Fighting Voice Spam with a Virtual Assistant Prototype.
暂无分享,去创建一个
[1] Adam Doupé,et al. SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[2] Aurélien Francillon,et al. Using chatbots against voice spam: Analyzing Lenny's effectiveness , 2017, SOUPS.
[3] Manos Antonakakis,et al. Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution , 2016, ESORICS.
[4] Robert Pienta,et al. Uncovering the Landscape of Fraud and Spam in the Telephony Channel , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).
[5] Patrick Traynor,et al. PinDr0p: using single-ended audio features to determine call provenance , 2010, CCS '10.
[6] Aurélien Francillon,et al. SoK: Fraud in Telephony Networks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[7] Aurélien Francillon,et al. The role of phone numbers in understanding cyber-crime schemes , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.
[8] Wenyuan Xu,et al. You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[9] Adam Doupé,et al. Users Really Do Answer Telephone Scams , 2019, USENIX Security Symposium.
[10] Jens Grossklags,et al. “Hello. This is the IRS calling.”: A case study on scams, extortion, impersonation, and phone spoofing , 2017, 2017 APWG Symposium on Electronic Crime Research (eCrime).
[11] Roberto Perdisci,et al. Towards Measuring the Effectiveness of Telephony Blacklists , 2018, NDSS.
[12] Nick Nikiforakis,et al. Dial One for Scam: A Large-Scale Analysis of Technical Support Scams , 2016, NDSS.
[13] L. Faulkner. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing , 2003, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.
[14] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM.
[15] Patrick Traynor,et al. AuthentiCall: Efficient Identity and Content Authentication for Phone Calls , 2017, USENIX Security Symposium.
[16] Adam Doupé,et al. Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation , 2016, 2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT).
[17] Manos Antonakakis,et al. Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers , 2018, WWW.
[18] Dawn Xiaodong Song,et al. A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[19] Patrick Traynor,et al. AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels , 2016, USENIX Security Symposium.
[20] Patrick Traynor,et al. Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators , 2020, NDSS.
[21] Mustaque Ahamad,et al. Phoneypot: Data-driven Understanding of Telephony Threats , 2015, NDSS.