a comparative evaluation of machine learning...
TRANSCRIPT
i
A COMPARATIVE EVALUATION OF MACHINE LEARNING APPROACHES IN SMS SPAM DETECTION
SABER SALEHI
A research submitted in partial fulfillment of the
requirements for the award of the degree of
Master of Science (Computer Science)
Faculty of Computer Science and Information Systems
Universiti Teknologi Malaysia
JULY 2011
iii
To my beloved parents, thank you for always being there for me, supporting me and
encouraging me to be the best that I can be.
iv
ACKNOWLEDGMENT
Praises to God for giving me the patience, strength and determination to go
through and complete my study. I would like to express my appreciation to my
supervisor, Assoc. Prof. Dr. Ali Selamat, for her support and guidance during
the course of this study and the writing of the thesis. Without his continued support
and interest, this thesis would not have been the same as presented here. I would like
to dedicate this thesis to my family. Without their love and support I would have
never come this far. Finally, I would also like to extend my thanks to my friends who
have given me the encouragement and support when I needed it.
v
ABSTRACT
Spam detection is a significant problem which is considered by many
researchers by various developed strategies. In this study, the popular performance
measure is a classification accuracy which deals with false positive, false negative
and accuracy. These metrics were evaluated under applying three supervised learning
algorithm (Hybrid of Simple Artificial Immune System (SAIS) and Particle Swarm
Optimization (PSO), Naive Bayes Classifier (NBC), Enhanced Genetic Algorithm
(EGA)) based on classification of SMS contents were evaluated and compared. In
this research, SAIS was hybridized by particle swarm optimization (PSO) for
optimizing the performance of SAIS for spam filtering. PSO was used with mutation
to reinforce the immune system’s searches to find the best class in exemplar for
classification. Results were improved using Hybrid SAIS and PSO. The proposed
EGA was to achieve the best chromosomes which were grouped by the keywords.
Then, the best chromosome with highest fitness value was selected as classifier.
Simulated annealing (SA) was used with classical mutation and crossover to
reinforce the efficiency of genetic searches. Achieved results represent the enhanced
GA is markedly superior to that of a classical GA. These algorithms were trained and
tested on a set of 4601 SMS messages in which 1813 were spams and 2788 were
non-spams. Results showed that the proposed EGA technique gave better result
compare to the hybrid SAIS and PSO and NBC techniques. Results also showed that
the proposed EGA technique gave 99.87% accuracy, and the proposed NBC, hybrid
of SAIS and PSO techniques gave 97.457% and 88.33% accuracy, respectively.
vi
ABSTRAK
Pengesanan spam adalah masalah besar yang dianggap oleh ramai penyelidik
menerusi pelbagai strategi yang dibangunkan. Dalam kajian ini, pengukur prestasi
yang popular adalah ketepatan pengelasan yang memyokong keadaan positif palsu,
negatif palsu dan ketepatan. Metrik ini telah dinilai melalui pengaplikasian tiga
algoritma pembelajaran diselia iaitu (Hybrid of Simple Artificial Immune System
(SAIS) and Particle Swarm Optimization (PSO), Naive Bayes Classifier (NBC),
Enhanced Genetic Algorthm (EGA)) berdasarkan penilaian dan perbandingan
klasifikasi kandungan SMS. Dalam kajian ini, SAIS dihaibritkan oleh particle swarm
optimization (PSO) dalam mengoptimumkan prestasi SAIS untuk penapisan spam.
PSO beserta kaedah mutasi telah digunakan bagi mengukuhkan carian sistem imun
dalam mencari kelas yang terbaik dalam contoh untuk pengelasan. Dengan
menggunakan Hibrid SAIS dan PSO keputusan telah bertambah baik. EGA yang
dicadangkan adalah untuk mencapai kromosom terbaik yang dikumpulkan menurut
kata kunci. Kemudian, kromosom yang terbaik dengan nilai kecergasan tertinggi
dipilih sebagai pengelas. Simulated annealing (SA) telah digunakan dengan mutasi
klasik dan crossover untuk mengukuhkan kecekapan carian genetik. Keputusan yang
mewakili GA yang telah dipertingkatkan menunjukkan keputusan yang ketara lebih
tinggi daripada GA klasik. Algoritma ini telah dilatih dan diuji ke atas set yang
mengandungi 4601 SMS yang mana 1813 daripadanya adalah spam dan 2788 bukan
spam. Keputusan menunjukkan bahawa teknik EGA yang dicadangkan memberikan
hasil yang lebih baik berbanding dengan SAIS Hibrid, PSO dan teknik NBC.
Keputusan juga menunjukkan bahawa teknik EGA yang dicadangkan memberi
99.87% ketepatan, dan NBC yang dicadangkan iaitu Hibrid SAIS dan teknik PSO
masing-masing memberikan ketepatan 97.457% dan 88.33%.
vii
TABLE OF CONTENTS
CHAPTER TITLE PAGE
DECLARATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
ABSTRAK
TABLE OF CONTENTS
LIST OF TABLES
LIST OF FIGURES
ii
iii
iv
v
vi
vii
xi
xii
1 INTRODUCTION 1 1.1 Introduction 1 1.2 Problem Background 3 1.2.1 Self Learning and Self Adptability of Naive
Bayes
3 1.2.2 Mature Convergence in Genetic Algorithm 4 1.2.3 Deficiency in Optimization Methods 5 1.2.4 Reduction the Dimentionality 5 1.3 Problem Statement 6 1.4 Project Aim 7 1.5 Objectives 7 1.6 Dissertation Scope 8 1.7 Thesis Contribution 8 1.7 Thesis Overview 9 1.8 Summary
10
viii
2 LITERATURE REVIEW 11 2.1 Introduction 11 2.2 Spam 12 2.3 Phishing 15 2.4 SMS Spam Filtering 17 2.5 WhiteList, BlackList, GreyList 17 2.5.1 WhiteList 18 2.5.2 Blacklist 19 2.5.3 Greylist 19 2.6 Pre-acceptance and Post-acceptance Responses 20 2.6.1 Pre-acceptance Response 21 2.6.2 Post-acceptance Response 22 2.7 Evaluation Criteria 22 2.7.1 False positive and False negative 23 2.7.2 Spam Recall 24 2.7.3 Spam Precision 24 2.7.4 Accuracy 25 2.7.5 FB Measure 26 2.8 Machine Learning Methods 26 2.8.1 Inductive Learning 28 2.8.2 Deductive Learning 29 2.9 Supervised and Unsupervised Learning 30 2.10 Swarm Intelligence 31 2.10.1 Ant Colony Optimization (ACO) 33 2.10.2 Particle Swarm Optimization (PSO) 35 2.10.2.1 Standard PSO 36 2.10.2.2 Clonal PSO 37 2.10.2.3 Random Black Hole Particle
Swarm Optimization (RBH-PSO)
38 2.11 Background Immunology 38 2.12 Artificail Immune System (AIS) 40 2.12.1 Artificial Immune Recognition System
(AIRS)
41 2.12.2 CLONALG 44 2.12.3 Immunos Algorithm 46 2.12.4 Simple Artificial Immune System (SAIS) 47 2.13 Naive Bayes Classifier (NBC) 47
ix
2.14 Genetic Algorithm (GA) 49 2.15 Simulated Annealing (SA) 52 2.16 Algorithms Functionalities 53 2.17 Summary
55
3 RESEARCH METHODOLOGY 57 3.1 Introduction 57 3.2 Phases of Research 57 3.2.1 Phase 1: To study the Existing Methods in
Artificial Immune System (AIS) and Optimization Methods to Solve the Convergence Problem in GA for Classification in Spam Detection
59 3.2.2 Phase 2: To Formulate and Apply Classical
GA by Simulated Annealing (SA), Simple Artificial Immune System (SAIS), Hybrid SAIS and PSO and Naive Bayes Classifier Algorithm for Spam Detection
60 3.2.2.1 Apply Simple Artificial Immune
System (SAIS)
63 3.2.2.2 Develop Hybrid Simple Artificial
Immune System (SAIS) and Particle Swarm Optimization (PSO)
66 3.2.2.3 Apply Genetic Algorithm (GA) 3.2.2.4 Develop Enhanced Genetic
Algorithm (EGA)
77 3.2.2.5 Naive Bayes Classifier (NBC) 81
3.2.3 Phase 3: Calculating the Accuracy, False Positive, False Negative for each Algorithm
86
3.2.4 Phase 4: Analyze Effectiveness of Statical Optmization Algorithms (Enhanced GA, GA, Hybrid SAIS and PSO, SAIS and Naive Bayes) in Detecting Spam
87 3.2.5 Phase 5: Compare the Performance of
Hybrid SAIS and PSO, Enhanced GA and Naive Bayes According to Achieved Accuracy
3.3 Summary
88
4 SIMULATION RESULT 89 4.1 Introduction 89 4.2 Data Set Information 90
88
71
x
4.3 Enhanced Genetic Algorithm (EGA) Techniques 91 4.4 Naive Bayes Technique 96 4.5 Hybrid Simple Artificial Immune System (SAIS) and
Particle Swarm Optimization (PSO)
97 4.6 Experimental Results 101 4.7 Discussion on the Result 102 4.8 Summary
104
5 Conclusion 105 5.1 Conclusion 105 5.2 Research Contributions 106 5.3 Future Works 107 REFRENCES 108
xi
LIST OF TABLES
TABLE NO. TITLE PAGE
2.1 Types of offers made via spam in a random sample of 1000 spam messages. Source: “False Claims in Spam,” FTC Division of Marketing Practices (April 2003) 14
2.2 Genetic algorithm, naïve Bayes and simple artificial immune systems’ functionalities 53
4.1 Data set information 90 4.2 Calculating group weight from spam corpus 91 4.3 Testing result for 1000 generation using classical GA 93 4.4 Testing result for 1000 generation using enhanced GA 94 4.5 Testing result for SAIS 99 4.6 Testing result for hybrid SAIS and PSO 99 4.7 Testing result for 1000 generation using enhanced GA 101 4.8 Testing result in Naive Bayes 102 4.9 Testing result for hybrid SAIS and PSO 102
xii
LIST OF FIGURES
FIGURE NO. TITLE PAGE
2.1 Different types of spam in the media 13 2.2 Types of offers made via spam in a random sample of
1000 spam messages. Source: “False Claims in Spam,” FTC Division of Marketing Practices (2003)
15 2.3 A phishing website that present as eBay 16 2.4 Current technical initiatives for fighting spam and
phishing (Shalendra Chhabra, 2005)
18 2.5 False positive and false negative categorization 23 2.6 Lifecycle overview of AIRS algorithm 42 2.7 Overview of CLONALG Algorithm 45 2.8 Overview of Immunos algorithm 46 2.9 Naive Bayes Classifier, where the predictive features are
conditionally independent given the class attribute (C) 49 2.10 A simplified flow chart of GA process 50 3.1 The main phases of research 58 3.2 Hybrid SAIS and PSO, Naïve Bayes and enhanced GA
procedure for classification in spam detection
61 3.3 Mathematical model of normalization 62 3.4 SAIS flowchart 64 3.5 Mathematical model of Euclidean function 65 3.6 Hybrid SAIS and PSO framework 67 3.7 pi lists initialization mathematical model 68 3.8 Update pi and pg mathematical model 69 3.9 Update velocity and position mathematical model 70 3.10 Mathematical model of chromosomes generation 72
xiii
3.11 Mathematical model of fitness function 74 3.12 Mathematical model of calculating weight of groups 75 3.13 Classical GA flowchart 76 3.14 Enhanced GA framework 78 3.15 Simulated annealing mathematical model 80 3.16 Naïve Bayes classifier framework 82 3.17 Mathematical model of average frequency of each
attributes on total spam or legitimate list 83 3.18 Mathematical model of average probability of each
attributes on total spam or legitimate list 84 3.19 Mathematical model of average probability of each
attributes which occurs in spam category 85 3.20 Performance Measure 87 4.1 Accuracy comparison between EGA and GA 94 4.2 False positive comparison between EGA and GA 95 4.3 False negative comparison between EGA and GA 95 4.4 Accuracy comparison between hybrid SAIS and PSO and
SAIS 100 4.5 FP comparison between hybrid SAIS and PSO and SAIS 100 4.6 Accuracy comparisons between EGA, NBC, hybrid SAIS
and PSO 103 4.7 False positive (FP) comparisons between EGA, NBC,
hybrid SAIS and PSO 103 4.8 False negative comparisons between EGA, NBC, hybrid
SAIS and PSO 104
CHAPTER 1
INTRODUCTION
1.1 Introduction
All wireless networks are comprised of independent computing nodes, have security
problems, potentially. In wireless networks that are sorted by traditional mainframe
computers without checking by central control, users capable to disturb the network
with unlike intentions such as decreasing the wireless networks’ confidentiality or
integrity for accessing the data, using the capabilities of your network components for
illegal or unsavory purposes or interfering the wireless network users with the
reasonable activities. According to these unlike intentions, with the coming of internet
and its protocols to control wide area connectivity, big and enterprise companies
decided to protect their wireless networks, data, and applications against intrusive
attacks and other threats by establishing perimeter defenses such as firewalls, VPNs,
antivirus systems, intrusion prevention and intrusion detection systems (John, 2006).
2
Wireless sensor networks deploy rapidly. This kind of network is flexible and self-
organizing system. This subject incurs to decrease the maintenance and deployment
cost. Therefore, many application scopes such as health, home, military or
environmental encourage using this kind of network. One of the significant challenges
in many of these application areas is security. Sensor nodes must be far from the enemy
because whenever the sensor network is reachable; sensor nodes could be destroyed and
disturbed by the attackers. Cellular phone is one of the main areas in wireless network.
SMS service is the significant and main needs of people after voice among the fixed
wireless users and cellular phone. For example, 80 percent of the U.S. work force used
some sort of wireless devices such as mobile computing devices, cell phones and pagers.
This news has positive and negative points for employee and companies, respectively.
Because, this situation improves the employee’s productivity. On the other hand, that is
bad news for companies. Because, companies not ready for detecting the wireless
network against breaches and debilitating viruses (Gohring, 2001).
On the other hand, by increasing the SMS users, two problems is created for
operator. Firstly, the number of spam via SMS is increased. In addition, it causes the
growth of SMS traffic. Spam occurs some problems in the wireless network area. Some
of these problems are as the delay and lost non-spam SMS.
Totally, there has been a shortage of developed organization and functionality. So,
that is exclusive the wireless viruses aren’t more harmful. But, it makes change in the
future. Industry analysts predict the spread of using wireless handheld and it causes
increasing the abilities of new mobile. According to expected report which has been
published, 5.9 billion personal digital assistants (PDAs), handsets and internet
equipment will be provided with wireless ability at the end of 2008 (Gohring, 2001).
3
1.2 Problem Background
Over the years, many researchers proposed numerous techniques for detecting and
handling the spam to mitigate the impact of spam on several scopes such as wireless
network and e-mail and internet users. Most of these researches attend to increase and
develop the accuracy of spam detection techniques. Several classifiers such as naïve
Bayes, text compression and artificial neural network have been proposed to detecting
and handling the spam. These classifiers are based on probabilistic techniques and
machine learning. In the following, the existing problems which are solved by other
researchers or in this dissertation are discussed. In this study most of the effort was done
to remove these problems.
1.2.1 Self Learning and Self Adaptability of Naïve Bayes
Luo et al., (2010) proposed a new spam filtering based on naïve Bayes and AIS, and
analyses the key problems of these algorithms. They assume that naïve Bayes is the
most popular statistical-based anti spam method for its strong categorization and high
precision. But it is weak in self-learning and self-adaptability. Artificial immune system
has impressive performance on recognition, learning and memorizing. They attempt to
combine the mechanism of naïve Bayes and artificial immune system, propose a hybrid
spam filtering algorithm based on the two algorithms, and then solve the key problems
of the algorithm. Their findings demonstrate that the hybrid algorithm not only achieves
high classification accuracy at first, but also has self-learning, self-adaptability and
robustness.
4
1.2.2 Mature Convergence in Genetic Algorithm
Sanpakdee et al., (2006) proposed a mechanism for filtering incoming spam mails by
generating spam mail prototypes using genetic algorithm (GA). The keywords are
categorized by their relating meaning into 7 groups as: adult, financial, commercial,
beauty and diet, traveling, home-based business and gambling. Then, the string of
chromosome which has 7 genes are defined. Each gen represents each word in
chromosome by binary value. The accuracy of this mechanism is about 85% in average.
But Sanpakdee et al. proposed technique has some weaknesses as below:
• For large words, it spends time to categorize the words however it was better
to use feature selection methods to reduce dimensionality.
• Sanpakdee et al., technique is not flexible to create the chromosomes. Its
method actually limited the chromosomes genes creation from limited
keywords.
• The other limitation in Sanpakdee et al.’s technique is in GA operations. The
cross over and mutation was for words of gene with the same group only.
The proposed technique by using GA in this dissertation solved the mentioned
problems. In addition, in order to reinforce the efficiency of genetic searches and
provide mature convergence, enhanced GA (EGA) using simulated annealing (SA) was
proposed.
5
1.2.3 Deficiency in Optimization Methods
In the other research, Oda et al. (2003) used the artificial immune system for
detecting spam. In particular, it tests the spam immune system against the publicly
available spam assassin corpus of spam and non-spam, and extends the original system
by looking at several methods of classifying email messages with the detectors produced
by the immune system. The resulting system classifies the messages with similar
accuracy compare to other spam filters but uses fewer detectors to do so which makes it
an attractive solution for circumstances where processing time is at a premium. There is
a deficiency in number of optimization methods in SAIS. This problem can be solved
and eliminated using the other optimization methods besides mutation. In this
dissertation, SAIS was hybridized by particle swarm optimization (PSO) for optimizing
the performance of SAIS.
1.2.4 Reduction the Dimensionality
Feature selection is an important method for improving the efficiency and accuracy
of text categorization algorithms by removing redundant and irrelevant terms from the
corpus. Extensive researches have been done to improve the performance of spam
detection by reduction to the dimensionality of features space. Almedia et al. (2009)
compared the performance of most popular methods used as term selection techniques,
such as document frequency (DF), information gain (IG), mutual information (MI), X2
statistic, and odds ratio (OR) used for reducing the dimensionality of the term space
with four well-known different versions of Naive Bayes spam filter. Regarding term
selection techniques, Almedia et al. have found IG and χ2 statistic, most effective in
aggressive term removal without losing categorization accuracy. On one hand, DF and
6
OR also usually provided an improvement on the filter’s performance. On the other
hand, the employment of MI offered poor results which frequently worsened the
classifier’s performance. But, in this dissertation the feature space is not that large for
reduction so feature selection methods were not used in this dissertation.
1.3 Problem Statement
In this research, several existing classification methods was analyzed and simulated
to investigate the efficiency of each technique. Accuracy of spam detection in SMS
exchanging was evaluated using the naïve Bayes, genetic algorithm, simple artificial
immune system based on classification of SMS contents. GA is well known and famous
as optimization and searching method and in this research was used as classification. On
the other hand, in naïve Bayes, estimation of probability of each email which occurs in
spam category (�(�|�)) is different among the various data model. So, the main
questions of this research are:
i. How we can find the optimization algorithms and their functionalities to
understand the main concepts in spam detection?
ii. How we can adopt the naïve Bayes classifier, GA, enhanced GA, SAIS and
hybrid SAIS and PSO for spam detection in SMS exchanging?
iii. How we can find the efficiency of naïve Bayes classifier, GA, enhanced GA,
SAIS and hybrid SAIS and PSO in spam detection?
7
1.4 Dissertation Aim
The aim of this dissertation is to propose the hybrid SAIS and PSO, enhanced GA
and naïve Bayes classifier to detect spam and evaluate the accuracy of spam detection in
SMS exchanging.
1.5 Objectives
This research follows three objectives:
i. To study the existing methods in artificial immune system (AIS) and
optimization methods to solve the convergence problem in GA for classification
in spam detection.
ii. To develop and apply classical GA, enhanced GA by simulated annealing
(SA), hybrid SAIS and PSO, SAIS and naïve Bayes classifier algorithms.
iii. To analyze effectiveness of enhanced GA, hybrid SAIS and PSO and naïve
Bayes classifier algorithms in detecting spam.
8
1.6 Dissertation Scopes
This research is focusing on increasing accuracy and decreasing false positive and
false negative based on classification of SMS content. The scopes of this research are as
follow:
a. Initially, spam detection is applied in enhanced genetic algorithm (EGA), hybrid
simple artificial immune system (SAIS) and particle swarm optimization (PSO)
and Naive Bayes classifier (NBC).
b. The result of enhanced GA and hybrid SAIS and PSO as false positive, false
negative and accuracy are compared to classical GA and SAIS, respectively.
c. The result of EGA, hybrid SAIS and PSO and NBC as false positive, false
negative and accuracy are compared to each other.
d. The data sets used in this research has 4601 instances in which 39.4% are spam
and each instance has 57 attributes. These data sets are prepared from UC
Irvine. This website contains the data sets which are related to machine learning
and intelligent systems (http://archive.ics.uci.edu/ml/datasets/Spambase).
e. Implementations of algorithms are done by java programming language.
1.8 Thesis Contribution
The contributions of this research are as follow:
• To develop Enhanced GA and hybrid of SAIS and PSO.
• To apply Enhanced GA, hybrid of SAIS and PSO, Naïve Bayes, GA and
SAIS for spam detection.
9
• Analytical comparison of Enhanced GA, hybrid of SAIS and PSO,
Naïve Bayes, GA and SAIS and the impact of PSO and simulated
annealing (SA) on SAIS and GA.
1.9 Thesis Overview
Today, there is a need to detect spam in SMS because spam has fatal effect on SMS.
A few works has been reported on spam detection in SMS. In our research, spam
detection is modeled by hybrid SAIS and PSO, enhanced GA and naïve Bayes and the
result is implemented by Java. These techniques are compared based on accuracy, false
positive and false negative.
In the first chapter, wireless networks and the various technologies that are growing
especially in SMS, has been described. Then, in the problem background the numerous
techniques that are applied in spam detection by researchers are described shortly. Then,
the main question of research, dissertation aim, dissertation objectives and dissertation
scope were mentioned in detail. Finally, thesis overview and expected result has been
described briefly.
Then, in the second chapter, spam and phishing and their fatal effects are described
and then power of spam filtering is mentioned. Then, white List, black list and grey List
which are as one of the current enterprise techniques to detect the client-side and server-
side against spam and phishing are mentioned. The next subject is pre-acceptance and
post-acceptance. There are two responses to spam at the server. The false positive and
false negative is described after that and then machine learning and its methods as
10
named inductive and deductive are described. Then some of the popular machine
learning algorithms which are used in spam detection are described.
Then, in the research methodology chapter the related research methodologies that
are used in spam detection is explained. Then, the dissertation objectives and main
phases of research (contains 4 phases) which are used are described. In chapter 4, the
data sets information is described. Then, the popular performance measure is described
which is used as classification accuracy. Then, the proposed techniques by using Naive
Bayes classifier (NBC), enhanced genetic algorithm (EGA), hybrid simple artificial
immune system (SAIS) and particle swarm optimization (PSO) are presented,
respectively. Finally, the results of mentioned techniques are represented and discussed.
Finally in chapter 5 denotes the conclusion of this research.
1.10 Summary
In this chapter, wireless networks and the various technologies that are growing
especially in SMS, has been described. Then, in the problem background the numerous
techniques that are applied in spam detection by researchers are described shortly. Then,
the main question of research, dissertation aim, dissertation objectives and dissertation
scope were mentioned in detail. Finally, thesis overview and expected result has been
described briefly.
108
REFRENCES
Abdel-Galil, T. K., Sharkawy, R. M., Salama, M. M. A., and Bartnikas, R. (2005). Partial
discharge pulse pattern recognition using an inductive inference algorithm. IEEE
Transactions on Dielectrics and Electrical Insulation, 12(2), 320-327.
Aksoy, M., Çagıl, G., and Türker, A. (2000). Number-plate recognition using inductive
learning. Robotics and Autonomous Systems, 33(2-3), 149-153.
Alpaydin, E. (2004). Introduction To Machine Learning (Adaptive Computation And
Machine Learning): The MIT Press.
Bhaduri, A. (2009). Credit scoring using Artificial Immune System algorithms: A
comparative study. 2009 World Congress on Nature & Biologically Inspired Computing
(NaBIC), 1540-1543.
Blanzieri, E., and Bryl, A. (2008). A Survey Of Learning-Based Techniques Of Email Spam
Filtering. Department of Information and Communication Technology, University of
Trento, Trento, Italy, 149-153.
Bonabeau, E., Dorigo, M., and Theraulaz, G. (2002). Inspiration For Optimization From
Social Insect Behavior. Nature, 406(6).
Chhabra, S. (2005). Fighting Spam, Phishing And Email Fraud: University Of California
Riverside, 540-543.
Cormack, G. V., Hidalgo, J.M., and Sánz, E.P. (2007). Feature engineering for mobile
(SMS) spam filtering. Proceedings of the 30th annual international ACM SIGIR
conference on Research and development in information retrieval - SIGIR '07, 871, 149-
153.
Dasgupta, D., Ji, Z., and Gonzalez, F. (2003). Artificial immune system (AIS) research in
the last five years. The 2003 Congress on Evolutionary Computation, 2003. CEC '03.,
123-130.
De Castro, L., and Von Zuben, F. (2002). Learning and optimization using the clonal
109
selection principle. IEEE Transactions on Evolutionary Computation, 6(3), 239-251.
Dorigo, M., Maniezzo, V., and Colorni,A. (1996). Ant system: optimization by a colony of
cooperating agents. IEEE transactions on systems, man, and cybernetics. Part B,
Cybernetics : a publication of the IEEE Systems, Man, and Cybernetics Society, 26(1),
29-41.
Dorigo, M., and Gambardella, L. (1997). Ant colony system: a cooperative learning
approach to the traveling salesman problem. IEEE Transactions on Evolutionary
Computation, 1(1), 53-66.
Dorigo, M. (2009). Swarm-bots and Swarmanoid : Two experiments in embodied swarm
intelligence. In Proceedings of Web Intelligence, 123-130.
Eberhart, R. C. (1995). Particle swarm optimization: developments, applications and
resources. Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat.
No.01TH8546), 81-86.
Eberhart, R. C., Shi, Y. (2001). Particle Swarm Optimization: Developments, Applications
And Resources: Proceedings Of The Congress On Evolutionary Computation, Seoul,
South Korea, 123-130.
Epstein, J. M., and Axtell, P. (1998). Growing Artifcial Societies: MIT Press.
Graham, j. (2003). The Spammers Compendium: MIT Spam Conference.
Guo, P., Wang, X., and Han, Y. (2010). The Enhanced Genetic Algorithms for the
Optimization Design. Architectural Engineering, 2990-2994, 163-160.
Guzella, T. S., and Caminhas, W.M. (2009). A review of machine learning approaches to
Spam filtering. Expert Systems with Applications, 36(7), 10206-10222.
Huang, H., and Hsu, C. (2002). Bayesian classification for data from the same unknown
class. IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics : a
publication of the IEEE Systems, Man, and Cybernetics Society, 32(2), 137-145.
Jerome, H., Carter, M. (2000). The Immune System as a Model for Pattern Recognition and
Classification. Section of Medical Informatics, Division of General Internal Medicine,
University of Alabama, 123-130.
Kennedy, J., and Eberhart, R. (1995). Particle Swarm Optimization. Proc.Proceedings Of
The IEEE International Conference On Neural Networks, Perth, Australia, IEEE Service
Center, 183-189
Kubotani, H., and Yoshimura, K. (2003). Performance evaluation of acceptance probability
functions for multi-objective SA. Computers and Operations Research, 30(3), 427-442.
Kumar, P. (1990). Convergence of adaptive control schemes using least-squares parameter
estimates. IEEE Transactions on Automatic Control, 35(4), 416-424.
Leung, K., Cheong, F., and Cheong, C. (2007). Consumer credit scoring using an artificial
110
immune system algorithm. IEEE Congress on Evolutionary Computation, 3377-3384.
Lingling L., Z., C., and Gao, Z. (2003). Multi-Strategy Combined Learning Mechanism
Suitable For Designing Expert System. Proceedings Of The Second International
Conference On Machine Learnkg And Cybernetics, 123-130.
Luo, Q., Liu, B., Yan, J., and He, Z. (2010). Research of a Spam Filtering Algorithm Based
on Naïve Bayes and AIS. International Conference on Computational and Information
Sciences, 152-155.
Merton, R. C. (1974). On The Pricing Of Corporate Debt: The Risk Structure Of Interest
Rates. Journal Of Finance, 29(2), 449–470.
Mitchell, T. M. (2006). The Discipline of Machine Learning. Machine Learning.
Nature, T., Theory, L., and Vapnik, V.N. (2011). Book reviews. Applied physiology,
nutrition, and metabolism Physiologie appliquée, nutrition et métabolisme, 36(3).
Oda, T., and White, T. (2003). Increasing the accuracy of a spam-detecting artificial
immune system. The 2003 Congress on Evolutionary Computation, 2003. CEC '03.,
390-396.
Pan, Q., Wang, L., Tasgetiren, M., and Zhao, B. (2007). A hybrid discrete particle swarm
optimization algorithm for the no-wait flow shop scheduling problem with makespan
criterion. The International Journal of Advanced Manufacturing Technology, 38(3-4),
337-347.
Preisach, B., Schmidt, H. , Decker, L., and Reinhold. (2008). Data Analysis, Machine
Learning and Applications: Proceedings Of The 31st Annual Conference Of The
Gesellschaft Klassifikation E.V, 123-130.
Sahami, M., Dumais, S., Heckerman, D., and Horvitz, E. (1998). A Bayesian Approach To
Filtering Junk Email. Technical Report WS-98-05, AAAI. AAAI Workshop On
Learning For Text Categorization, Madison, Wisconsin, 223-230.
Sanpakdee, U., Walairacht, A., and Walairacht, S. (2006). Adaptive Spai Mail Filtering
Using Genetic Algorithm. 2006 8th International Conference Advanced Communication
Technology, 441-445.
Secker, A., Freitas, A., and Timmis, J. (2003). AISEC: An Artificial Immune System for E-
mail Classification. The 2003 Congress on Evolutionary Computation, 2003. CEC '03.,
131-138.
Serafni, P., and Jaszkiewicz, A. (1992). Simulated Annealing For Multi Objective
Optimization Problems. Proceedings Of The 10th International Conference On Multiple
Criteria Decision Making, 123-130.
Sharvani, .G.S, Rangaswamy, T.M. (2009). Different Types of Swarm Intelligence
Algorithm for Routing. International Conference on Advances in Recent Technologies
111
in Communication and Computing, 604-609.
Shi-yong, L. (2003). Progresses in Ant Colony Optimization Algorithm with Applications.
Computer Automated Measurement and Control, 623-630.
Tran, M., Armitage, G. (2004). Evaluating The Use Of Spam-Triggered TCP/IP Rate
Control To Protect SMTP Servers. Proceedings Of The Australian Telecommunications
Networks And Applications Conference (ATNAC 2004), Sydney, Australia, 123-130.
Twining, R. d., Williamson, M., Mowbray, M., Rahmouni, M., and Sergeant, M. (2003).
Internet Level Spam Detection And Spamassassin 2.50. In Proceedings Of The 2003
Spam Conference, Cambridge MA, 153-160.
Twining, R. D., Williamson, M.M., Mowbray, M., and Rahmouni, M. (2004). Email
Prioritization : reducing delays on legitimate mail caused by junk mail increased
dramatically . These unwanted messages clutter up users ' Email Prioritization : reducing
delays on legitimate mail caused by junk mail, 143-150.
Vapnik, V. N. (1995). The Nature Of Statistical Learning Theory. New York: Springer.
Wang, H., Ma, C., and Zhou, L. (2009). A Brief Review of Machine Learning and Its
Application. International Conference on Information Engineering and Computer
Science, 1-4.
Wang, Z., and Cui, D. (2009). A Hybrid Algorithm Based on Genetic Algorithm and
Simulated Annealing for Solving Portfolio Problem. 2009 International Conference on
Business Intelligence and Financial Engineering, 106-109.
Xin Jin, R. B., and Gao, X.Z. (2006). Notice of Violation of IEEE Publication Principles An
Artificial Immune Recognition System-based Approach to Software Engineering
Management: with Software Metrics Selection. Intelligent Systems Design and
Applications. Sixth International Conference, 123-130.
Yang, W., Wan, W., Lin, G., and Zhang, L. (2007). An Efficient Intrusion Detection Model
Based on Fast Inductive Learning. 2007 International Conference on Machine Learning
and Cybernetics, 3249-3254.
Zhang, j., Liu, k., Tan, Y., and He, x. (2008). Random Black Hole Particle Swarm
Optimization And Its Application. Signal Processing, 359-365.
Zhu, Z., and Sun, Y. (2009). Transmission Line Fault Classification Based on Wavelet
Singular Entropy and Artificial Immune Recognition System Algorithm. 2009 2nd
International Conference on Power Electronics and Intelligent Transportation System
(PEITS), 154-157.