Author:
Chaisamran Noppawat,Okuda Takeshi,Yamaguchi Suguru
Publisher
Information Processing Society of Japan
Reference19 articles.
1. [1] Hansen, M., Hansen, M., Moller, J., Rohwer, T., Tolkmit, C. and Waack, H.: Developing a Legally Compliant Reachability Management System as a Countermeasure against SPIT, 3rd Annual VoIP Security Workshop (2006).
2. [2] Golbeck, J. and Hendler, J.: Inferring binary trust relationships in Web-based social networks, ACM Trans. Internet Technol., Vol.6, No.4, pp.497-529 (online), DOI: 10.1145/1183463.1183470 (2006).
3. [3] Watts, D.J.: Small worlds: The dynamics of networks between order and randomness, Princeton University Press, Princeton, NJ (1999).
4. [4] Leskovec, J. and Horvitz, E.: Planetary-scale views on a large instant-messaging network, Proc. 17th International Conference on World Wide Web, WWW '08, New York, NY, USA, ACM, pp.915-924 (online), DOI: 10.1145/1367497.1367620 (2008).
5. [5] Rosenberg, J. and Jennings, C.: RFC 5039: The Session Initiation Protocol (SIP) and Spam (2008).
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. VoIP Spam Detection using Machine Learning;2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS);2022-05-25
2. Robocalling: STIRRED AND SHAKEN! - An Investigation of Calling Displays on Trust and Answer Rates;Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems;2020-04-21
3. Two-stage SPIT detection scheme with betweenness centrality and social trust;IEICE Communications Express;2015
4. Unsupervised Clustering-based SPITters Detection Scheme;Journal of Information Processing;2015