iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1002/MEET.2014.14505101157
{"id":"https://openalex.org/W1873936197","doi":"https://doi.org/10.1002/meet.2014.14505101157","title":"Exploiting latent content based features for the detection of static SMS spams","display_name":"Exploiting latent content based features for the detection of static SMS spams","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W1873936197","doi":"https://doi.org/10.1002/meet.2014.14505101157","mag":"1873936197"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/meet.2014.14505101157","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/meet.2014.14505101157","source":{"id":"https://openalex.org/S4210184376","display_name":"Proceedings of the American Society for Information Science and Technology","issn_l":"0044-7870","issn":["0044-7870"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/meet.2014.14505101157","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010380816","display_name":"Amir Karami","orcid":"https://orcid.org/0000-0003-1936-7497"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amir Karami","raw_affiliation_strings":["University of Maryland Baltimore County Maryland USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland Baltimore County Maryland USA","institution_ids":["https://openalex.org/I79272384"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010146682","display_name":"Lina Zhou","orcid":"https://orcid.org/0000-0003-1864-0527"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lina Zhou","raw_affiliation_strings":["University of Maryland Baltimore County Maryland USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland Baltimore County Maryland USA","institution_ids":["https://openalex.org/I79272384"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5010380816","https://openalex.org/A5010146682"],"corresponding_institution_ids":["https://openalex.org/I79272384","https://openalex.org/I79272384"],"apc_list":null,"apc_paid":null,"fwci":2.832,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":28,"citation_normalized_percentile":{"value":0.990384,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":"51","issue":"1","first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Detection and Prevention of Phishing Attacks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Detection and Prevention of Phishing Attacks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9948,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.9945,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spam-detection","display_name":"Spam Detection","score":0.707459},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.602027},{"id":"https://openalex.org/keywords/bot-detection","display_name":"Bot Detection","score":0.572421},{"id":"https://openalex.org/keywords/detection","display_name":"Detection","score":0.564089},{"id":"https://openalex.org/keywords/review-spam","display_name":"Review Spam","score":0.553754}],"concepts":[{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.9493027},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.75397664},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6310742},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.31039363},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21946391},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1662201}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/meet.2014.14505101157","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/meet.2014.14505101157","source":{"id":"https://openalex.org/S4210184376","display_name":"Proceedings of the American Society for Information Science and Technology","issn_l":"0044-7870","issn":["0044-7870"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/meet.2014.14505101157","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/meet.2014.14505101157","source":{"id":"https://openalex.org/S4210184376","display_name":"Proceedings of the American Society for Information Science and Technology","issn_l":"0044-7870","issn":["0044-7870"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W134314029","https://openalex.org/W1517046895","https://openalex.org/W176212337","https://openalex.org/W1880262756","https://openalex.org/W1983719983","https://openalex.org/W1986678144","https://openalex.org/W2036166268","https://openalex.org/W2071401747","https://openalex.org/W2144100511"],"related_works":["https://openalex.org/W637393809","https://openalex.org/W3126526144","https://openalex.org/W3021299372","https://openalex.org/W2808742736","https://openalex.org/W2748952813","https://openalex.org/W2346278349","https://openalex.org/W2286465138","https://openalex.org/W2184211279","https://openalex.org/W1987732684","https://openalex.org/W1526983901"],"abstract_inverted_index":{"ABSTRACT":[0],"As":[1],"the":[2,46,83,92,106,111],"use":[3],"of":[4,55,85,91,113],"mobile":[5,14],"phones":[6],"grows,":[7],"spams":[8,31],"are":[9],"becoming":[10],"increasingly":[11],"common":[12],"in":[13],"communication":[15],"such":[16,42],"as":[17,43],"SMS,":[18],"calling":[19],"for":[20,29,39,66,82],"research":[21],"on":[22],"SMS":[23,30,87,114],"spam":[24,67,115],"detection.":[25,116],"Existing":[26],"detection":[27,68,84],"techniques":[28],"have":[32],"been":[33],"mostly":[34],"adapted":[35],"from":[36],"those":[37],"developed":[38],"other":[40],"contexts":[41],"emails":[44],"and":[45],"web":[47],"without":[48],"taking":[49],"into":[50],"account":[51],"some":[52],"unique":[53],"characteristics":[54],"SMS.":[56],"Additionally,":[57],"spamming":[58],"tactics":[59],"is":[60,95],"constantly":[61],"evolving,":[62],"making":[63],"existing":[64],"methods":[65],"less":[69],"effective.":[70],"In":[71],"this":[72],"research,":[73],"we":[74],"propose":[75],"to":[76],"exploit":[77],"latent":[78],"content":[79],"based":[80],"features":[81,94,108],"static":[86],"spams.":[88],"The":[89,102],"efficacy":[90],"proposed":[93,107],"empirically":[96],"validated":[97],"using":[98],"multiple":[99],"classification":[100],"methods.":[101],"results":[103],"demonstrate":[104],"that":[105],"significantly":[109],"improve":[110],"performance":[112]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1873936197","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2}],"updated_date":"2024-10-04T11:17:57.082154","created_date":"2016-06-24"}