<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462017000400771</article-id>
<article-id pub-id-type="doi">10.13053/cys-21-4-2593</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Content-based SMS Classification: Statistical Analysis for the Relationship between Number of Features and Classification Performance]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Waheeb]]></surname>
<given-names><![CDATA[Waddah]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
<xref ref-type="aff" rid="Aaf"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ghazali]]></surname>
<given-names><![CDATA[Rozaida]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universiti Tun Hussein  ]]></institution>
<addr-line><![CDATA[Batu Pahat Johor]]></addr-line>
<country>Malaysia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Hodeidah University  ]]></institution>
<addr-line><![CDATA[Alduraihimi Hodeidah]]></addr-line>
<country>Yemen</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2017</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2017</year>
</pub-date>
<volume>21</volume>
<numero>4</numero>
<fpage>771</fpage>
<lpage>785</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462017000400771&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462017000400771&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462017000400771&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: High dimensionality of the feature space is one of the difficulty that affect short message service (SMS) classification performance. Some studies used feature selection methods to pick up some features, while other studies used the full extracted features. In this work, we aim to analyse the relationship between features size and classification performance. For that, a classification performance comparison was carried out between ten features sizes selected by varies feature selection methods. The used methods were chi-square, Gini index and information gain (IG). Support vector machine was used as a classifier. Area Under the ROC (Receiver Operating Characteristics) Curve between true positive rate and false positive rate was used to measure the classification performance. We used the repeated measures ANOVA at p &lt; 0.05 level to analyse the performance. Experimental results showed that IG method outperformed the other methods in all features sizes. The best result was with 50% of the extracted features. Furthermore, the results explicitly showed that using larger features size in the classification does not mean superior performance but sometimes leads to less classification performance. Therefore, feature selection step should be used. By reducing the used features for the classification, without degrading the classification performance, it means reducing memory usage and classification time.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Short text classification]]></kwd>
<kwd lng="en"><![CDATA[content-based SMS spam filtering]]></kwd>
<kwd lng="en"><![CDATA[SMS classification]]></kwd>
<kwd lng="en"><![CDATA[dimension reduction]]></kwd>
<kwd lng="en"><![CDATA[feature selection]]></kwd>
<kwd lng="en"><![CDATA[support vector machine]]></kwd>
<kwd lng="en"><![CDATA[ANOVA]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Almeida]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Hidalgo]]></surname>
<given-names><![CDATA[J. M. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Silva]]></surname>
<given-names><![CDATA[T. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards SMS spam filtering: Results under a new dataset]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Almeida]]></surname>
<given-names><![CDATA[T. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hidalgo]]></surname>
<given-names><![CDATA[J. M. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Yamakami]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Contributions to the study of sms spam filtering: New collection and results]]></source>
<year>2011</year>
<conf-name><![CDATA[ Proceedings of the 11th ACM Symposium on Document Engineering, DocEng &#8217;11]]></conf-name>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>259&#8211;262</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alzahrani]]></surname>
<given-names><![CDATA[A. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghorbani]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Sms-based mobile botnet detection module]]></source>
<year>2016</year>
<conf-name><![CDATA[ 2016 6th International Conference on IT Convergence and Security (ICITCS)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1&#8211;7</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andriotis]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Oikonomou]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Messaging Activity Reconstruction with Sentiment Polarity Identification]]></source>
<year>2015</year>
<page-range>475&#8211;486</page-range><publisher-loc><![CDATA[Cham ]]></publisher-loc>
<publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boser]]></surname>
<given-names><![CDATA[B. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Guyon]]></surname>
<given-names><![CDATA[I. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Vapnik]]></surname>
<given-names><![CDATA[V. N.]]></given-names>
</name>
</person-group>
<source><![CDATA[A training algorithm for optimal margin classifiers]]></source>
<year>1992</year>
<conf-name><![CDATA[ Proceedings of the Fifth Annual Workshop on Computational Learning Theory, COLT &#8217;92]]></conf-name>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>144&#8211;152</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carrera-Trejo]]></surname>
<given-names><![CDATA[J. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Sidorov]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Miranda-Jiménez]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Moreno Ibarra]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Cadena Martínez]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Latent dirichlet allocation complement in the vector space model for multi-label text classification]]></article-title>
<source><![CDATA[International Journal of Combinatorial Optimization Problems and Informatics]]></source>
<year>2015</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>7&#8211;19</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[C.-C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[C.-J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Libsvm: A library for support vector machines]]></article-title>
<source><![CDATA[ACM Trans. Intell. Syst. Technol.]]></source>
<year>2011</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>27:1&#8211;27:27</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Kan]]></surname>
<given-names><![CDATA[M.-Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Creating a live, public short message service corpus: the nus sms corpus]]></article-title>
<source><![CDATA[Language Resources and Evaluation]]></source>
<year>2013</year>
<volume>47</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>299&#8211;335</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="book">
<collab>Cisco</collab>
<source><![CDATA[SMS spam and fraud prevention]]></source>
<year>2016</year>
<publisher-name><![CDATA[Cisco]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cormack]]></surname>
<given-names><![CDATA[G. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Gómez Hidalgo]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánz]]></surname>
<given-names><![CDATA[E. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Spam filtering for short messages]]></source>
<year>2007</year>
<conf-name><![CDATA[ Proceedings of the Sixteenth ACM Conference on Conference on Information and Knowledge Management, CIKM &#8217;07]]></conf-name>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>313&#8211;320</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cormack]]></surname>
<given-names><![CDATA[G. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Hidalgo]]></surname>
<given-names><![CDATA[J. M. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánz]]></surname>
<given-names><![CDATA[E. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Feature engineering for mobile (sms) spam filtering]]></source>
<year>2007</year>
<conf-name><![CDATA[ Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR &#8217;07]]></conf-name>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>871&#8211;872</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Delany]]></surname>
<given-names><![CDATA[S. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Buckley]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Greene]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[SMS spam filtering: Methods and data]]></article-title>
<source><![CDATA[Expert Systems with Applications]]></source>
<year>2012</year>
<volume>39</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>9899&#8211;9908</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new spam short message classification]]></article-title>
<source><![CDATA[2009 First International Workshop on Education Technology and Computer Science]]></source>
<year>2009</year>
<volume>2</volume>
<page-range>168&#8211;171</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ezpeleta]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Zurutuza]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Hidalgo]]></surname>
<given-names><![CDATA[J. M. G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Short messages spam filtering using personality recognition]]></source>
<year>2016</year>
<conf-name><![CDATA[ Proceedings of the 4th Spanish Conference on Information Retrieval, CERI &#8217;16]]></conf-name>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>7:1&#8211;7:7</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Forman]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An extensive empirical study of feature selection metrics for text classification]]></article-title>
<source><![CDATA[Journal of machine learning research]]></source>
<year>2003</year>
<volume>3</volume>
<page-range>1289&#8211;1305</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gómez Hidalgo]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bringas]]></surname>
<given-names><![CDATA[G. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánz]]></surname>
<given-names><![CDATA[E. P.]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[F. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Content based sms spam filtering]]></source>
<year>2006</year>
<conf-name><![CDATA[ Proceedings of the 2006 ACM Symposium on Document Engineering, DocEng &#8217;06]]></conf-name>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>107&#8211;114</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goswami]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Vatsa]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Automated Spam Detection in Short Text Messages]]></source>
<year>2016</year>
<page-range>85&#8211;98</page-range><publisher-loc><![CDATA[New Delhi ]]></publisher-loc>
<publisher-name><![CDATA[Springer India]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="">
<collab>GSMA</collab>
<source><![CDATA[SMS, spam and mobile messaging attacks: introduction, trends and examples]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Kamber]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Pei]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Data mining: concepts and techniques]]></source>
<year>2011</year>
<publisher-name><![CDATA[Morgan Kaufmann]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Japkowicz]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Evaluating learning algorithms: a classification perspective]]></source>
<year>2011</year>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Joachims]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA[Text categorization with Support Vector Machines: Learning with many relevant features]]></source>
<year>1998</year>
<page-range>137&#8211;142</page-range><publisher-loc><![CDATA[Berlin, Heidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer Berlin Heidelberg]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kaya]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ertu&#287;rul]]></surname>
<given-names><![CDATA[O. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel feature extraction approach in SMS spam filtering for mobile communication: one-dimensional ternary patterns]]></article-title>
<source><![CDATA[Security and Communication Networks]]></source>
<year>2016</year>
<volume>9</volume>
<numero>17</numero>
<issue>17</issue>
<page-range>4680&#8211;4690</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kearney]]></surname>
<given-names><![CDATA[A. T]]></given-names>
</name>
</person-group>
<source><![CDATA[The mobile economy 2013]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lichman]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[UCI machine learning repository]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[The application of data mining in the classification of spam messages]]></source>
<year>2012</year>
<conf-name><![CDATA[ International Conference on Computer Science and Information Processing (CSIP)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1315&#8211;1317</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Loh]]></surname>
<given-names><![CDATA[H. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Imbalanced text classification: A term weighting approach]]></article-title>
<source><![CDATA[Expert Systems with Applications]]></source>
<year>2009</year>
<volume>36</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>690 &#8211; 701</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ma]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Mobile Spam Filtering base on BTM Topic Model]]></source>
<year>2017</year>
<page-range>657&#8211;665</page-range><publisher-loc><![CDATA[Cham ]]></publisher-loc>
<publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ng]]></surname>
<given-names><![CDATA[H. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Goh]]></surname>
<given-names><![CDATA[W. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Low]]></surname>
<given-names><![CDATA[K. L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Feature selection, perceptron learning, and a usability case study for text categorization]]></source>
<year>1997</year>
<conf-name><![CDATA[ Proceedings of the 20th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR &#8217;97]]></conf-name>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>67&#8211;73</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nuruzzaman]]></surname>
<given-names><![CDATA[M. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Choi]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Independent and personal sms spam filtering]]></source>
<year>2011</year>
<conf-name><![CDATA[ 2011 IEEE 11th International Conference on Computer and Information Technology]]></conf-name>
<conf-loc> </conf-loc>
<page-range>429&#8211;435</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Porter]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An algorithm for suffix stripping]]></article-title>
<source><![CDATA[Program]]></source>
<year>1980</year>
<volume>14</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>130&#8211;137</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rafique]]></surname>
<given-names><![CDATA[M. Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Abulaish]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Graph-based learning model for detection of SMS spam on smart phones]]></source>
<year>2012</year>
<conf-name><![CDATA[ 8th International Wireless Communications and Mobile Computing Conference (IWCMC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1046&#8211;1051</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salton]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Wong]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[C. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A vector space model for automatic indexing]]></article-title>
<source><![CDATA[Commun. ACM]]></source>
<year>1975</year>
<volume>18</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>613&#8211;620</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sebastiani]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Machine learning in au-tomated text categorization]]></article-title>
<source><![CDATA[ACM Comput. Surv.]]></source>
<year>2002</year>
<volume>34</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1&#8211;47</page-range></nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Qu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel feature selection algorithm for text categorization]]></article-title>
<source><![CDATA[Expert Systems with Applications]]></source>
<year>2007</year>
<volume>33</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1 &#8211; 5</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sohn]]></surname>
<given-names><![CDATA[D.-N.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[J.-T.]]></given-names>
</name>
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[K.-S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rim]]></surname>
<given-names><![CDATA[H.-C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Content-based mobile spam classification using stylistically motivated features]]></article-title>
<source><![CDATA[Pattern Recognition Letters]]></source>
<year>2012</year>
<volume>33</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>364 &#8211; 369</page-range></nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sulaiman]]></surname>
<given-names><![CDATA[N. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Jali]]></surname>
<given-names><![CDATA[M. Z.]]></given-names>
</name>
</person-group>
<source><![CDATA[A New SMS Spam Detection Method Using Both Content-Based and Non Content-Based Features]]></source>
<year>2016</year>
<page-range>505&#8211;514</page-range><publisher-loc><![CDATA[Cham ]]></publisher-loc>
<publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tagg]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[A corpus linguistics study of SMS text messaging]]></source>
<year>2009</year>
<publisher-name><![CDATA[The University of Birmingham]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Uysal]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Gunal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ergin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Gunal]]></surname>
<given-names><![CDATA[E. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[A novel framework for sms spam filtering]]></source>
<year>2012</year>
<conf-name><![CDATA[ 2012 International Symposium on Innovations in Intelligent Systems and Applications]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1&#8211;4</page-range></nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Uysal]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Gunal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ergin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sora Gunal]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The impact of feature extraction and selection on sms spam filtering]]></article-title>
<source><![CDATA[Elektronika ir Elektrotechnika]]></source>
<year>2012</year>
<volume>19</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>67&#8211;72</page-range></nlm-citation>
</ref>
<ref id="B40">
<label>40</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vapnik]]></surname>
<given-names><![CDATA[V. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Chervonenkis]]></surname>
<given-names><![CDATA[A. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On the uniform convergence of relative frequencies of events to their probabilities]]></article-title>
<source><![CDATA[Theory of Probability and Its Applications]]></source>
<year>1971</year>
<volume>16</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>264&#8211;280</page-range></nlm-citation>
</ref>
<ref id="B41">
<label>41</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Waheeb]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<source><![CDATA[The performance of soft computing techniques on content-based SMS spam filtering]]></source>
<year>2015</year>
<publisher-name><![CDATA[Universiti Tun Hussein Onn Malaysia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<label>42</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Waheeb]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghazali]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Deris]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Content-based sms spam filtering based on the scaled conjugate gradient backpropagation algorithm]]></source>
<year>2015</year>
<conf-name><![CDATA[ 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>675&#8211;680</page-range></nlm-citation>
</ref>
<ref id="B43">
<label>43</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Pedersen]]></surname>
<given-names><![CDATA[J. O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A comparative study on feature selection in text categorization]]></article-title>
<source><![CDATA[Icml]]></source>
<year>1997</year>
<volume>97</volume>
<page-range>412&#8211;420</page-range></nlm-citation>
</ref>
<ref id="B44">
<label>44</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zobel]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Moffat]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Exploring the similarity space]]></article-title>
<source><![CDATA[SIGIR Forum]]></source>
<year>1998</year>
<volume>32</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>18&#8211;34</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
