{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:03:57Z","timestamp":1747224237034,"version":"3.40.5"},"reference-count":0,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4,1]]},"abstract":"<p>The internet era promotes electronic commerce and facilitates access to many services. In today's digital society the explosion in communication has revolutionized the field of electronic communication. Unfortunately, this technology has become incontestably the original source of malicious activities, especially the plague called undesirables email (SPAM) that has grown tremendously in the last few years. This paper deals on the unveiling of fresh bio-inspired techniques (artificial social cockroaches (ASC), artificial haemostasis system (AHS) and artificial heart lungs system (AHLS)) and their application for SPAM detection. For the authors' experimentation, they have used the benchmark SMS Spam corpus V.0.1 and the validation measures (recall, precision, f-measure, entropy, accuracy and error). They have optimising the sensitive parameters of each algorithm (text representation technique, distance measure, weightings, and threshold). The results are positive compared to the result of artificial social bees and machine learning algorithms (decision tree C4.5 and K-means).<\/p>","DOI":"10.4018\/jitr.2016040103","type":"journal-article","created":{"date-parts":[[2016,7,19]],"date-time":"2016-07-19T11:46:01Z","timestamp":1468928761000},"page":"47-77","source":"Crossref","is-referenced-by-count":1,"title":["New Bio Inspired Techniques in the Filtering of Spam"],"prefix":"10.4018","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4973-4385","authenticated-orcid":true,"given":"Hadj Ahmed","family":"Bouarara","sequence":"first","affiliation":[{"name":"GeCode Laboratory, Department of Computer Science, Dr. Moulay Tahar University of Sa\u00efda, Sa\u00efda, Algeria"}]},{"given":"Reda Mohamed","family":"Hamou","sequence":"additional","affiliation":[{"name":"GeCode Laboratory, Department of Computer Science, Dr. Moulay Tahar University of Sa\u00efda, Sa\u00efda, Algeria"}]},{"given":"Abdelmalek","family":"Amine","sequence":"additional","affiliation":[{"name":"GeCode Laboratory, Department of Computer Science, Dr. Moulay Tahar University of Sa\u00efda, Sa\u00efda, Algeria"}]}],"member":"2432","container-title":["Journal of Information Technology Research"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=160156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T03:58:53Z","timestamp":1654142333000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JITR.2016040103"}},"subtitle":["Synthesis and Comparative Study"],"short-title":[],"issued":{"date-parts":[[2016,4,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jitr.2016040103","relation":{},"ISSN":["1938-7857","1938-7865"],"issn-type":[{"type":"print","value":"1938-7857"},{"type":"electronic","value":"1938-7865"}],"subject":[],"published":{"date-parts":[[2016,4,1]]}}}