{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:11:25Z","timestamp":1775283085830,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,10,10]]},"DOI":"10.1145\/1166160.1166191","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"107-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":138,"title":["Content based SMS spam filtering"],"prefix":"10.1145","author":[{"given":"Jos\u00e9 Mar\u00eda","family":"G\u00f3mez Hidalgo","sequence":"first","affiliation":[{"name":"Universidad Europea de Madrid"}]},{"given":"Guillermo Cajigas","family":"Bringas","sequence":"additional","affiliation":[{"name":"Group R&amp;D - Vodafone ES"}]},{"given":"Enrique Puertas","family":"S\u00e1nz","sequence":"additional","affiliation":[{"name":"Universidad Europea de Madrid"}]},{"given":"Francisco Carrero","family":"Garc\u00eda","sequence":"additional","affiliation":[{"name":"Universidad Europea de Madrid"}]}],"member":"320","published-online":{"date-parts":[[2006,10,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"9","volume-title":"Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning (ECML 2000","author":"Androutsopoulos I.","year":"2000","unstructured":"Androutsopoulos , I. , Koutsias , J. , Chandrinos , K.V. , Paliouras , G. , Spyropoulos , C.D. An Evaluation of Naive Bayesian Anti-spam Filtering . Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning (ECML 2000 ), pp. 9 -- 17 , 2000 . Androutsopoulos, I., Koutsias, J., Chandrinos, K.V., Paliouras, G., Spyropoulos, C.D. An Evaluation of Naive Bayesian Anti-spam Filtering. Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning (ECML 2000), pp. 9--17, 2000."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the First Conference on Email and Anti-spam (CEAS)","author":"Christine E.","year":"2004","unstructured":"Christine E. Drakeand Jonathan J . Oliver, Eugene J. Koontz. Anatomy of a Phishing Email . Proceedings of the First Conference on Email and Anti-spam (CEAS) , 2004 . Christine E. Drakeand Jonathan J. Oliver, Eugene J. Koontz. Anatomy of a Phishing Email. Proceedings of the First Conference on Email and Anti-spam (CEAS), 2004."},{"key":"e_1_3_2_1_3_1","volume-title":"Paul. Better Bayesian Filtering. Proceedings of the 2003 Spam Conference","author":"Graham","year":"2003","unstructured":"Graham , Paul. Better Bayesian Filtering. Proceedings of the 2003 Spam Conference , January 2003 . Graham, Paul. Better Bayesian Filtering. Proceedings of the 2003 Spam Conference, January 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3115\/1117601.1117623"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312220"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.788645"},{"key":"e_1_3_2_1_7_1","volume-title":"Machine Learning: Proceedings of the Fifteenth International Conference.","author":"Frank E., I.H.","year":"1998","unstructured":"Frank , E., I.H. Witten . 1998 . Generating accurate rule sets without global optimization . Machine Learning: Proceedings of the Fifteenth International Conference. Frank, E., I.H. Witten. 1998. Generating accurate rule sets without global optimization. Machine Learning: Proceedings of the Fifteenth International Conference."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508911"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/383952.383974"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/645326.649711"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007601015854"},{"key":"e_1_3_2_1_12_1","unstructured":"Quinlan J.R. 1993. C4.5: Programs for Machine Learning. Morgan Kaufmann.   Quinlan J.R. 1993. C4.5: Programs for Machine Learning. Morgan Kaufmann."},{"key":"e_1_3_2_1_13_1","volume-title":"Automatic text processing: the transformation, analysis and retrieval of information by computer","author":"Salton G.","unstructured":"Salton , G. 1989. Automatic text processing: the transformation, analysis and retrieval of information by computer . Addison-Wesley . Salton, G. 1989. Automatic text processing: the transformation, analysis and retrieval of information by computer. Addison-Wesley."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505283"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/645802.669183"},{"key":"e_1_3_2_1_16_1","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann.","author":"Witten I.H., E.","year":"1999","unstructured":"Witten , I.H., E. Frank . 1999 . Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann. Witten, I.H., E. Frank. 1999. Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann."},{"key":"e_1_3_2_1_17_1","volume-title":"Filtering Mobile spam by Support Vector Machine. Proceedings of CSITeA-04","author":"Xiang Y.","year":"2004","unstructured":"Xiang , Y. , Chowdhury , M. , Ali , S. Filtering Mobile spam by Support Vector Machine. Proceedings of CSITeA-04 , ISCA Press , December 27--29, 2004 . Xiang,Y., Chowdhury, M., Ali, S. Filtering Mobile spam by Support Vector Machine. Proceedings of CSITeA-04, ISCA Press, December 27--29, 2004."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009982220290"},{"key":"e_1_3_2_1_19_1","volume-title":"En Proceedings of the 14th International Conference on Machine Learning.","author":"Yang Y., J.O.","year":"1997","unstructured":"Yang , Y., J.O. Pedersen . 1997 . A comparative study on feature selection in text categorization . En Proceedings of the 14th International Conference on Machine Learning. Yang, Y., J.O. Pedersen. 1997. A comparative study on feature selection in text categorization. En Proceedings of the 14th International Conference on Machine Learning."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2005 Text Retrieval Conference","author":"Bratko A, B","year":"2005","unstructured":"Bratko , A, B . Filipic . Spam Filtering using Character-level Markov Models: Experiments for the TREC 2005 Spam Track . Proceedings of the 2005 Text Retrieval Conference , 2005 . Bratko, A, B. Filipic. Spam Filtering using Character-level Markov Models: Experiments for the TREC 2005 Spam Track. Proceedings of the 2005 Text Retrieval Conference, 2005."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_25"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/272287.272329"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the First Conference on Email and Anti-Spam (CEAS)","author":"Golbeck J.","year":"2004","unstructured":"Golbeck , J. , Hendler , J. Reputation network analysis for email filtering . In Proceedings of the First Conference on Email and Anti-Spam (CEAS) , 2004 . Golbeck, J., Hendler, J. Reputation network analysis for email filtering. In Proceedings of the First Conference on Email and Anti-Spam (CEAS), 2004."},{"key":"e_1_3_2_1_25_1","volume-title":"September","author":"Tompkins T.","year":"2003","unstructured":"Tompkins T. , Handley D. Giving e-mail back to the users: Using digital signatures to solve the spam problem. First Monday, 8(9) , September 2003 . Tompkins T., Handley D. Giving e-mail back to the users: Using digital signatures to solve the spam problem. First Monday, 8(9), September 2003."}],"event":{"name":"DocEng06: ACM Symposium on Document Engineering","location":"Amsterdam The Netherlands","acronym":"DocEng06","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2006 ACM symposium on Document engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1166160.1166191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T05:53:50Z","timestamp":1673070830000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1166160.1166191"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,10]]},"references-count":24,"alternative-id":["10.1145\/1166160.1166191","10.1145\/1166160"],"URL":"https:\/\/doi.org\/10.1145\/1166160.1166191","relation":{},"subject":[],"published":{"date-parts":[[2006,10,10]]},"assertion":[{"value":"2006-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}