{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:27:53Z","timestamp":1725679673511},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/aiccsa.2008.4493585","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T13:37:07Z","timestamp":1209389827000},"page":"544-550","source":"Crossref","is-referenced-by-count":5,"title":["A fuzzy similarity approach for automated spam filtering"],"prefix":"10.1109","author":[{"given":"El-Sayed M.","family":"El-Alfy","sequence":"first","affiliation":[]},{"given":"Fares S.","family":"Al-Qunaieer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2006.302641"},{"key":"17","article-title":"sparse binary polynomial hashing and the crm114 discriminator","author":"yerazunis","year":"2003","journal-title":"Proc of MIT Spam Conf"},{"journal-title":"Why Bayesian filtering is the most effective antispam technology","year":"2007","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345569"},{"key":"16","article-title":"learning to filter spam e-mail: a comparison of a naive bayesian and a memory-based approach","author":"androutsopoulos","year":"2000","journal-title":"Proc of the 4th European Conf on Principles and Practice of Knowledge Discovery in Databases (PKDD)"},{"key":"13","article-title":"a bayesian approach to filtering junk e-mail","author":"sahami","year":"1998","journal-title":"Proc of AAAI'98 Workshop on Learning for Text Categorization"},{"journal-title":"Nai?ve-Bayes vs rule-learning in classification of e-mail","year":"1999","author":"provost","key":"14"},{"key":"11","article-title":"an e-mail classification model based on rough set theory","author":"zhao","year":"2005","journal-title":"Proc of the Int Conf on Active Media Technology"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2003.1241300"},{"key":"21","article-title":"learning rules that classify e-mail","author":"cohen","year":"1996","journal-title":"Proc of AAAI'96 Spring Symposium on Machine Learning in Information Access"},{"key":"20","article-title":"an analysis of bayesian classifiers","author":"langley","year":"1992","journal-title":"Proc Nat Conf Artif Intell"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0026683","article-title":"text categorization with support vector machines: learning with many relevant features","author":"joachims","year":"1998","journal-title":"Proc of the 10th European Conf on Machine Learning (ECML-98)"},{"key":"23","article-title":"a trainable fuzzy spam detection system","author":"fuad","year":"2004","journal-title":"Proc 5th Int Conf Computer and Information Technology"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2000.839070"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.06.002"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"year":"0","key":"28"},{"key":"29","first-page":"4\/1","article-title":"the use of the dap, a massively parallel computing system, for information retrieval and processing","author":"manning","year":"1989","journal-title":"Parallel Techniques for Information Retrieval IEE Colloquium on"},{"journal-title":"How to keep spam off your network","year":"2007","key":"3"},{"journal-title":"MessageLabs Intelligence 2006 Annual Security Report","year":"2006","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28651-6_85"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/280324.280336"},{"journal-title":"Bayesian Spam Filter","year":"2006","author":"shiffman","key":"30"},{"key":"7","article-title":"learning to classify e-mail: a survey","author":"wang","year":"2005","journal-title":"Proc of the 4th Int Conf on Machine Learning and Cybernetics"},{"journal-title":"Anti-spam blamed for 5M lost hours","year":"2007","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.140"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2006.1607720"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022948414856"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/72.788645"}],"event":{"name":"2008 IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2008,3,31]]},"location":"Doha, Qatar","end":{"date-parts":[[2008,4,4]]}},"container-title":["2008 IEEE\/ACS International Conference on Computer Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4488216\/4493499\/04493585.pdf?arnumber=4493585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T03:31:00Z","timestamp":1497756660000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4493585\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2008.4493585","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}