Towards Measuring the Effectiveness of Telephony Blacklists
暂无分享,去创建一个
[1] Adam Doupé,et al. SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[2] Wenyuan Xu,et al. You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[3] Don R. Hush,et al. Network constraints and multi-objective optimization for one-class classification , 1996, Neural Networks.
[4] Aurélien Francillon,et al. SoK: Fraud in Telephony Networks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[5] Nan Jiang,et al. Isolating and analyzing fraud activities in a large cellular network via voice call graph analysis , 2012, MobiSys '12.
[6] Che-Wei Huang,et al. FrauDetector: A Graph-Mining-based Framework for Fraudulent Phone Call Detection , 2015, KDD.
[7] Xiao Su,et al. Detection and filtering Spam over Internet Telephony — a user-behavior-aware intermediate-network-based approach , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[8] Mark Collier,et al. Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions , 2006 .
[9] Juan Enrique Ramos,et al. Using TF-IDF to Determine Word Relevance in Document Queries , 2003 .
[10] Ram Dantu,et al. Detecting Spam in VoIP Networks , 2005, SRUTI.
[11] Patrick Traynor,et al. AuthentiCall: Efficient Identity and Content Authentication for Phone Calls , 2017, USENIX Security Symposium.
[12] Ramana Rao Kompella,et al. PhishNet: Predictive Blacklisting to Detect Phishing Attacks , 2010, 2010 Proceedings IEEE INFOCOM.
[13] Daniel Povey,et al. The Kaldi Speech Recognition Toolkit , 2011 .
[14] Aurélien Francillon,et al. The role of phone numbers in understanding cyber-crime schemes , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.
[15] Adam Doupé,et al. Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation , 2016, 2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT).
[16] Vincent D. Blondel,et al. A survey of results on mobile phone datasets analysis , 2015, EPJ Data Science.
[17] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.
[18] José María Gómez Hidalgo,et al. Content based SMS spam filtering , 2006, DocEng '06.
[19] Patrick Traynor,et al. PinDr0p: using single-ended audio features to determine call provenance , 2010, CCS '10.
[20] Danah Boyd,et al. Detecting Spam in a Twitter Network , 2009, First Monday.
[21] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[22] Roger Piqueras Jover,et al. Crime scene investigation: SMS spam data analysis , 2012, IMC '12.
[23] Martín Abadi,et al. Heat-seeking honeypots: design and experience , 2011, WWW.
[24] Andrew McCallum,et al. Optimizing Semantic Coherence in Topic Models , 2011, EMNLP.
[25] Qiang Yang,et al. SMS Spam Detection Using Noncontent Features , 2012, IEEE Intelligent Systems.
[26] Jens Grossklags,et al. “Hello. This is the IRS calling.”: A case study on scams, extortion, impersonation, and phone spoofing , 2017, 2017 APWG Symposium on Electronic Crime Research (eCrime).
[27] Nick Nikiforakis,et al. Dial One for Scam: A Large-Scale Analysis of Technical Support Scams , 2016, NDSS.
[28] Patrick Traynor,et al. AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels , 2016, USENIX Security Symposium.
[29] Terry Nelms. Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud , 2017 .
[30] Mustaque Ahamad,et al. Phoneypot: Data-driven Understanding of Telephony Threats , 2015, NDSS.
[31] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[32] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[33] Vern Paxson,et al. On the Potential of Proactive Domain Blacklisting , 2010, LEET.
[34] Hyung-Jong Kim,et al. DEVS-Based modeling of VoIP spam callers' behavior for SPIT level calculation , 2009, Simul. Model. Pract. Theory.
[35] Roberta Presta,et al. An anomaly-based approach to the analysis of the social behavior of VoIP users , 2013, Comput. Networks.
[36] Nick Feamster,et al. Can DNS-Based Blacklists Keep Up with Bots? , 2006, CEAS.
[37] Haesun Park,et al. CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation , 2007, CEAS.
[38] Christian Rossow,et al. Empirical research of IP blacklists , 2008, ISSE.
[39] T. Landauer,et al. Indexing by Latent Semantic Analysis , 1990 .