2015
DOI: 10.1080/19393555.2015.1078017
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive and Collaborative Server-Side SMS Spam Filtering Scheme Using Artificial Immune System

Abstract: SMS Spam, which is an unsolicited or unwanted message, is a major problem with Global System for Mobile Communication (GSM) subscribers. Existing Spam filters have not been able to stop the SMS Spam problem due to frequent drift in spammer's words, limited bag of words for training, device portability, and high computational overhead of filters. This paper presents a collaborative and adaptive server-side SMS Spam filter using Artificial Immune System (coined ExAIS_SMS). The proposed scheme involves five modul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…I.J. Information Technology and Computer Science, 2017, 7, 42-50 [1] 2012 IEEE RQ1, RQ2, RQ3 S2 [2] 2014 IJRAT RQ1 S3 [3] 2013 ACM RQ1,RQ2, RQ3 S4 [5] 2010 Computers and Security RQ1,RQ2, RQ3 S5 [10] 2012 IJCSI RQ1 RQ2, RQ3 S6 [11] 2014 IJMLC RQ1 RQ2, RQ3 S7 [12] 2006 ACM RQ1 RQ2, RQ3 S8 [7] 2012 IEEE RQ1, RQ3 S9 [13] 2015 CAE RQ1 RQ2, RQ3 S10 [14] 2011 ACM RQ1, RQ3 S11 [15] 2011 ACM RQ1, RQ3 S12 [16] 2007 ACM RQ1, RQ3 S13 [17] 2008 ITJ RQ1, RQ3 S14 [18] 2014 ASTL RQ1 S15 [4] 2015 Information Security Journal RQ1 RQ2, RQ3 S16 [21] 2014 JBASR RQ1 RQ2, RQ3 S17 [22] 2013 RQ1, RQ3 [2] Mutual Relation Based on the previous relation of sender and receiver.…”
Section: Results Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…I.J. Information Technology and Computer Science, 2017, 7, 42-50 [1] 2012 IEEE RQ1, RQ2, RQ3 S2 [2] 2014 IJRAT RQ1 S3 [3] 2013 ACM RQ1,RQ2, RQ3 S4 [5] 2010 Computers and Security RQ1,RQ2, RQ3 S5 [10] 2012 IJCSI RQ1 RQ2, RQ3 S6 [11] 2014 IJMLC RQ1 RQ2, RQ3 S7 [12] 2006 ACM RQ1 RQ2, RQ3 S8 [7] 2012 IEEE RQ1, RQ3 S9 [13] 2015 CAE RQ1 RQ2, RQ3 S10 [14] 2011 ACM RQ1, RQ3 S11 [15] 2011 ACM RQ1, RQ3 S12 [16] 2007 ACM RQ1, RQ3 S13 [17] 2008 ITJ RQ1, RQ3 S14 [18] 2014 ASTL RQ1 S15 [4] 2015 Information Security Journal RQ1 RQ2, RQ3 S16 [21] 2014 JBASR RQ1 RQ2, RQ3 S17 [22] 2013 RQ1, RQ3 [2] Mutual Relation Based on the previous relation of sender and receiver.…”
Section: Results Analysismentioning
confidence: 99%
“…There is scope of research in this field and some research works have been conducted on it. There are different categories of SMS spam filtering such as white listing and black listing, content-based, non-content based, collaborative approaches and challenge-response technique [4], [5], [12], [29]. The techniques are used in client side, server side or in both client and server side [4].…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The However, The IDP serves two purposes in this framework, first to reduce redundancy in the local and global knowledge, and also to increase the search and decision-making time when a new threat arrives at any node. As adopted by Onashoga et al [14], the Detector for Ageing Technology for Adaptive and Collaborative SMS Spam Filtering was employed to remove aged intrusion signature from the knowledge base and also to reduce computation time when accessing knowledge at the global scope. Algorithm 4 shows the pseudo-code description of the intrusion detection pruning process.…”
Section: Ck-raid External Modular Componentsmentioning
confidence: 99%