{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:02:18Z","timestamp":1730206938271,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/cicybs.2014.7013372","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T19:37:37Z","timestamp":1421869057000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm"],"prefix":"10.1109","author":[{"given":"El-Sayed M.","family":"El-Alfy","sequence":"first","affiliation":[]},{"given":"Ali A.","family":"Al-Hasan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.195-196.509"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2009.59"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.195-196.509"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199601)47:1<70::AID-ASI7>3.3.CO;2-Q"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.131"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.04.307"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystems.2013.01.001"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.8.8.2087-2094"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2013.6743885"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"3","article-title":"Learning methods for spam filtering","volume":"16","author":"el-alfy","year":"2008","journal-title":"International Journal of Computer Research"},{"key":"20","first-page":"107","article-title":"Dynamic feature space and incremental feature selection for the classification of textual data streams","author":"katakis","year":"2006","journal-title":"Knowledge Discovery from Data Streams"},{"journal-title":"Threats Report Third Quarter 2013","year":"2013","author":"labs","key":"2"},{"key":"1","article-title":"Spam corpus creation for trec","author":"cormack","year":"2005","journal-title":"Collaboration Electronic Messaging Anti-Abuse and Spam Conference"},{"journal-title":"The Danger Theory and Its Application to Artificial Immune Systems","year":"2008","author":"aickelin","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-261-6_5"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2013.11.003"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089129"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9109-6"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-006-9026-4"},{"journal-title":"The Dendritic Cell Algorithm","year":"2007","author":"greensmith","key":"8"}],"event":{"name":"2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","start":{"date-parts":[[2014,12,9]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6999019\/7013356\/07013372.pdf?arnumber=7013372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T01:28:10Z","timestamp":1490318890000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7013372\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2014.7013372","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}