{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:11:38Z","timestamp":1730203898412,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/ccnc.2012.6181147","type":"proceedings-article","created":{"date-parts":[[2012,4,13]],"date-time":"2012-04-13T15:39:34Z","timestamp":1334331574000},"page":"693-695","source":"Crossref","is-referenced-by-count":1,"title":["On the study of anomaly-based spam filtering using spam as representation of normality"],"prefix":"10.1109","author":[{"given":"Carlos","family":"Laorden","sequence":"first","affiliation":[]},{"given":"Xabier","family":"Ugarte-Pedrero","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Borja","family":"Sanz","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Nieves","sequence":"additional","affiliation":[]},{"given":"Pablo G.","family":"Bringas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"1137","article-title":"A study of cross-validation and bootstrap for accuracy estimation and model selection","volume":"14","author":"kohavi","year":"1995","journal-title":"International Joint Conference on Artificial Intelligence"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/70.1.163"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1177\/016555159201800106"},{"journal-title":"Modern Information Retrieval","year":"1999","author":"baeza-yates","key":"11"},{"journal-title":"Introduction to Modern Information Retrieval","year":"1983","author":"mcgill","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.9"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099671"},{"key":"1","first-page":"3","article-title":"A statistical approach to the spam problem","volume":"2003","author":"robinson","year":"2003","journal-title":"Linux J"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"journal-title":"Bogofilter A Fast Open Source Bayesian Spam Filters","year":"2005","author":"raymond","key":"7"},{"key":"6","article-title":"Filtering spam with spamassassin","author":"mason","year":"0","journal-title":"HEANet Annual Conference 2002"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1039621.1039625"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2007.173"},{"key":"9","article-title":"Anomaly-based spam filtering","author":"santos","year":"0","journal-title":"Proceedings of the 6th International Conference on Security and Cryptography (SECRYPT) 2011"},{"key":"8","article-title":"Spamprobe-bayesian spam filtering tweaks","author":"burton","year":"0","journal-title":"Proceedings of the Spam Conference 2003"}],"event":{"name":"2012 IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2012,1,14]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2012,1,17]]}},"container-title":["2012 IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6175264\/6180955\/06181147.pdf?arnumber=6181147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:17:28Z","timestamp":1490091448000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6181147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2012.6181147","relation":{},"subject":[],"published":{"date-parts":[[2012,1]]}}}