequence":"first","affiliation":[]},{"given":"Muhammad Shafie","family":"Abd Latiff","sequence":"additional","affiliation":[]},{"given":"Haruna","family":"Chiroma","sequence":"additional","affiliation":[]},{"given":"Oluwafemi","family":"Osho","sequence":"additional","affiliation":[]},{"given":"Gaddafi","family":"Abdul-Salaam","sequence":"additional","affiliation":[]},{"given":"Adamu I.","family":"Abubakar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9262-9137","authenticated-orcid":false,"given":"Tutut","family":"Herawan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1166160.1166191"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3115\/1667583.1667682"},{"key":"ref33","first-page":"66","article-title":"An analysis of various algorithms for text spam classification and clustering using RapidMiner and Weka","volume":"13","author":"zainal","year":"2015","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2001576.2001816"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2011.23"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INISTA.2012.6246947"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2011.6181918"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2034691.2034742"},{"key":"ref35","first-page":"1","article-title":"Greystar: Fast and accurate detection of SMS spam numbers in large cellular networks using grey phone space","author":"jiang","year":"2013","journal-title":"Proc USENIX Security07"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2490257.2490288"},{"key":"ref28","first-page":"1","article-title":"Towards SMS spam filtering: Results under a new dataset","volume":"2","author":"almeida","year":"2013","journal-title":"Int J Inf Secur Sci"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1108\/03321641311296963"},{"key":"ref29","first-page":"67","article-title":"The impact of feature extraction and selection on SMS spam filtering","volume":"19","author":"uysal","year":"2012","journal-title":"Elektronoka Elektrotechnika"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3109\/01421590903200789"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.procs.2015.05.067","article-title":"Dendritic cell algorithm for mobile phone spam filtering","volume":"52","author":"al-hasan","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"ref21","first-page":"1","article-title":"Improving static SMS spam detection by using new content-based features","author":"karami","year":"2014","journal-title":"Proc of AIS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17569-5_56"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.08.054"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11857-4_13"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-012-1239-7"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0158102"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2001576.2001817"},{"key":"ref50","first-page":"589","article-title":"SMS spam filtering technique based on artificial immune system","volume":"9","author":"mahmoud","year":"2012","journal-title":"Int J Comput Sci Issues"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/sec.577"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2602945.2602950"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2013.21"},{"key":"ref57","first-page":"1","article-title":"Analysis of SMS spam in mobility networks","volume":"3","author":"murynets","year":"2013","journal-title":"International Journal of Advanced Computer Science"},{"key":"ref56","first-page":"23","article-title":"Choosing the best classifier for the job: Mobile Filtering for the South African context","volume":"2","author":"griesel","year":"2013","journal-title":"Computational Linguistics in Netherlands"},{"key":"ref55","first-page":"1","article-title":"Feature reduction for optimum sms spam filtering using domain knowledge","author":"eshmawi","year":"2013","journal-title":"Proc Int Conf Secur Manage (SAM)"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516772"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2012.54"},{"key":"ref52","first-page":"750","article-title":"Combating mobile spam through botnet detection using artificial immune systems","volume":"18","author":"vural","year":"2012","journal-title":"J Universal Comput Sci"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12568-8_47"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.28"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2010.2066050"},{"key":"ref6","first-page":"1","article-title":"The spam issue in mobile business: A comparative regulatory overview","author":"camponovo","year":"2004","journal-title":"Proc Int Conf Mobile Bus"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-37619-4_19"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/CC.2015.7084367","article-title":"Analysis on the content features and their correlation of Web pages for spam detection","volume":"12","author":"hua","year":"2015","journal-title":"China Commun"},{"key":"ref49","first-page":"43","article-title":"A prototype scalable system for secured bulk SMS delivery on mobile networks","volume":"3","author":"longe","year":"2012","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.03.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.12.034"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363989"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184491"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.211"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2012.6419492"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.5762\/KAIS.2010.11.7.2595"},{"key":"ref41","article-title":"A challenge response system for filtering automated SMS spam","author":"adrian","year":"2010"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24212-0_14"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICBMEI.2011.5920449"},{"key":"ref73","article-title":"A corpus linguistics study of SMS text messaging","author":"tagg","year":"2009"},{"key":"ref72","first-page":"1","article-title":"SMS spam detection by operating on byte-level distributions using hidden Markov models (HMMS)","author":"rafique","year":"2010","journal-title":"Proc 20th Virus Bull Int Conf"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1145\/2939918.2939937","article-title":"Detecting SMS spam in the age of legitimate bulk messaging","author":"reaves","year":"2016","journal-title":"Proc ACM Conf Sec Privacy Wireless Mobile Netw"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.06.010"},{"key":"ref76","first-page":"1001","article-title":"Unsolicited commercial E-mail and the telephone consumer protection act of 1991","volume":"45","author":"sorkin","year":"1997","journal-title":"Buffalo Law Review"},{"key":"ref77","first-page":"887","article-title":"Spam after can-spam: How inconsistent thinking has made a hash out of unsolicited commercial E-mail policy","volume":"20","author":"sullivan","year":"2003","journal-title":"Santa Clara Computer &amp High Tech Law J"},{"key":"ref74","first-page":"309","article-title":"Finding deceptive opinion spam by any stretch of the imagination","volume":"1","author":"ott","year":"2011","journal-title":"Proc Annu Meeting Assoc Comput Linguist Conf Human Lang Technol"},{"key":"ref75","first-page":"497","article-title":"Negative deceptive opinion spam","author":"ott","year":"2013","journal-title":"Proc HLT-NAACL"},{"key":"ref78","first-page":"1","article-title":"Canada&#x2019;s anti-spam legislation: A constitutional analysis","volume":"31","author":"crowne","year":"2014","journal-title":"The John Marshall Journal of Information Technology & Privacy Law"},{"key":"ref79","first-page":"1","article-title":"Combating spam through legislation: A comparative analysis of US and European approaches","author":"moustakas","year":"2005","journal-title":"Proc CEAS"},{"key":"ref60","first-page":"1248","article-title":"A framework for SMS spam and phishing detection in malay language: A case study","volume":"9","author":"foozy","year":"2014","journal-title":"Int Rev Comput Softw"},{"key":"ref62","first-page":"1","article-title":"Mobile SMS spam filtering based on mixing classifiers","volume":"1","author":"najadat","year":"2014","journal-title":"Int J Adv Comput Res"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-8832-8_48"},{"key":"ref63","first-page":"1","article-title":"Characterizing SMS spam in a large cellular network via mining victim spam reports","author":"skudlark","year":"2014","journal-title":"Proc 20th ITS Biennial Conf"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.02.018"},{"key":"ref65","article-title":"The performance of soft computing techniques on content-based SMS spam filtering","author":"saeed","year":"2015"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.05.001"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2012.3"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2012.6314350"},{"key":"ref2","first-page":"1","article-title":"Analysis of SPAM","author":"lambert","year":"2003"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2934732.2934742"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/13600860701701421"},{"key":"ref109","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1016\/j.procs.2015.08.438","article-title":"A review of the applications of bio-inspired flower pollination algorithm","volume":"62","author":"chiroma","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"ref95","first-page":"854","article-title":"Cat swarm optimization","volume":"4099","author":"chu","year":"2006","journal-title":"PRICAI Trends in Artificial Intelligence"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2009.02.017"},{"key":"ref94","first-page":"32","article-title":"Optimizing method based on autonomous animats: Fish-swarm algorithm","volume":"22","author":"li","year":"2002","journal-title":"Xitong Gongcheng Lilun Yu Shijian\/System Engineering Theory and Practice"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1367-1"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/B978-008045157-2\/50081-X"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.09.070"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-3-642-12538-6_6","article-title":"A new metaheuristic bat-inspired algorithm","author":"yang","year":"2010","journal-title":"Nature Inspired Cooperative Strategies for Optimization (NICSO)"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.12.008"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-007-9149-x"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22185-9_6"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.08.006"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.compstruc.2014.03.007"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i4\/80561"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/SoCPaR.2009.21"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2015\/v8iS3\/60476"},{"key":"ref96","first-page":"116","article-title":"A brief review of nature-inspired algorithms for optimization","volume":"80","author":"fister","year":"2013","journal-title":"Elektrotehniki Vestnik\/Electrotechnical Rev"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11857-4_6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.1.31"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASTECH.2014.7068119"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CYBER-Abuja.2015.7360503"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.053"},{"key":"ref15","article-title":"Methods, systems, and computer program products for short message service (SMS) spam filtering using E-mail spam filtering resources","author":"bantukul","year":"2010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2014.063651"},{"key":"ref82","first-page":"379","article-title":"The privacy and electronic communications directive","volume":"1","author":"riach","year":"2003","journal-title":"The New Law Journal"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242759"},{"key":"ref81","first-page":"1","year":"2007","journal-title":"Unsolicited Electronic Messages Act"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.5"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1080\/13600860410001674779"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.b2700"},{"key":"ref83","first-page":"1","article-title":"Online consumer protection: An analysis of the nature and extent of online consumer protection by South African legislation","author":"mdluli","year":"2014"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2005.01.003"},{"key":"ref89","author":"giveki","year":"2012","journal-title":"Automatic Detection of Diabetes Diagnosis Using Feature Weighted Support Vector Machines Based on Mutual Information and Modified Cuckoo Search"},{"key":"ref85","first-page":"21","article-title":"Commission Nationale de l&#x2019;Informatique et des Libert&#x00E9;s","author":"bernard","year":"1996","journal-title":"Bildiri Ba?imiz ?dari Otoriteler T&#x00FC;rk-Fransiz Ortak Kolokyumu"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-009-0439-8"},{"key":"ref87","first-page":"211","article-title":"Sparse Bayesian learning and the relevance vector machine","volume":"1","author":"tipping","year":"2001","journal-title":"J Mach Learn Res"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2005.855435"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/07851079.pdf?arnumber=7851079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,24]],"date-time":"2022-07-24T02:42:00Z","timestamp":1658630520000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7851079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":110,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2666785","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}