{"id":"https://openalex.org/W1990041522","doi":"https://doi.org/10.1109/cicybs.2014.7013372","title":"A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm","display_name":"A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm","publication_year":2014,"publication_date":"2014-12-01","ids":{"openalex":"https://openalex.org/W1990041522","doi":"https://doi.org/10.1109/cicybs.2014.7013372","mag":"1990041522"},"language":"en","primary_location":{"id":"doi:10.1109/cicybs.2014.7013372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicybs.2014.7013372","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057893924","display_name":"El-Sayed M. El-Alfy","orcid":"https://orcid.org/0000-0001-6279-9776"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"El-Sayed M. El-Alfy","raw_affiliation_strings":["College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","King Fahd University of Petroleum and Minerals, College of Computer Sciences and Engineering, Dhahran 31261, Saudi Arabia#TAB#"],"affiliations":[{"raw_affiliation_string":"College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"King Fahd University of Petroleum and Minerals, College of Computer Sciences and Engineering, Dhahran 31261, Saudi Arabia#TAB#","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019803459","display_name":"Ali A. Al-Hasan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210143841","display_name":"Saudi Aramco (Saudi Arabia)","ror":"https://ror.org/03ypap427","country_code":"SA","type":"company","lineage":["https://openalex.org/I4210143841"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ali A. Al-Hasan","raw_affiliation_strings":["Saudi Aramco, Dhahran, Saudi Arabia","Saudi Aramco, Dhahran 31261, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Saudi Aramco, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I4210143841"]},{"raw_affiliation_string":"Saudi Aramco, Dhahran 31261, Saudi Arabia","institution_ids":["https://openalex.org/I4210143841"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057893924"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":null,"apc_paid":null,"fwci":0.1868,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.53585517,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"16","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9545000195503235,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.9382517337799072},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8195675015449524},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5893357992172241},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.5420239567756653},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.44046151638031006},{"id":"https://openalex.org/keywords/electronic-mail","display_name":"Electronic mail","score":0.43139421939849854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4024554193019867},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3764079809188843},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34108057618141174},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22040900588035583},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15008875727653503},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10799151659011841}],"concepts":[{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.9382517337799072},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8195675015449524},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5893357992172241},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.5420239567756653},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.44046151638031006},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.43139421939849854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4024554193019867},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3764079809188843},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34108057618141174},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22040900588035583},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15008875727653503},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10799151659011841},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cicybs.2014.7013372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicybs.2014.7013372","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W114599062","https://openalex.org/W1532325895","https://openalex.org/W1864710443","https://openalex.org/W1971285215","https://openalex.org/W1977601291","https://openalex.org/W1983247286","https://openalex.org/W2007357782","https://openalex.org/W2007652426","https://openalex.org/W2015585187","https://openalex.org/W2020329271","https://openalex.org/W2033457090","https://openalex.org/W2034110153","https://openalex.org/W2049023511","https://openalex.org/W2076408892","https://openalex.org/W2084543849","https://openalex.org/W2106482772","https://openalex.org/W2162853743","https://openalex.org/W2355617666","https://openalex.org/W3124662447","https://openalex.org/W4213009331","https://openalex.org/W4300358774","https://openalex.org/W6604513520"],"related_works":["https://openalex.org/W1987732684","https://openalex.org/W2286465138","https://openalex.org/W637393809","https://openalex.org/W2808742736","https://openalex.org/W1526983901","https://openalex.org/W2340026615","https://openalex.org/W2020286551","https://openalex.org/W2482152136","https://openalex.org/W4367394264","https://openalex.org/W4207052104"],"abstract_inverted_index":{"Electronic":[0],"mail":[1],"has":[2],"become":[3],"the":[4,20,73,97,104,112,132],"most":[5,52],"popular,":[6],"frequently-used":[7],"and":[8,14,24,31,84,103,118,168],"powerful":[9],"medium":[10],"for":[11,165],"quicker":[12],"personal":[13],"business":[15],"communications.":[16],"However,":[17,94],"one":[18],"of":[19,38,100,147],"common":[21],"security":[22],"issues":[23],"annoying":[25],"problems":[26],"faced":[27],"by":[28,72,131],"email":[29,40,53,166],"users":[30],"organizations":[32],"is":[33,56,142],"receiving":[34],"a":[35,127,145,162],"large":[36],"number":[37,146],"unsolicited":[39],"messages,":[41],"known":[42],"as":[43],"spam":[44,152,169],"emails,":[45],"every":[46],"day.":[47],"A":[48],"traditional":[49],"countermeasure":[50],"in":[51,107],"systems":[54],"nowadays":[55],"simple":[57],"filtering":[58],"mechanisms":[59],"that":[60,157],"can":[61,160],"block":[62],"or":[63],"quarantine":[64],"unwanted":[65],"emails":[66,102],"based":[67],"on":[68,144],"some":[69,87],"keywords":[70],"defined":[71],"user.":[74],"These":[75],"filters":[76],"require":[77],"continual":[78,105],"effort":[79],"to":[80,90,96,110,121,150],"keep":[81],"them":[82],"relevant":[83],"current":[85],"with":[86],"extensions":[88],"proposed":[89],"improve":[91],"their":[92],"performance.":[93],"due":[95],"gigantic":[98],"volumes":[99],"received":[101],"change":[106],"spamming":[108],"techniques":[109],"bypass":[111],"implemented":[113],"solutions,":[114],"novel":[115,128],"automated":[116],"ideas":[117],"countermeasures":[119],"need":[120],"be":[122,161],"investigated.":[123],"This":[124,140],"paper":[125],"explores":[126],"algorithm":[129,138,141],"inspired":[130],"immune":[133],"system":[134],"called":[135],"dendritic":[136],"cell":[137],"(DCA).":[139],"evaluated":[143],"benchmark":[148],"datasets":[149],"detect":[151],"emails.":[153],"The":[154],"results":[155],"demonstrate":[156],"this":[158],"approach":[159],"promising":[163],"solution":[164],"classification":[167],"filtering.":[170]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
