<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Bot Algorithms for Social Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nataliia Liubchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Podorozhniak</string-name>
          <email>andriipodorozhniak@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Oliinyk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Technical University “Kharkiv Polytechnic Institute”</institution>
          ,
          <addr-line>Kyrpychova str. 2, Kharkiv, 61002</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <abstract>
        <p>There are many social media and messengers in use today, because of the situation with the corona virus pandemic the social media have become an integral part of our daily lives, including work activities. However, there is a lot of unnecessary information that comes to users in large quantities, so the problem of dealing with spam messages on social networks and messengers is now very relevant. By spam we mean any messages that a particular user (person, company, etc.) considers unnecessary in a particular text stream. The project is dedicated to solving the scientific problem of detecting spam messages in the text context of any social network or messenger using anti-spam bot that is based on various spam detection algorithms. Four algorithms were implemented and investigated: an algorithm using naive Bayesian classifier, support vector method, multilayer perceptron neural network and convolutional neural network. The main idea is to develop a complex spam detection algorithm for anti-spam bot, which is fast and easy to implement in a messenger (social network). We propose to use the application of the obtained solutions for IT companies. The developed complex algorithm can be used not only to remove spam, but also, for example, to monitor chats for messages that are important to a particular user. Spam, social network, antispam bot, support-vector machine, convolutional neural network In 2019, the percentage of spam in global mail traffic was 56.51%, which is 4.03% more than in</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>2021 Copyright for this paper by its authors.</p>
      <p>Unlike inboxes, most social media chat rooms do not have built-in anti-spam algorithms. Although
there is not as much spam in chat rooms as in email services, the cost of an extra message can cost a
particular firm a lot of money. For example, when a spam message contains a link to a resource that
infects a user's computer and penetrates a company's internal network. The effects of such
interference can be very costly for a firm. Therefore, there is the issue of monitoring the incoming text
stream in social networks and messengers.</p>
      <p>By being able to filter spam messages in messengers and social networks, firms can save their
employees' time and prevent losses information.</p>
      <p>To solve the problem we were used algorithms using support vector method, convolutional neural
network and naive Bayesian classifier. An approach with integrated application of the investigated
algorithms can begin to solve the problem of spam in social networks and messengers.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Characterization of spam and how to deal with it</title>
      <p>
        Spam is a mass mailing of correspondence of an advertising or other types of spam, to the people
who have not expressed a desire to receive it [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The various types of spam generally include:
advertisements; Nigerian emails; phishing; and other types of spam. Other types of spam include:
mass mailings of letters with religious content; mass mailings to put the mail system out of operation
(to bring the system into service failure); mass mailings on behalf of another person in order to cause
a negative attitude towards him or her; mass mailings of letters containing computer viruses (for their
initial distribution).
      </p>
      <p>
        The basic ways of spam distribution today include [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]: e-mail; Usernet; messengers; spoofing of
Internet traffic; SMS messages; phone call, etc.
      </p>
      <p>Spam messages cost the perpetrator virtually nothing, but the recipient of the spam usually has to
pay the ISP for the time used to receive the spam. Also, the massive proliferation of spam complicates
information systems and resources, with a very large amount of unnecessary loading.</p>
      <p>Due to the mass mailings, users are forced to spend extra time filtering messages. To avoid this,
users use anti-spam filters to save time. But spam filters can also accidentally erase an important
message by recognizing it as spam.</p>
      <p>The best way to deal with spam is to prevent spammers from getting hold of your email address.</p>
      <p>
        Auto-Spam detection software is called anti-spam filters. They can be used by end-users or on
servers. This software has two main approaches [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>1. The content of the message is analyzed, based on that it is concluded whether it is spam or
not. If a message is classified as spam, it can be flagged, moved to another folder or even deleted.
Such software can run both on the server and on the client computer. With this approach you don't
see the spam filtered, but you continue to pay the full cost for receiving it, because the anti-spam
software receives each spam message anyway (wasting your money) and only then decides
whether to show it or not.
2. It classifies the sender as a spammer without looking at the text of the message. This software
can only work on the server which directly receives the messages. With this approach it's possible
to reduce the cost - money is only spent on communicating with spam mailing programs (i.e.
refusing to accept the messages) and on contacting other servers (if any) for verification. The gain,
however, is not as great as you might expect. If the recipient refuses to accept the message, the
spammer program tries to bypass the protection and send it another way. Each such attempt has to
be repelled separately, which adds to the load on the server.</p>
      <p>
        Existing methods of combating spam are based on known technologies of the classical Bayesian
approach [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the support vector machines [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the use of deep learning [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], etc., and on the
combination of known methods [
        <xref ref-type="bibr" rid="ref4 ref9">4, 9</xref>
        ] or the development of new approaches [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Results and discussions</title>
      <p>
        In this project we have discussed: the statistical Bayesian spam filtering method, application of
support vector machines, multilayer perceptron neural network and convolutional neural network to
create a complex anti-spam bot algorithm in social networks [
        <xref ref-type="bibr" rid="ref11">11, 12</xref>
        ].
      </p>
      <p>To implement the spam filtering algorithms we used Python 3.6 programming language, PyCharm
programming environment and Keras, NumPy, Sklearn and Pandas libraries [13, 14]. The simulation
was performed on a LifeBook E744 laptop with 8Gb RAM, an Intel Core i7 CPU (up to 3.2 GHz) and
an Intel HD Graphics 4600 video processor.</p>
      <p>The estimation of the probability of correct spam recognition was calculated as the ratio of
correctly recognized messages to the total number of messages (separately for training and test
samples). The estimate of the probability of erroneous recognition of spam was calculated as the ratio
of erroneously recognized messages to the total number of messages. Also, in addition to the
estimation of the probability of correct spam recognition for selected and proposed algorithms, we
have used an F1 assessment [15, 16].
3.1.</p>
    </sec>
    <sec id="sec-4">
      <title>Data preparation</title>
    </sec>
    <sec id="sec-5">
      <title>Testing algorithms</title>
      <p>A naive Bayesian classifier is a probabilistic classifier that uses Bayes' theorem to determine the
probability of an observation (sample item) belonging to one of the classes, assuming (naive)
independence of the variables [20]. The use cases of this method can be: recognition of spam, analysis
of emotional coloring of texts, identification of racism in a text selector, any information processing
system and so on.</p>
      <p>So, if based on the values of the variables it can be uniquely determined to which class an
observation belongs, the Bayesian classifier will report the probability of belonging to that class [21].</p>
      <p>In cases, where an observation can belong to different classes with different probabilities, the
result of the classifier will be a vector whose components are the probabilities of belonging to one
class or another [22].</p>
      <p>The advantage of this approach is that the sample size requirements are reduced from exponential
to linear. The disadvantage is that the model is accurate only when the assumption of independence is
satisfied. Otherwise, strictly speaking, the calculated probabilities are no longer accurate (and even
more, their sum may not equal one, making it necessary to normalize the result).</p>
      <p>The results of the Bayesian classifier of correct spam detection for the training and test samples are
shown in Figure 2.</p>
      <p>In machine learning, Support Vector Machines (SVM) is a method of data analysis for
classification and regression analysis using supervised learning models with associated learning
algorithms, called support vector machines [23, 24]. For a given set of training samples, each marked
as appropriate to one or the other of two categories, the SVM training algorithm builds a model that
assigns new samples to one or the other category, making it a probabilistic binary linear classifier.
The SVM model is a representation of samples as points in space, reflected in such a way that
samples from individual categories are separated by a net gap, which is the widest. New samples are
then mapped into the same space and predictions are made about their category membership based on
which side of the gap they fall on Figure 3.</p>
      <p>But there are situations when the data cannot be separated linearly. For this reason, it was
proposed to map the primary finite-dimensional space to a space of much higher dimension,
presumably making the separation simpler in that space Figure 4.</p>
      <p>The results of the SVM in the form of estimating the probability of correct spam recognition for
training and test samples are shown in Figure 5.</p>
      <p>Perceptron is a mathematical or computer model of information perception by the brain
(cybernetic model of the brain), proposed by Frank Rosenblatt in 1957 and implemented in the form
of an electronic machine "Mark-1". The main mathematical problem he is able to cope with is the
linear separation of arbitrary nonlinear sets [18].</p>
      <p>The perceptron consists of three types of elements, namely: the signals coming from the sensors
are transmitted to the associative elements, and then to the responders. Thus, perceptrons allow you to
create a set of "associations" between the input stimuli and the required response at the output.
Biologically, this corresponds to the transformation, for example, of visual information into a
physiological response of motor neurons.</p>
      <p>In our case, a perceptron multilayer neural network was used, which consists of 4 layers, namely: 1
input, 2 hidden and 1 output, as shown in Figure 6.</p>
      <p>Estimation of the probability of spam detection in the test sample depending on the number of
epochs of learning the perceptron neural network is shown in Figure 7.</p>
      <p>The obtained results of the perceptron neural network (without the effect of retraining) in the form
of estimating the probability of correct spam recognition for training and test samples are shown in
Figure 8.</p>
      <p>Convolutional neural network, (CNN) – special architecture of artificial neural networks, proposed
by Jan Lekun in 1988 [25] and aimed at effective pattern recognition, is part of Deep learning
technologies. The structure of the network is unidirectional, without feedback, fundamentally
multilayered.</p>
      <p>The network architecture got its name due to the presence of the convolution operation, the
essence of which is that each image fragment is multiplied by the convolution matrix (core) element
by element, and the result is summed and recorded in a similar position of the original image [26].</p>
      <p>The structure of the CNN we used is shown in Figure 9.</p>
      <p>An estimate of the probability of recognizing spam in a test sample depending on the number of
epochs of CNN training is shown in Figure 10.</p>
      <p>The results obtained by CNN (for 10 learning epochs) in the form of an estimate of the probability
of correct spam recognition for training and test samples are shown in Figure 11.</p>
      <p>Also, in addition to the usual accuracy metric for evaluating selected algorithms, we used F1 score.</p>
      <p>Accuracy is a ratio between the correctly classified samples to the total number of samples.
Nowadays it is the most used metric of classification performance.</p>
      <p>TP  TN (1)
Accuracy </p>
      <p>TP  FN  TN  FP
where TP – (True Positive) correctly classified positive sample;</p>
      <p>FN – (False Negative) the sample is positive but it is classified as negative;
TN – (True Negative) the sample is negative and it is classified as negative;</p>
      <p>FP – (False Positive) the sample is negative but it is classified as positive.
The results of the tests using accurancy metric are shown at the Table 1.</p>
    </sec>
    <sec id="sec-6">
      <title>Antispam bot algorithm</title>
      <p>After analyzing the results of testing the statistical Bayesian method of spam filtering, the method
of reference vectors, multilayer perceptron neural network and convolutional neural network, the
three best accuracy algorithms were selected: Bayesian method of spam filtering, the method of
reference vectors and convolutional.</p>
      <p>For the anti-spam bot on the social network, we propose a complex algorithm, which includes the
parallel operation of the selected algorithms with the decision on the presence of spam by a majority
scheme of two out of three, as shown in Figure 13.</p>
      <p>The proposed complex algorithm shown in Figure 13 uses as inputs for majority scheme the
solutions of the Bayesian spam filtering method, support vector method and convolutional neural
network algorithms. To match the outputs of the algorithmic blocks (0… 1) with the inputs of the
majority scheme (0, 1), their binarization with a threshold of 0.95 is performed. The results of the
complex algorithm of antispam bot in the form of an estimate of the probabilistic of correct spam
recognition for the test samples are shown in Figure 14.</p>
      <p>The probability of correct spam recognition for the proposed antispam bot algorithm is much
better than the results obtained for each of the researched most popular algorithms separately. Perhaps
such a large difference is due to relatively small sample data for training and testing</p>
      <p>The antispam bot’s analysis time of each of the tested messages was less than 0.5 sec, which
allows it to be used in real-time systems.</p>
      <p>The main problem with classification accuracy in multiclass tasks is that it is sensitive to the
imbalanced data. It is possible to get high results when the number of samples in one class more than
in others, but it doesn’t mean that in a real world a neural network will classify all classes correctly
with the same value of success.</p>
      <p>F1 score is calculated from the precision and recall of the test, where the precision is the number of
true positive results divided by the number of all positive results, including those not identified
correctly, and the recall is the number of true positive results divided by the number of all samples
that should have been identified as positive.</p>
      <p>The defenition of precision, recall and F1 score made in accordance with the formulas [15]:
TP (2)
(3)
(4)</p>
      <p>In the F1 score metric, the proposed majority algorithm also showed the best results.</p>
    </sec>
    <sec id="sec-7">
      <title>4. Conclusions</title>
      <p>As part of this research, the scientific and applied problem of research and development antispam
bot algorithm for the textual context of social networking messengers was solved by the example of
Kaggle SMS Spam Collection Dataset using chatbots in the popular messenger Telegram.</p>
      <p>Considered the relevance of spam detection and possible problems due to spam intervention.</p>
      <p>A comparative analysis of the three most popular methods for recognizing spam messages was
performed and it was shown that the most effective method is the support vectors algorithm with
accuracy only 0.989. In second place was the algorithm based on the convolutional neural network
with accuracy 0.985. In third place was the algorithm based on the naive Bayes classifier with
accuracy 0.982. The fourth place for our case was taken by the multilayer perceptron neural network
with accuracy 0.979.</p>
      <p>It was developed the program to filter spam in the messenger Telegram, that uses the majority
combination three implemented better algorithms for spam recognition. The created antispam bot has
accuracy 0.999, F1 score – 0.965 and can be used in real-time systems.</p>
    </sec>
    <sec id="sec-8">
      <title>5. References</title>
      <p>[12] V. Oliinyk, N. Liubchenko, A. Podorozhniak, Research of the method of complex spam
recognition in social networks, in: Proceedings of the ХІV International scientific-practical
conference of undergraduates and graduate students "Theoretical and practical research of young
scientists", Kharkiv, Ukraine, p. 8, 2020. URL:
http://web.kpi.kharkov.ua/masters/wpcontent/uploads/sites/135/2020/12/ TPRYS-2020.pdf.
[13] H. Lane, H. Hapke, C. Howard, Natural Language Processing in Action: Understanding,
analyzing, and generating text with Python, Manning Publication, New York, NY, 2019.
[14] Applications for Python, Python Software Foundation, 2019. URL:
https://www.python.org/about/apps/.
[15] A. S. Desuky, S. An Improved Hybrid Approach for Handling Class Imbalance Problem,
Arabian Journal for Science and Engineering, pp. 3853–3864, 2021.
https://doi.org/10.1007/s13369-021-05347-7
[16] H. Dalianis, Evaluation Metrics and Evaluation, In: Clinical Text Mining, Springer, Cham, 2018.</p>
      <p>https://doi.org/10.1007/978-3-319-78503-5_6.
[17] SMS Spam Collection Dataset [Data set], 2017. URL:
https://www.kaggle.com/uciml/sms-spamcollection-dataset.
[18] F. Chollet. Deep learning with python, Manning Publications, New York, 2018.
[19] I. Goodfellow, Y. Bengio, A. Courville, Deep learning, MIT Press, London, 2017.
[20] W. Zhang, F. Gao, Performance analysis and improvement of naïve Bayes in text classification
application, in: Proceedings of the IEEE Conference Anthology, China, pp. 1-4, 2013. URL:
https://doi.org/10.1109/ANTHOLOGY.2013.6784818.
[21] B. Liu, E. Blasch, Y. Chen, D. Shen, G. Chen, Scalable sentiment classification for Big Data
analysis using Naïve Bayes Classifier, in: Proceedings of the IEEE International Conference on
Big Data, USA, pp. 99-104, 2013. doi:10.1109/BigData.2013.6691740.
[22] A. McCallum, K. Nigam, A Comparison of Event Models for Naive Bayes Text Classification,
AAAI 1998: Learning for Text Categorization, pp. 41-48, 1998. URL:
http://courses.washington.edu/ling572/papers/mccallum1998_AAAI.pdf.
[23] L. Nguyen, Tutorial on Support Vector Machine, Applied and Computational Mathematics, 6
(4), 1–15, 2017. doi:10.11648/j.acm.s.2017060401.11.
[24] N. Sharma, Understanding the Mathematics behind Support Vector Machines, Heartbeat, 2020.</p>
      <p>URL:
https://heartbeat.fritz.ai/understanding-the-mathematics-behind-support-vector-machines5e20243d64d5.
[25] Y. LeCun, L. Bottou, Y. Bengio, P. Haffner, Gradient-based learning applied to document
recognition, in: Proceedings of the IEEE, 86 (11), pp. 2278–2324, 1998.
[26] V. Yaloveha, D. Hlavcheva, A. Podorozhniak, Usage of convolutional neural network for
multispectral image processing applied to the problem of detecting fire hazardous forest areas,
Advanced Information Systems, 3, 1, pp. 116-120, 2019. doi:10.20998/2522-9052.2019.1.19.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Vergelis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Shcherbakova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Sidorina</surname>
          </string-name>
          , T. Kulikova, Spam and phishing in 2019, April 8,
          <year>2020</year>
          . URL: https://securelist.ru/spam-report-2019/95727.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chaudhry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dhawan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tanwar</surname>
          </string-name>
          ,
          <article-title>Spam Detection in Social Network Using Machine Learning Approach</article-title>
          , in: U. Batra,
          <string-name>
            <given-names>N.</given-names>
            <surname>Roy</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          Panda (Eds.),
          <source>Data Science and Analytics. REDSET</source>
          <year>2019</year>
          , Communications in Computer and Information Science,
          <year>2020</year>
          , pp.
          <fpage>236</fpage>
          -
          <lpage>245</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-15-5830-6_
          <fpage>20</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Krithiga1</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Ilavarasan</surname>
          </string-name>
          ,
          <article-title>A Comprehensive Survey of Spam Profile Detection Methods in Online Social Networks</article-title>
          ,
          <source>Journal of Physics: Conference Series</source>
          ,
          <volume>1362</volume>
          ,
          <fpage>012111</fpage>
          ,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          -6596/1362/1/012111.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Ch. Zhao</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Xin</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Yang</surname>
            , Yu. Chen,
            <given-names>A Heterogeneous</given-names>
          </string-name>
          <string-name>
            <surname>Ensemble</surname>
          </string-name>
          <article-title>Learning Framework for Spam Detection in Social Networks with Imbalanced Data</article-title>
          ,
          <source>Applied Sciences</source>
          ,
          <volume>10</volume>
          ,
          <fpage>936</fpage>
          ,
          <year>2020</year>
          . doi:
          <volume>10</volume>
          .3390/app10030936.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] Ways to combat spam, Ostriv znan</article-title>
          ,
          <source>July</source>
          <volume>29</volume>
          ,
          <year>2008</year>
          . URL: http://korysne.ostriv.in.ua/publication/code-24F002FC35B8C/
          <fpage>list</fpage>
          -1420E79CF27.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Begriche</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Labiod</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Posterior</given-names>
            <surname>Distribution for Anti-Spam Bayesian</surname>
          </string-name>
          Statistical Model,
          <source>Conference on Network and Information Systems Security</source>
          , La Rochelle, France,
          <year>2011</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/SAR-SSI.
          <year>2011</year>
          .
          <volume>5931393</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Amayri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Bouguila</surname>
          </string-name>
          ,
          <article-title>A study of spam filtering using support vector machines</article-title>
          ,
          <source>Artificial Intelligence Review</source>
          ,
          <volume>34</volume>
          ,
          <fpage>73</fpage>
          -
          <lpage>108</lpage>
          ,
          <year>2010</year>
          . doi:
          <volume>10</volume>
          .1007/s10462-010-9166-x.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E. G.</given-names>
            <surname>Dada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Bassi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Chiroma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Abdulhamid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Adetunmbi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. E.</given-names>
            <surname>Ajibuwa</surname>
          </string-name>
          ,
          <article-title>Machine learning for email spam filtering: review, approaches</article-title>
          and open research problems, Heliyon,
          <volume>5</volume>
          ,
          <issue>e01802</issue>
          ,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .1016/j.heliyon.
          <year>2019</year>
          .e01802.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>P.</given-names>
            <surname>Navaney</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Dubey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rana</surname>
          </string-name>
          ,
          <article-title>SMS Spam Filtering Using Supervised Machine Learning Algorithms</article-title>
          ,
          <source>in: Proceedings of the IEEE 8th International Conference on Cloud Computing</source>
          , Data Science &amp;
          <string-name>
            <surname>Engineering</surname>
          </string-name>
          (Confluence), India, NSPEC Accession Number:
          <volume>18044645</volume>
          ,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .1109/CONFLUENCE.
          <year>2018</year>
          .
          <volume>8442564</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Yu. Parzhin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Kosenko</surname>
            , А. Podorozhniak, О. Malyeyeva,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Timofeyev</surname>
          </string-name>
          ,
          <article-title>Detector neural network vs connectionist ANNs, Neurocomputing</article-title>
          , Vol.
          <volume>414</volume>
          ,
          <year>2020</year>
          , pp.
          <fpage>191</fpage>
          -
          <lpage>203</lpage>
          . doi: https://doi.org/10.1016/j.neucom.
          <year>2020</year>
          .
          <volume>07</volume>
          .025.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V.</given-names>
            <surname>Oliinyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Podorozhniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Liubchenko</surname>
          </string-name>
          ,
          <article-title>Method of comprehensive spam recognition in social networks</article-title>
          ,
          <source>in: Proceedings of the 8th international scientific and technical conference Problems of informatization, Ukraine</source>
          , Vol.
          <volume>2</volume>
          , p.
          <fpage>39</fpage>
          ,
          <year>2020</year>
          . URL: http://repository.kpi.kharkov.ua/bitstream/KhPIPress/50565/1/Conference_NTU_KhPI_2020_
          <article-title>Problemy_informatyzatsii_Ch_2</article-title>
          .pdf.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>