{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T09:58:41Z","timestamp":1760608721519,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/iwcmc.2012.6314350","type":"proceedings-article","created":{"date-parts":[[2012,10,9]],"date-time":"2012-10-09T18:07:23Z","timestamp":1349806043000},"page":"1046-1051","source":"Crossref","is-referenced-by-count":10,"title":["Graph-based learning model for detection of SMS spam on smart phones"],"prefix":"10.1109","author":[{"given":"Muhammad Zubair","family":"Rafique","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Abulaish","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"257","article-title":"An assessment of casebased m n i n g for short text message classiiieation","author":"healy","year":"2005","journal-title":"Pmceedings of 16th 1&h Conference on Adjeinl Intelligence Ond Cognitive Science ser AICS '05"},{"key":"16","article-title":"'Be Liberal in What You Reeieve' on your mobile phone","author":"rafrque","year":"2010","journal-title":"Procedings of 20th Wms Bulletin Conference"},{"volume":"31","journal-title":"ROC graphs Notes and practical considerations for researchers ' Machine Learning","year":"2004","key":"13"},{"journal-title":"GSMA to Address Spam and Fraudulent Messaging Threats Far Consumers","year":"2010","key":"14"},{"key":"11","first-page":"871","article-title":"Feature engineering for mobile (SMS) spam fltedng","author":"cormack","year":"2007","journal-title":"Pmceedings of the 30th Onnuol Conference on Research and Development in Infomotion Retrieval"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1166160.1166191"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.3115\/1667583.1667682","article-title":"The contribution of stylistic information to content-based mobile spam ?ltering","author":"sohn","year":"2009","journal-title":"Proceedings of the ACL-IJCNLP Conference Short Papers"},{"journal-title":"White Paper UK Spam Study","year":"2009","key":"2"},{"key":"10","first-page":"313","article-title":"S-pam filtering for short messages","author":"cormack","year":"2007","journal-title":"Pmceedings of the 16th ACM Conference on Infomation and Howledge Management"},{"journal-title":"Case-Study IronPort Helps A Nationwide Carrier Stop Wireless Threat","year":"0","key":"1"},{"key":"7","first-page":"11","article-title":"A - O r fork detecting malformed sms attack:' secure and trust computing","author":"raiique","year":"2011","journal-title":"Data Management and Application"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1655003"},{"journal-title":"03 40 Technical realization of the SMS","year":"1998","key":"5"},{"key":"4","first-page":"1787","article-title":"Application of evolutionary algorithms in detecting sms spam at access layer?","author":"raque","year":"2011","journal-title":"Pmceedings of the 16th Annunl Conference on Generic and Evolutionn-c Omputation ACM"},{"key":"9","doi-asserted-by":"crossref","first-page":"17","DOI":"10.3115\/1654758.1654762","article-title":"Graph-based tent representation for novelty detection","author":"gamon","year":"2006","journal-title":"Pmceedings of the First Workshop on Graph Based Methods for Natural Language Pmcessing Association for Computational LinguiLics"},{"key":"8","first-page":"16661670","article-title":"Kullback-leibler divergence estimation of continuous dishibutions","author":"prer-cruz","year":"2008","journal-title":"Infomtion Theov 2008 ISIT 2008 IEEE Interntionnl Symposium On Ieee"}],"event":{"name":"2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC 2012)","start":{"date-parts":[[2012,8,27]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2012,8,31]]}},"container-title":["2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6299140\/6314161\/06314350.pdf?arnumber=6314350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:11:48Z","timestamp":1497993108000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6314350\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2012.6314350","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}