{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T05:40:03Z","timestamp":1718689203112},"reference-count":40,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2011,11,10]],"date-time":"2011-11-10T00:00:00Z","timestamp":1320883200000},"content-version":"vor","delay-in-days":313,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2011,1]]},"abstract":"A new method for clustering of spam messages collected in bases of antispam system is offered. The genetic algorithm is developed for solving clustering problems. The objective function is a maximization of similarity between messages in clusters, which is defined by k<\/jats:italic>\u2010nearest neighbor algorithm. Application of genetic algorithm for solving constrained problems faces the problem of constant support of chromosomes which reduces convergence process. Therefore, for acceleration of convergence of genetic algorithm, a penalty function that prevents occurrence of infeasible chromosomes at ranging of values of function of fitness is used. After classification, knowledge extraction is applied in order to get information about classes. Multidocument summarization method is used to get the information portrait of each cluster of spam messages. Classifying and parametrizing spam templates, it will be also possible to define the thematic dependence from geographical dependence (e.g., what subjects prevail in spam messages sent from certain countries). Thus, the offered system will be capable to reveal purposeful information attacks if those occur. Analyzing origins of the spam messages from collection, it is possible to define and solve the organized social networks of spammers.<\/jats:p>","DOI":"10.1155\/2011\/416308","type":"journal-article","created":{"date-parts":[[2011,11,10]],"date-time":"2011-11-10T19:01:03Z","timestamp":1320951663000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Classification of Textual E\u2010Mail Spam Using Data Mining Techniques"],"prefix":"10.1155","volume":"2011","author":[{"given":"Rasim M.","family":"Alguliev","sequence":"first","affiliation":[]},{"given":"Ramiz M.","family":"Aliguliyev","sequence":"additional","affiliation":[]},{"given":"Saadat A.","family":"Nazirova","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2011,11,10]]},"reference":[{"key":"e_1_2_10_1_2","unstructured":"Symantec State of spam and phishing. A monthly report 2010 http:\/\/symantec.com\/content\/en\/us\/enterprise\/other_resources\/b\u2010state_of_spam_and_phishing_report_09\u20102010.en\u2010us.pdf."},{"key":"e_1_2_10_2_2","unstructured":"Ferris Research Cost of spam is flattening\u2013our 2009 predictions http:\/\/www.ferris.com\/2009\/01\/28\/cost\u2010of\u2010spam\u2010is\u2010flattening\u2010our\u20102009\u2010predictions\/."},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.06.001"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.01.018"},{"key":"e_1_2_10_5_2","doi-asserted-by":"crossref","unstructured":"SangM. L. DongS. K. andJongS. P. Spam detection using feature selection and parameters optimization Proceedings of the 4th International Conference on Complex Intelligent and Software Intensive Systems (CISIS \u203210) February 2010 Krakow Poland 883\u2013888 2-s2.0-77952698246 https:\/\/doi.org\/10.1109\/CISIS.2010.116.","DOI":"10.1109\/CISIS.2010.116"},{"key":"e_1_2_10_6_2","doi-asserted-by":"crossref","unstructured":"MehrnoushF. S.andHamidB. Spam detection using dynamic weighted voting based on clustering Proceedings of the 2nd International Symposium on Intelligent Information Technology Application (IITA \u203208) December 2008 Shanghai China 122\u2013126 2-s2.0-62949156732 https:\/\/doi.org\/10.1109\/IITA.2008.140.","DOI":"10.1109\/IITA.2008.140"},{"key":"e_1_2_10_7_2","doi-asserted-by":"crossref","unstructured":"MinoruS.andHiroyukiSh. Spam detection using text clustering Proceedings of the International Conference on Cyberworlds (CW \u203205) November 2005 Singapore 316\u2013319 2-s2.0-33745180513 https:\/\/doi.org\/10.1109\/CW.2005.83.","DOI":"10.1109\/CW.2005.83"},{"key":"e_1_2_10_8_2","unstructured":"PauloC. ClotildeL. PedroS.et al. Symbiotic data mining for personalized spam filtering Proceedings of the International Conference on Web Intelligence and Intelligent Agent Technology (IEEE\/WIC\/ACM) 2009 149\u2013156."},{"key":"e_1_2_10_9_2","first-page":"269","article-title":"An overview of content-based spam filtering techniques","volume":"31","author":"Ahmed Kh.","year":"2007","journal-title":"Informatica"},{"key":"e_1_2_10_10_2","unstructured":"NazirovaS. Mechanism of classification of text spam messages collected in spam pattern bases 2 Proceedings of the 3rd International Conference on Problems of Cybernetics and Informatics (PCI \u203210) 2010 206\u2013209."},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/859670.859703"},{"key":"e_1_2_10_12_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/967030.967031","article-title":"Fighting the spam wars: a re-mailer approach with restrictive aliasing","volume":"4","author":"Pawel G.","year":"2004","journal-title":"ACM Transactions on Internet Technology"},{"key":"e_1_2_10_13_2","unstructured":"FuluL. Mo-HanH. andPawelG. The community behavior of spammers http:\/\/web.media.mit.edu\/~fulu\/ClusteringSpammers.pdf."},{"key":"e_1_2_10_14_2","doi-asserted-by":"crossref","unstructured":"XuK. S. KligerM. ChenY. WoolfP. J. andHeroA. O. Revealing social networks of spammers through spectral clustering Proceedings of the IEEE International Conference on Communications (ICC \u203209) June 2009 Dresden Germany 2-s2.0-70449473998 https:\/\/doi.org\/10.1109\/ICC.2009.5199418.","DOI":"10.1109\/ICC.2009.5199418"},{"key":"e_1_2_10_15_2","unstructured":"XuK. S. KligerM. ChenY.et al. Tracking communities of spammers by evolutionary clustering http:\/\/www.eecs.umich.edu\/~xukevin\/xu_spam_icml_2010_sna.pdf."},{"key":"e_1_2_10_16_2","volume-title":"Dynamic Library\u2013Information System","author":"Salton G.","year":"1979"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"e_1_2_10_18_2","unstructured":"MochenovS. V. BlednovA. M. andLugovskikhU. A. Vector representation of the textual information Proceedings of the International Scientific Conference Materials 2006 131\u2013139."},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1615\/JAutomatInfScien.v40.i9.50"},{"key":"e_1_2_10_20_2","first-page":"60","article-title":"A survey of text mining techniques and applications","volume":"1","author":"Vishal G.","year":"2009","journal-title":"Journal of Emerging Technologies in Web Intelligence"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2005.853501"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10994\u2010005\u20105316\u20109"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016308404627"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012801612483"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0020\u20100255(99)00123\u20101"},{"key":"e_1_2_10_26_2","doi-asserted-by":"crossref","unstructured":"LijuanJ.andLipingF. Text classification based on Ant Colony Optimization Proceedings of the 3rd International Conference on Information and Computing (ICIC \u203210) June 2010 Jiang Su China 229\u2013232 2-s2.0-77955807447 https:\/\/doi.org\/10.1109\/ICIC.2010.242.","DOI":"10.1109\/ICIC.2010.242"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.2007252"},{"key":"e_1_2_10_28_2","first-page":"698","article-title":"Fast genetic algorithm for solving of the clustering problem of text documents","volume":"3","author":"Alguliev R. M.","year":"2005","journal-title":"Artificial Intelligence"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-010-9195-5"},{"key":"e_1_2_10_30_2","first-page":"7","article-title":"A new summarization method of text documents and evaluation of classification result in three aspects","volume":"3","author":"Alguliev R. M.","year":"2006","journal-title":"Telecommunications"},{"key":"e_1_2_10_31_2","doi-asserted-by":"crossref","unstructured":"AlgulievR. M.andAliguliyevR. M. Effective summarization method of text documents Proceedings of the IEEE\/WIC\/ACM International Conference on Web Intelligence (WI \u203205) September 2005 264\u2013271 2-s2.0-33748851713 https:\/\/doi.org\/10.1109\/WI.2005.57.","DOI":"10.1109\/WI.2005.57"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411609050083"},{"key":"e_1_2_10_33_2","first-page":"38","article-title":"Mechanism of forming and realization of anti-spam policy","volume":"12","author":"Alguliev R. M.","year":"2009","journal-title":"Telecommunications"},{"key":"e_1_2_10_34_2","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1007\/11562382_66","article-title":"A term weighting approach for text categorization","volume":"3689","author":"Kyung-Chan L.","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"e_1_2_10_35_2","unstructured":"Patan\u00e8G.andRussoM. Comparisons between fuzzy and hard clustering techniques Proceedings of the Advances in Fuzzy Systems and Intelligent Technologies (WILF \u203299) 1999 176\u2013184."},{"key":"e_1_2_10_36_2","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1023\/A:1023825226796","article-title":"Genetic algorithms used to solve scheduling problems","volume":"39","author":"Glibovec N. N.","year":"2003","journal-title":"Cybernetics and System Analysis"},{"key":"e_1_2_10_37_2","first-page":"50","article-title":"Designing of the main operations of genetic algorithms for production scheduling","volume":"35","author":"Witkovski T.","year":"2003","journal-title":"Journal of Automation and Information Sciences"},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.1615\/TelecomRadEng.v64.i2.20"},{"key":"e_1_2_10_39_2","unstructured":"OlsenA. L. Penalty functions and the knapsack problem Proceedings of the 1st IEEE Conference on Evolutionary Computation June 1994 554\u2013558 2-s2.0-0028600011."},{"key":"e_1_2_10_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-003-0082-0"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2011\/416308.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2011\/416308.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2011\/416308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T05:20:02Z","timestamp":1718688002000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2011\/416308"}},"subtitle":[],"editor":[{"given":"Sebastian","family":"Ventura","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["10.1155\/2011\/416308"],"URL":"https:\/\/doi.org\/10.1155\/2011\/416308","archive":["Portico"],"relation":{},"ISSN":["1687-9724","1687-9732"],"issn-type":[{"value":"1687-9724","type":"print"},{"value":"1687-9732","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1]]},"assertion":[{"value":"2011-05-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-09-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-11-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}