Rapid detection of spammers through collaborative information sharing across multiple service providers
暂无分享,去创建一个
[1] Ram Dantu,et al. Socio-technical defense against voice spamming , 2007, TAAS.
[2] Akbar Ghaffarpour Rahbar,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[3] Lilian Mitrou,et al. Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment , 2016, Inf. Comput. Secur..
[4] Muhammad Ajmal Azad,et al. Caller-REP: Detecting unwanted calls with caller social strength , 2013, Comput. Secur..
[5] Muhammad Ajmal Azad,et al. Early identification of spammers through identity linking, social network and call features , 2017, J. Comput. Sci..
[6] Kang Li,et al. Privacy-Aware Collaborative Spam Filtering , 2009, IEEE Transactions on Parallel and Distributed Systems.
[7] Kai Hwang,et al. Collaborative Detection of DDoS Attacks over Multiple Network Domains , 2007, IEEE Transactions on Parallel and Distributed Systems.
[8] Adel Bouhoula,et al. Behavior-based approach to detect spam over IP telephony attacks , 2015, International Journal of Information Security.
[9] Dorgham Sisalem,et al. SDRS: A Voice-over-IP Spam Detection and Reaction System , 2008, IEEE Security & Privacy.
[10] Kai Hwang,et al. GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks , 2008, IEEE Transactions on Knowledge and Data Engineering.
[11] Matthew Roughan,et al. Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases , 2015, IEEE Transactions on Dependable and Secure Computing.
[12] Dongwook Shin,et al. Progressive multi gray-leveling: a voice spam protection algorithm , 2006, IEEE Network.
[13] Tomoaki Ohtsuki,et al. Novel Unsupervised SPITters Detection Scheme by Automatically Solving Unbalanced Situation , 2017, IEEE Access.
[14] Muhammad Ali Akbar,et al. Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony , 2012, Knowledge and Information Systems.
[15] Saurabh Bagchi,et al. Intrusion detection in voice over IP environments , 2009, International Journal of Information Security.
[16] P. Oscar Boykin,et al. Collaborative Spam Filtering Using E-Mail Networks , 2006, Computer.
[17] Roberta Presta,et al. An anomaly-based approach to the analysis of the social behavior of VoIP users , 2013, Comput. Networks.
[18] Vennila Ganesan,et al. Detection and prevention of spam over Internet telephony in Voice over Internet Protocol networks using Markov chain with incremental SVM , 2017, Int. J. Commun. Syst..
[19] Jürgen Quittek,et al. On Spam over Internet Telephony (SPIT) Prevention , 2008, IEEE Communications Magazine.