SpamDetector: Detecting spam callers in Voice over Internet Protocol with graph anomalies
暂无分享,去创建一个
[1] Neminath Hubballi,et al. Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling , 2017, IEEE Transactions on Information Forensics and Security.
[2] Tomoaki Ohtsuki,et al. Novel Unsupervised SPITters Detection Scheme by Automatically Solving Unbalanced Situation , 2017, IEEE Access.
[3] Khaled Salah,et al. Clustering VoIP caller for SPIT identification , 2016, Secur. Commun. Networks.
[4] Maitreya Natu,et al. VoIP Profiler: Profiling Voice over IP User Communication Behavior , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[5] Adam Doupé,et al. SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[6] Neminath Hubballi,et al. VoIPFD: Voice over IP flooding detection , 2016, 2016 Twenty Second National Conference on Communication (NCC).
[7] Muhammad Ajmal Azad,et al. Caller-REP: Detecting unwanted calls with caller social strength , 2013, Comput. Secur..
[8] Iwao Sasase,et al. SPIT callers detection with unsupervised Random Forests classifier , 2013, 2013 IEEE International Conference on Communications (ICC).
[9] Christos Faloutsos,et al. Anomaly, event, and fraud detection in large network datasets , 2013, WSDM.
[10] Y. Elovici,et al. Strangers Intrusion Detection - Detecting Spammers and Fake Proles in Social Networks Based on Topology Anomalies , 2012 .
[11] Richi Nayak,et al. Analyzing the Effectiveness of Graph Metrics for Anomaly Detection in Online Social Networks , 2012, WISE.
[12] Xinyuan Wang,et al. Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks , 2011, SecureComm.
[13] Marko Bajec,et al. An expert system for detecting automobile insurance fraud using social network analysis , 2011, Expert Syst. Appl..
[14] Radu State,et al. Labeled VoIP Data-Set for Intrusion Detection Evaluation , 2010, EUNICE.
[15] Saurabh Bagchi,et al. Spam detection in voice-over-IP calls through semi-supervised clustering , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[16] Nisheeth Shrivastava,et al. Mining (Social) Network Graphs to Detect Random Link Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[17] Himanshu Dwivedi. Hacking VoIP: Protocols, Attacks, and Countermeasures , 2008 .
[18] Xuxian Jiang,et al. Billing Attacks on SIP-Based VoIP Systems , 2007, WOOT.
[19] Zhi-Li Zhang,et al. SIP-based VoIP traffic behavior profiling and its applications , 2007, MineNet '07.
[20] Ram Dantu,et al. Socio-technical defense against voice spamming , 2007, TAAS.
[21] Haesun Park,et al. CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation , 2007, CEAS.
[22] Christos Faloutsos,et al. Detecting Fraudulent Personalities in Networks of Online Auctioneers , 2006, PKDD.
[23] Dongwook Shin,et al. Progressive multi gray-leveling: a voice spam protection algorithm , 2006, IEEE Network.
[24] Marit Hansen,et al. Developing a Legally Compliant Reachability Management System as a Countermeasure against SPIT 1 , 2006 .
[25] Ram Dantu,et al. Detecting Spam in VoIP Networks , 2005, SRUTI.
[26] Pan Wen-feng. A Survey of Content-based Anti-spam Email Filtering , 2005 .