Uncovering the Landscape of Fraud and Spam in the Telephony Channel
暂无分享,去创建一个
Robert Pienta | Hassan A. Kingravi | David Dewey | Aude Marzuoli | H. Kingravi | A. Marzuoli | Robert S. Pienta | David Dewey
[1] C. Elkan,et al. Topic Models , 2008 .
[2] Mustaque Ahamad,et al. Phoneypot: Data-driven Understanding of Telephony Threats , 2015, NDSS.
[3] Peter Wiemer-Hastings,et al. Latent semantic analysis , 2004, Annu. Rev. Inf. Sci. Technol..
[4] M. Weatherford,et al. Mining for fraud , 2002 .
[5] Che-Wei Huang,et al. FrauDetector: A Graph-Mining-based Framework for Fraudulent Phone Call Detection , 2015, KDD.
[6] Andreas Christmann,et al. Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.
[7] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[8] Nello Cristianini,et al. Kernel Methods for Pattern Analysis , 2003, ICTAI.
[9] Vern Paxson,et al. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.
[10] Scott P. Robertson,et al. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 1991 .
[11] Daniel Povey,et al. The Kaldi Speech Recognition Toolkit , 2011 .
[12] Allan R. Wilks,et al. Fraud Detection in Telecommunications: History and Lessons Learned , 2010, Technometrics.
[13] Bernhard Schölkopf,et al. Kernel Principal Component Analysis , 1997, ICANN.
[14] Juan Enrique Ramos,et al. Using TF-IDF to Determine Word Relevance in Document Queries , 2003 .
[15] Michael I. Jordan,et al. On Spectral Clustering: Analysis and an algorithm , 2001, NIPS.
[16] S. Dumais. Latent Semantic Analysis. , 2005 .
[17] Patrick Traynor,et al. PinDr0p: using single-ended audio features to determine call provenance , 2010, CCS '10.
[18] Mehran Sahami,et al. Text Mining: Classification, Clustering, and Applications , 2009 .
[19] Martijn Onderwater,et al. Detecting unusual user proles with outlier detection techniques , 2010 .