{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:39:01Z","timestamp":1729643941992,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/istel.2018.8660969","type":"proceedings-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T23:58:46Z","timestamp":1552003126000},"page":"330-336","source":"Crossref","is-referenced-by-count":0,"title":["Data Analytics in Text Messages: A Mobile Network Operator Case Study"],"prefix":"10.1109","author":[{"given":"Mohammadreza","family":"Babaee","sequence":"first","affiliation":[]},{"given":"Hamidreza","family":"Sarabadani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICACI.2016.7449809"},{"journal-title":"Big Data Big Analytics Emerging Business Intelligence and Analytic Trends for Today's Businesses","year":"2012","author":"minelli","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/STC-CSIT.2017.8098736"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwt032"},{"journal-title":"A brief survey of text mining Classification clustering and extraction techniques","year":"2017","author":"allahyari","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1247715.1247717"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1166160.1166191"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1145\/1321440.1321486","article-title":"Spam filtering for short messages","author":"cormack","year":"2007","journal-title":"Proceedings of the Sixteenth ACM Conference on Conference on information and Knowledge Management"},{"key":"ref18","first-page":"1","article-title":"Towards sms spam filtering: Results under a new dataset","volume":"2","author":"almeida","year":"2013","journal-title":"International Journal of Information Security Science"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2012.3"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1109\/BigData.2015.7364114","article-title":"Using Word2Vec to process big text data","author":"ma","year":"2015","journal-title":"2015 IEEE International Conference on Big Data"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.28"},{"key":"ref27","article-title":"CRISP-DM: Towards a standard process model for data mining","author":"wirth","year":"2000","journal-title":"Proceedings of the 4th International Conference on the Practical Applications of Knowledge Discovery and Data Mining"},{"journal-title":"SMS Spam and Mobile Message Attackes-Introduction Trends and Examples","year":"2011","author":"enck","key":"ref3"},{"journal-title":"Worldwide A2P SMS Markets 2014-2017","year":"2013","author":"research","key":"ref6"},{"journal-title":"Web Data Mining Exploring Hyperlinks Contents and Usage Data","year":"2007","author":"liu","key":"ref29"},{"journal-title":"Mobile Phone Users Worldwide[online]","year":"2016","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1216016.1216017"},{"journal-title":"How to Stop the Billions Wasted Annually On Email Spam","year":"2013","author":"castro","key":"ref7"},{"journal-title":"Cloudmark SMS Spam Overview","year":"2013","key":"ref2"},{"journal-title":"Cloudmark SMS Financial Fraud Report","year":"2011","key":"ref9"},{"key":"ref1","article-title":"Dendritic Cell Algorithm for Mobile Phone Spam Filtering","author":"al-hasan","year":"2015","journal-title":"6th International Conference on Ambient Systems Networks and Technologies (ANT)"},{"key":"ref20","first-page":"1","article-title":"SMS Spam Detection using Machine Learning Approach","volume":"2","author":"mehar","year":"2013","journal-title":"International Journal of Information Security Science"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2018.8442564"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2016.7581640"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.21248\/jlcl.20.2005.68","article-title":"A brief survey of text mining","author":"hotho","year":"2005"},{"journal-title":"CRISP-DM 1 0 Step-By-Step Data Mining Guide","year":"2000","author":"chapman","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508911"}],"event":{"name":"2018 9th International Symposium on Telecommunications (IST)","start":{"date-parts":[[2018,12,17]]},"location":"Tehran, Iran","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 9th International Symposium on Telecommunications (IST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8653247\/8660802\/08660969.pdf?arnumber=8660969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T06:44:35Z","timestamp":1694673875000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8660969\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/istel.2018.8660969","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}