{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T00:56:31Z","timestamp":1720313791049},"reference-count":36,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2009,3,1]],"date-time":"2009-03-01T00:00:00Z","timestamp":1235865600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1016\/j.eswa.2007.11.037","type":"journal-article","created":{"date-parts":[[2007,12,10]],"date-time":"2007-12-10T21:31:03Z","timestamp":1197322263000},"page":"1601-1614","source":"Crossref","is-referenced-by-count":10,"special_numbering":"P1","title":["Managing irrelevant knowledge in CBR models for unsolicited e-mail classification"],"prefix":"10.1016","volume":"36","author":[{"given":"J.R.","family":"M\u00e9ndez","sequence":"first","affiliation":[]},{"given":"D.","family":"Glez-Pe\u00f1a","sequence":"additional","affiliation":[]},{"given":"F.","family":"Fdez-Riverola","sequence":"additional","affiliation":[]},{"given":"F.","family":"D\u00edaz","sequence":"additional","affiliation":[]},{"given":"J.M.","family":"Corchado","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2007.11.037_bib1","unstructured":"Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Sakkis, G., Spyropoulos, C. D., & Stamatopoulos, P. (2000). Learning to filter spam e-mail: A comparison of a Na\u00efve Bayesian and a memory-based approach. In Workshop on machine learning and textual information access, Fourth European conference on principles and practice of knowledge discovery in databases (pp. 1\u201313), Lyon, France."},{"key":"10.1016\/j.eswa.2007.11.037_bib2","unstructured":"Androutsopoulos, I., Koustias, J., Chandrinos, K. V., Paliouras, G., & Spyropoulos, C. (2000). An evaluation of Na\u00efve Bayesian anti-spam filtering. In Proceedings of the workshop on machine learning in the new information age, 11th European conference on machine learning (pp. 9\u201317), Barcelona, Spain."},{"key":"10.1016\/j.eswa.2007.11.037_bib3","unstructured":"Androutsopoulos, I., Paliouras, G., & Michelakis, E. (2004). Learning to filter unsolicited commercial e-mail. Technical Report TR 2004-2, NCSR \u201cDemokritos\u201d. http:\/\/www.iit.demokritos.gr\/skel\/i-config\/publications\/."},{"key":"10.1016\/j.eswa.2007.11.037_bib4","unstructured":"Carreras, X., & M\u00e0rquez, L. (2001). Boosting trees for anti-spam e-mail filtering. In Proceedings of the fourth international conference on recent advances in natural language processing (pp. 58\u201364), Tzigov Chark, Bulgaria."},{"key":"10.1016\/j.eswa.2007.11.037_bib5","unstructured":"Crocker, D. (1982). Standard for the format of ARPA internet text messages. STD 11, RFC 822. http:\/\/www.faqs.org\/rfcs\/rfc822.html."},{"key":"10.1016\/j.eswa.2007.11.037_bib6","unstructured":"Daelemans, W., Jakub, Z., Sloot, K., & Bosh, A. (1997). TiMBL. Tilburg memory based learning, version 5.1, Reference Guide. ILK, Computational Linguistics, Tilburg University. http:\/\/ilk.uvt.nl\/software.html#timbl."},{"key":"10.1016\/j.eswa.2007.11.037_bib7","unstructured":"Delany, S. J., & Cunningham, P. (2004). An analysis of case-based editing in a spam filtering system. In Proceedings of the seventh European conference on case-based reasoning (pp. 128\u2013141), Madrid."},{"key":"10.1016\/j.eswa.2007.11.037_bib8","unstructured":"Delany, S. J., Cunningham, P. & Coyle, L. (2004). An assessment of case-base reasoning for spam filtering. In Proceeding of 15th Irish conference on artificial intelligence and cognitive science (pp. 9\u201318), GMIT, Castlebar."},{"key":"10.1016\/j.eswa.2007.11.037_bib9","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.knosys.2004.10.002","article-title":"A case-based technique for tracking concept drift in spam filtering","volume":"18","author":"Delany","year":"2004","journal-title":"Knowledge Based Systems"},{"issue":"5","key":"10.1016\/j.eswa.2007.11.037_bib10","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/72.788645","article-title":"Support vector machines for spam categorization","volume":"10","author":"Druker","year":"1999","journal-title":"IEEE Transactions on Neural Networks"},{"key":"10.1016\/j.eswa.2007.11.037_bib11","series-title":"Signal detection theory and ROC analysis","author":"Egan","year":"1975"},{"issue":"3","key":"10.1016\/j.eswa.2007.11.037_bib12","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1016\/j.dss.2006.11.012","article-title":"SpamHunting: An instance-based reasoning system for spam labeling and filtering","volume":"43","author":"Fdez-Riverola","year":"2007","journal-title":"Decision Support Systems"},{"issue":"1","key":"10.1016\/j.eswa.2007.11.037_bib13","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.eswa.2006.04.011","article-title":"Applying lazy learning algorithms to tackle concept drift in spam filtering","volume":"33","author":"Fdez-Riverola","year":"2007","journal-title":"Expert Systems With Applications"},{"key":"10.1016\/j.eswa.2007.11.037_bib14","unstructured":"Graham-Cumming, J. (2004). Understanding spam filter accuracy. JGC spam and anti-spam newsletter. http:\/\/www.jgc.org\/antispam\/11162004-baafcd719ec31936296c1fb3d74d2cbd.pdf."},{"key":"10.1016\/j.eswa.2007.11.037_bib15","unstructured":"Kohavi, R. (1995). A study of cross-validation and bootstrap for accuracy estimation and model selection. In Proceedings of the 14th international joint conference on artificial intelligence (pp. 1137\u20131143). Montreal, Canada."},{"key":"10.1016\/j.eswa.2007.11.037_bib16","first-page":"51","article-title":"Diagnosis and decision support. case-based reasoning technology","volume":"1400","author":"Lenz","year":"1998","journal-title":"Lecture Notes in Artificial Intelligence"},{"key":"10.1016\/j.eswa.2007.11.037_bib17","doi-asserted-by":"crossref","unstructured":"McKenna, E., & Smyth, B. (2000a). Competence-guided case-base editing techniques. In Proceedings of the fifth European workshop on case-based reasoning (pp. 186\u2013197), Trento, Italy.","DOI":"10.1007\/3-540-44527-7_17"},{"key":"10.1016\/j.eswa.2007.11.037_bib18","unstructured":"McKenna, E., & Smyth, B. (2000b). Competence-guided editing methods for lazy learning. In Proceedings of the 14th European conference on artificial intelligence (pp. 60\u201364), Berlin, Germany."},{"key":"10.1016\/j.eswa.2007.11.037_bib19","doi-asserted-by":"crossref","unstructured":"M\u00e9ndez, J. R., Fdez-Riverola, F., D\u00edaz, F., Iglesias, E. L., & Corchado, J. M. (2006). Tracking concept drift at feature selection stage in SpamHunting: An anti-spam instance-based reasoning system. In Proceedings of the eighth European conference on case-based reasoning (pp. 504\u2013518), \u00d6l\u00fcdeniz\/Fethiye, Turkey.","DOI":"10.1007\/11805816_37"},{"key":"10.1016\/j.eswa.2007.11.037_bib20","doi-asserted-by":"crossref","unstructured":"M\u00e9ndez, J. R., Gonz\u00e1lez, C., Glez-Pe\u00f1a, D., Fdez-Riverola, F., D\u00edaz, F., & Corchado, J. M. (2007). Assessing classification accuracy in the revision stage of a CBR spam filtering system. In Proceedings of the seventh international conference on case-based reasoning system (pp. 374\u2013288), Belfast, Northern Ireland.","DOI":"10.1007\/978-3-540-74141-1_26"},{"key":"10.1016\/j.eswa.2007.11.037_bib21","unstructured":"Metsis, V., Androutsopoulos, I., & Paliouras, G. (2006). Spam filtering with naive bayes \u2013 Which naive bayes? In Proceedings of the third conference on email and anti-spam (http:\/\/www.ceas.cc), Mountain View, California."},{"key":"10.1016\/j.eswa.2007.11.037_bib22","unstructured":"Rhiolite software. (2006). Distributed checksum clearinghouse stats. http:\/\/www.rhyolite.com\/anti-spam\/dcc\/."},{"key":"10.1016\/j.eswa.2007.11.037_bib23","unstructured":"Rigoutsos, I., & Huynh, T. (2004). Chung-Kwei: A pattern-discovery-based system for the automatic identification of unsolicited e-mail messages (SPAM). In Proceedings of the first conference on e-mail and anti-spam (http:\/\/www.ceas.cc), Mountain View, California."},{"key":"10.1016\/j.eswa.2007.11.037_bib24","series-title":"Information retrieval","author":"Rijsbergen","year":"1979"},{"key":"10.1016\/j.eswa.2007.11.037_bib25","unstructured":"Sahami, M., Dumais, S., Heckerman, D., & Horvitz, E. (1998). A Bayesian approach to filtering junk e-mail. Learning for text categorization \u2013 Papers from the AAAI Workshop, Technical Report WS-98-05 (pp. 55\u201362), Madison, Wisconsin."},{"key":"10.1016\/j.eswa.2007.11.037_bib26","unstructured":"Seco, N., Veale, T., & Hayes, J. (2004). An intrinsic information content metric for semantic similarity in WordNet. In Proceedings of the 16th European conference on artificial intelligence (pp. 1089\u20131090), Valencia, Spain."},{"issue":"1","key":"10.1016\/j.eswa.2007.11.037_bib27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0306-4573(96)00043-X","article-title":"Performance standards and evaluations in IR test collections: Cluster-based retrieval models","volume":"33","author":"Shaw","year":"1997","journal-title":"Information Processing and Management"},{"key":"10.1016\/j.eswa.2007.11.037_bib28","doi-asserted-by":"crossref","unstructured":"Smith, B., & McKena, E. (1998). Modelling the competence of case-bases. In Proceedings of the 4th European workshop on case-based reasoning (pp. 208\u2013220), Dublin, Ireland.","DOI":"10.1007\/BFb0056334"},{"key":"10.1016\/j.eswa.2007.11.037_bib29","doi-asserted-by":"crossref","unstructured":"Smyth, B. (1998). Case-base maintenance. In Proceedings of the 11th international conference on industrial and engineering applications of AI and expert systems (pp. 507\u2013516), Benicasim, Spain.","DOI":"10.1007\/3-540-64574-8_436"},{"key":"10.1016\/j.eswa.2007.11.037_bib30","unstructured":"Smyth, B., & Keane, M. T. (1995). Remembering to forget: A competence-preserving case deletion policy for case-based reasoning systems. In Proceedings of the 14th international joint conference on artificial intelligence (pp. 377\u2013383), Montreal, Canada."},{"key":"10.1016\/j.eswa.2007.11.037_bib31","doi-asserted-by":"crossref","unstructured":"Smyth, B., & Cunningham, P. (1996). The utility problem analysed: A case-based reasoning perspective. In Proceedings of the third European workshop on case-based reasoning (pp. 392\u2013399), Lausanne, Switzerland.","DOI":"10.1007\/BFb0020625"},{"key":"10.1016\/j.eswa.2007.11.037_bib32","doi-asserted-by":"crossref","unstructured":"Smyth, B., & McKenna, E. (1999). Building compact competent case-bases. In Proceedings of the third international conference on case-based reasoning (pp. 329\u2013342), Seeon Monastery, Germany.","DOI":"10.1007\/3-540-48508-2_24"},{"key":"10.1016\/j.eswa.2007.11.037_bib33","unstructured":"Tsymbal, A. (2004). The problem of concept drift: definitions and related work. Technical Report: TCD-CS-2004-15, Trinity College Dublin, Computer Science Department."},{"key":"10.1016\/j.eswa.2007.11.037_bib34","series-title":"The nature of statistical learning theory","author":"Vapnik","year":"1999"},{"issue":"1","key":"10.1016\/j.eswa.2007.11.037_bib35","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/BF00116900","article-title":"Learning in the presence of concept drift and hidden contexts","volume":"23","author":"Widmer","year":"2001","journal-title":"Machine Learning"},{"issue":"1\u20132","key":"10.1016\/j.eswa.2007.11.037_bib36","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1023\/A:1009982220290","article-title":"An evaluation of statistical approaches to text categorizations","volume":"1","author":"Yang","year":"1999","journal-title":"Information Retrieval"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417407005969?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417407005969?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T11:53:46Z","timestamp":1590148426000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417407005969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,3]]}},"alternative-id":["S0957417407005969"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2007.11.037","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2009,3]]}}}