{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:03:06Z","timestamp":1729648986687,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/ccece.2011.6030477","type":"proceedings-article","created":{"date-parts":[[2011,10,5]],"date-time":"2011-10-05T14:20:50Z","timestamp":1317824450000},"page":"000379-000384","source":"Crossref","is-referenced-by-count":7,"title":["Spam detection system: A new approach based on interval type-2 fuzzy sets"],"prefix":"10.1109","author":[{"given":"Reza","family":"Ariaeinejad","sequence":"first","affiliation":[]},{"given":"Alireza","family":"Sadeghian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198509943.001.0001","author":"dodge","year":"2003","journal-title":"The Oxford dictionary of statistical terms"},{"key":"17","article-title":"Overview of record linkage and current research directions","author":"winkler","year":"2006","journal-title":"Research Report Series RRS"},{"key":"18","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1080\/01621459.1989.10478785","article-title":"Advances in record linkage methodology as applied to the 1985 census of tampa florida","volume":"84","author":"jaro","year":"1985","journal-title":"Journal of the American Statistical Society"},{"journal-title":"State of Spam and Phishing Monthly Report","year":"2010","key":"15"},{"key":"16","article-title":"RFC2822: Internet message format","author":"resnick","year":"2001","journal-title":"Technical Report QUALCOMM Incorporated"},{"key":"13","article-title":"Better Bayesian filtering","author":"graham","year":"2003","journal-title":"Proc Spam Conf"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2003.10.001"},{"journal-title":"Uncertain Rule-Based Fuzzy Logic Systems Introduction and New Directions","year":"2001","author":"mendel","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(75)90036-5"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(76)80011-3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SOFA.2007.4318328"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2004.1375535"},{"journal-title":"Measuring Dialect Pronunciation Differences Using Levenshtein Distance","year":"2004","author":"heeringa","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(81)90087-5"},{"key":"25","article-title":"A trainable fuzzy spam detection system","author":"fuad","year":"2004","journal-title":"Proc 5th Int Conf Computer and Information Technology"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/0098-3004(84)90020-7"},{"key":"27","article-title":"Extended fuzzy clustering algorithms","author":"kaymak","year":"2000","journal-title":"ERIM Report Series Reference No ERS-2001-51-LIS"},{"key":"28","article-title":"Using TF-IDF to determine word relevance in document queries","author":"ramos","year":"0","journal-title":"Department of Computer Science Rutgers University (University Technical Report)"},{"key":"3","article-title":"RFC706: On the Junk mail problem","author":"postel","year":"1975","journal-title":"Technical Report Network Working Group"},{"key":"2","article-title":"Size and cost of the problem","author":"atkins","year":"2003","journal-title":"Proceedings of the Fifty-sixth Internet Engineering Task Force (IETF) Meeting"},{"key":"10","article-title":"TiMBL: Tilburg memory based learner, version 2.0, reference guide","author":"daelemans","year":"1999","journal-title":"Computational Linguistics"},{"key":"1","first-page":"27","volume":"2","author":"chapman","year":"1999","journal-title":"Monty Python's Flying Circus Just the Words"},{"key":"7","first-page":"55","article-title":"A Bayesian approach to filtering Junk E-mail. In learning for text categorization","author":"sahami","year":"1998","journal-title":"AAA1 Workshop"},{"year":"0","key":"6"},{"key":"5","article-title":"Boosting trees for anti-spam email filtering","author":"carreras","year":"2001","journal-title":"Proc RANLP"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345569"},{"key":"9","article-title":"Combining text and heuristics for cost-sensitive spam filtering","author":"hidalgo","year":"2000","journal-title":"Proc CoNLL"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/72.788645"}],"event":{"name":"2011 24th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2011,5,8]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2011,5,11]]}},"container-title":["2011 24th Canadian Conference on Electrical and Computer Engineering(CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6019108\/6030387\/06030477.pdf?arnumber=6030477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T09:11:36Z","timestamp":1712999496000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6030477\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ccece.2011.6030477","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}