{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:55:45Z","timestamp":1743033345402,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319938028"},{"type":"electronic","value":"9783319938035"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93803-5_30","type":"book-chapter","created":{"date-parts":[[2018,6,9]],"date-time":"2018-06-09T18:33:58Z","timestamp":1528569238000},"page":"314-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel SPITters Detection Approach with Unsupervised Density-Based Clustering"],"prefix":"10.1007","author":[{"given":"Jianzhong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jingjing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jingdong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,10]]},"reference":[{"key":"30_CR1","unstructured":"The official website of Tencent United Security Laboratory. http:\/\/slab.qq.com\/news\/authority\/1632.html"},{"issue":"2","key":"30_CR2","first-page":"1869","volume":"58","author":"M Handley","year":"1999","unstructured":"Handley, M., Schulzrinne, H., Schooler, E., Rosenberg, J.: RFC 2543: SIP: session initiation protocol. Encycl. Internet Technol. Appl. 58(2), 1869\u20131877 (1999)","journal-title":"Encycl. Internet Technol. Appl."},{"issue":"34","key":"30_CR3","first-page":"226","volume":"96","author":"M Ester","year":"1996","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise. KDD 96(34), 226\u2013231 (1996)","journal-title":"KDD"},{"issue":"1","key":"30_CR4","first-page":"81","volume":"23","author":"T Kentaroh","year":"2015","unstructured":"Kentaroh, T., Iwao, S.: Unsupervised clustering-based spitters detection scheme (preprint). J. Inf. Process. 23(1), 81\u201392 (2015)","journal-title":"J. Inf. Process."},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Wu, Y.-S., Bagchi, S., Singh, N., Wita, R.: Spam detection in voice-over-IP calls through semi-supervised clustering. In: IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2009, pp. 307\u2013316 (2009)","DOI":"10.1109\/DSN.2009.5270323"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Bokharaei, H.K., Sahraei, A., Ganjali, Y., Keralapura, R., Nucci, A.: You can spit, but you can\u2019t hide: spammer identification in telephony networks. In: 2011 Proceedings IEEE INFOCOM, pp. 41\u201345 (2011)","DOI":"10.1109\/INFCOM.2011.5935195"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Galiotos, P., Anagnostopoulos, C., Dagiuklas, T., Kotsopoulos, S.: Non-conforming behavior detection for VoIP-based network systems. In: IEEE International Conference on Communications, pp. 1\u20137 (2016)","DOI":"10.1109\/ICC.2016.7511103"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Bai, Y., Su, X., Bhargava, B.: Adaptive voice spam control with user behavior analysis. In: IEEE International Conference on High PERFORMANCE Computing and Communications, pp. 354\u2013361 (2009)","DOI":"10.1109\/HPCC.2009.9"},{"issue":"1","key":"30_CR9","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1002\/dac.2665","volume":"28","author":"M-Y Su","year":"2015","unstructured":"Su, M.-Y., Tsai, C.-H.: Using data mining approaches to identify voice over IP spam. Int. J. Commun Syst 28(1), 187\u2013200 (2015)","journal-title":"Int. J. Commun Syst"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Toyoda, K., Sasase, I.: Spit callers detection with unsupervised random forests classifier. In: IEEE International Conference on Communications, pp. 2068\u20132072 (2013)","DOI":"10.1109\/ICC.2013.6654830"},{"key":"30_CR11","doi-asserted-by":"publisher","first-page":"6746","DOI":"10.1109\/ACCESS.2016.2642978","volume":"5","author":"K Toyoda","year":"2017","unstructured":"Toyoda, K., Park, M., Okazaki, N., Ohtsuki, T.: Novel unsupervised spitters detection scheme by automatically solving unbalanced situation. IEEE Access 5, 6746\u20136756 (2017)","journal-title":"IEEE Access"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Sengar, H., Wang, X., Nichols, A.: Thwarting spam over internet telephony (spit) attacks on VoIP networks. In: Proceedings of the Nineteenth International Workshop on Quality of Service, p. 25. IEEE Press (2011)","DOI":"10.1109\/IWQOS.2011.5931335"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Strobl, J., Mainka, B., Grutzek, G., Knospe, H.: An efficient search method for the content-based identification of telephone-spam. In: IEEE International Conference on Communications, pp. 2623\u20132627 (2012)","DOI":"10.1109\/ICC.2012.6363654"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Lentzen, D., Grutzek, G., Knospe, H., Porschmann, C.: Content-based detection and prevention of spam over IP telephony - system design, prototype and first results. In: IEEE International Conference on Communications, pp. 1\u20135 (2011)","DOI":"10.1109\/icc.2011.5963108"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Balasubramaniyan, V.A., Poonawalla, A., Ahamad, M., Hunter, M.T., Traynor, P.: PinDr0p: using single-ended audio features to determine call provenance. In: ACM Conference on Computer and Communications Security, pp. 109\u2013120 (2010)","DOI":"10.1145\/1866307.1866320"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Quittek, J., Niccolini, S., Tartarelli, S., Stiemerling, M.: Detecting spit calls by checking human communication patterns. In: IEEE International Conference on Communications, pp. 1979\u20131984 (2007)","DOI":"10.1109\/ICC.2007.329"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Azad, M.A., Morla, R.: Mitigating spit with social strength. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1393\u20131398 (2012)","DOI":"10.1109\/TrustCom.2012.204"},{"key":"30_CR18","doi-asserted-by":"publisher","first-page":"4827","DOI":"10.1002\/sec.1656","volume":"9","author":"MA Azad","year":"2016","unstructured":"Azad, M.A., Morla, R., Arshad, J., Salah, K.: Clustering VoIP caller for spit identification. Secur. Commun. Netw. 9, 4827\u20134838 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Sorge, C., Seedorf, J.: A provider-level reputation system for assessing the quality of spit mitigation algorithms. In: IEEE International Conference on Communications, pp. 2282\u20132287 (2009)","DOI":"10.1109\/ICC.2009.5198660"},{"key":"30_CR20","unstructured":"http:\/\/www.so.com"},{"key":"30_CR21","unstructured":"http:\/\/www.baidu.com"},{"key":"30_CR22","unstructured":"http:\/\/www.sogou.com"},{"key":"30_CR23","unstructured":"Kaufmann, L., Rousseeuw, P.J.: Clustering by means of medoids. In: Statistical Data Analysis Based on the L1-norm and Related Methods, pp. 405\u2013416 (1987)"}],"container-title":["Lecture Notes in Computer Science","Data Mining and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93803-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:25:03Z","timestamp":1709825103000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-93803-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319938028","9783319938035"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93803-5_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"10 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DMBD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Mining and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dmbd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.guide2research.com\/conference\/dmbd-2018","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}