{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T10:07:23Z","timestamp":1775383643545,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T00:00:00Z","timestamp":1380585600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1145\/2513228.2513313","type":"proceedings-article","created":{"date-parts":[[2013,11,15]],"date-time":"2013-11-15T19:22:39Z","timestamp":1384543359000},"page":"35-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Effect of feature selection methods on machine learning classifiers for detecting email spams"],"prefix":"10.1145","author":[{"given":"Shrawan Kumar","family":"Trivedi","sequence":"first","affiliation":[{"name":"Indian Institute of Management Prabandh Shikhar, Rau Indore, India"}]},{"given":"Shubhamoy","family":"Dey","sequence":"additional","affiliation":[{"name":"Indian Institute of Management Prabandh Shikhar, Rau Indore, India"}]}],"member":"320","published-online":{"date-parts":[[2013,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2001%262_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2006.05.016"},{"issue":"21","key":"e_1_3_2_1_3_1","first-page":"18","article-title":"}, Effect of Various Kernels and Feature Selection Methods on SVM Performance for Detecting Email Spams","volume":"66","author":"Trivedi S","year":"2013","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216016.1216017"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings, 2003 Symposium on Applications and the Internet, PP 166--169","author":"Woitaszek M.","year":"2003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.788640"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning","author":"Androutsopoulos I., J.","year":"2000"},{"key":"e_1_3_2_1_8_1","first-page":"125","volume-title":"Third Conference on Email and Anti-Spam (CEAS)","author":"Metsis V.","year":"2006"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/asn034"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"W. A. Awad and S. M. ELseuofi \"Machine Learning Methods for Spam Classification \" International Journal of Computer Science & Information Technology (IJCSIT) PP 173--184 Vol 3 No 1 Feb 2011. 10  W. A. Awad and S. M. ELseuofi \"Machine Learning Methods for Spam Classification \" International Journal of Computer Science & Information Technology (IJCSIT) PP 173--184 Vol 3 No 1 Feb 2011. 10","DOI":"10.5121\/ijcsit.2011.3112"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.7763\/JACN.2013.V1.27"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277813"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of ECML-98","author":"David D.","year":"1998"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.788645"},{"key":"e_1_3_2_1_15_1","first-page":"2596","volume-title":"CEC'03","volume":"4","author":"Liu","year":"2003"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 2009 International Workshop on Information Security and Application (IWISA","author":"Jiang Hua Li","year":"2009"},{"key":"e_1_3_2_1_17_1","unstructured":"Xu Z. Weinberger K. & Chapelle O. (2012). The greedy miser: Learning under test-time budgets. arXiv preprint arXiv:1206.6451. 17  Xu Z. Weinberger K. & Chapelle O. (2012). The greedy miser: Learning under test-time budgets. arXiv preprint arXiv:1206.6451. 17"},{"key":"e_1_3_2_1_18_1","unstructured":"Holland J. H. \"Adaptation in Natural and Artificial Systems \" University of Michigan Press Ann Arbor MI. 1975. 18  Holland J. H. \"Adaptation in Natural and Artificial Systems \" University of Michigan Press Ann Arbor MI. 1975. 18"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 3rd International Fuzzy Systems and Intelligent Control Conference. 19","author":"Haleh F"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/645326.649721"}],"event":{"name":"RACS'13: Research in Adaptive and Convergent Systems","location":"Montreal Quebec Canada","acronym":"RACS'13","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"]},"container-title":["Proceedings of the 2013 Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2513228.2513313","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2513228.2513313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:27Z","timestamp":1750231707000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2513228.2513313"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":20,"alternative-id":["10.1145\/2513228.2513313","10.1145\/2513228"],"URL":"https:\/\/doi.org\/10.1145\/2513228.2513313","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]},"assertion":[{"value":"2013-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}