{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:42Z","timestamp":1725551202574},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_14","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T10:30:40Z","timestamp":1270636240000},"page":"199-212","source":"Crossref","is-referenced-by-count":7,"title":["Fraud Detection for Voice over IP Services on Next-Generation Networks"],"prefix":"10.1007","author":[{"given":"Igor","family":"Ruiz-Agundez","sequence":"first","affiliation":[]},{"given":"Yoseba K.","family":"Penya","sequence":"additional","affiliation":[]},{"given":"Pablo","family":"Garcia Bringas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"14_CR1","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TNET.2003.820435","volume":"12","author":"Z. Mao","year":"2004","unstructured":"Mao, Z., Douligeris, C.: A distributed database architecture for global roaming in next-generation mobile networks. IEEE\/ACM Trans. Netw.\u00a012(1), 146\u2013160 (2004)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"1","key":"14_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.forsciint.2008.12.013","volume":"185","author":"M.B. Bella","year":"2009","unstructured":"Bella, M.B., Eloff, J., Olivier, M.: A fraud management system architecture for next-generation networks. Forensic Sci. Int.\u00a0185(1), 51\u201358 (2009)","journal-title":"Forensic Sci. Int."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Liu, Y., Liang, X.: New regulations to the next generation network. In: WRI International Conference on Communications and Mobile Computing. CMC 2009, January 2009, vol.\u00a02, pp. 172\u2013174 (2009)","DOI":"10.1109\/CMC.2009.279"},{"key":"14_CR4","unstructured":"Crimi, J.C.: Next Generation Network (NGN) services. In: Telcordia Technologies (2000)"},{"key":"14_CR5","unstructured":"KPMG Forensic: Fraud survey, http:\/\/www.kpmg.com\/"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Communications Fraud Control Association: Global telecom revenues increase 12% and fraud increases 52% from 2003-2005 (2006), http:\/\/www.cfca.org\/","DOI":"10.1016\/S1361-3723(03)03010-0"},{"key":"14_CR7","unstructured":"Web Application Security Consortium: Threat classification, http:\/\/www.webappsec.org\/"},{"key":"14_CR8","unstructured":"Howard, J., Longstaff, T.: A common language for computer security incidents. Technical Report Sandia Report: SAND98-8667, Sandia National Laboratories (1998)"},{"key":"14_CR9","unstructured":"Kvarnstrom, H., Lundin, E., Jonsson, E.: Combining fraud and intrusion detection - meeting new requirements. In: Fifth Nordic Workshop on Secure IT systems, NordSec 2000 (2000)"},{"key":"14_CR10","unstructured":"Simmons, M.R.: Recognizing the elements of fraud (1995), http:\/\/www.facilitatedcontrols.com\/fraud-investigation\/fraudwww.shtml"},{"key":"14_CR11","first-page":"275","volume-title":"Norms, Logics and Information Systems - New Studies in Deontic Logic and Computer Science","author":"P. Mcnamara","year":"1999","unstructured":"Mcnamara, P., Firozabadi, B.S., hua Tan, Y., Lee, R.M.: Formal definitions of fraud. In: Norms, Logics and Information Systems - New Studies in Deontic Logic and Computer Science, pp. 275\u2013288. IOS Press, Amsterdam (1999)"},{"key":"14_CR12","unstructured":"Cortesao, L., Martins, F., Rosa, A., Carvalho, P.: Fraud management systems in telecommunications: A practical approach (April 2005)"},{"key":"14_CR13","unstructured":"Bihina Bella, M.A., Olivier, M.S., Eloff, J.H.P.: A fraud detection model for Next-Generation Networks. In: Browne, D. (ed.) Southern African Telecommunication Networks and Applications Conference 2005 (SATNAC 2005) Proceedings, Champagne Castle, South Africa, September 2005, vol.\u00a01, pp. 321\u2013326 (2005)"},{"key":"14_CR14","unstructured":"Communications Fraud Control Association: Announces results of world wide telecom fraud survey (March, 2003), http:\/\/www.cfca.org\/"},{"key":"14_CR15","unstructured":"Alves, R., Ferreira, P., Belo, O., Lopes, J., Ribeiro, J., Cortesao, L., Martins, F.: Discovering telecom fraud situations through mining anomalous behavior patterns. In: Workshop on Data Mining for Busines Applications, 12th ACM SIGKDD International Conference on Knowledge Discovery Data Mining (August 2006)"},{"key":"14_CR16","unstructured":"McGibney, J., Hearne, S.: An approach to rules-based fraud management in emerging converged networks. In: IEEE\/IEI Irish Telecommunications Systems Research Symposium (2003)"},{"key":"14_CR17","unstructured":"Hollm\u00e9n, J., Tresp, V.: Call-based fraud detection in mobile communication networks using a hierarchical regime-switching model. In: Advances in Neural Information Processing Systems, pp. 889\u2013895 (1999)"},{"key":"14_CR18","unstructured":"Kou, Y., Lu, C., Sirwongwattana, S., Huang, Y.: Survey of fraud detection techniques. In: Proceedings of IEEE Intl. Conference on Networking, Sensing and Control (2004)"},{"issue":"2","key":"14_CR19","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.eswa.2005.09.028","volume":"31","author":"P. Est\u00e9vez","year":"2006","unstructured":"Est\u00e9vez, P., Held, C., Perez, C.: Subscription fraud prevention in telecommunications using fuzzy rules and neural networks. Expert Systems with Applications\u00a031(2), 337\u2013344 (2006)","journal-title":"Expert Systems with Applications"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Weiss, G.: Data mining in telecommunications (2005)","DOI":"10.1007\/978-0-387-34555-0"},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1145\/312129.312303","volume-title":"KDD \u201999: Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining","author":"S. Rosset","year":"1999","unstructured":"Rosset, S., Murad, U., Neumann, E., Idan, Y., Pinkas, G.: Discovery of fraud rules for telecommunications\u2014challenges and solutions. In: KDD \u201999: Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, pp. 409\u2013413. ACM, New York (1999)"},{"issue":"4","key":"14_CR22","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1016\/S1389-1286(00)00134-1","volume":"34","author":"E. Lundin","year":"2000","unstructured":"Lundin, E., Jonsson, E.: Anomaly-based intrusion detection: privacy concerns and other problems. Computer Networks\u00a034(4), 623\u2013640 (2000)","journal-title":"Computer Networks"},{"key":"14_CR23","unstructured":"Jones, A., Sielken, R.: Computer system intrusion detection: A survey. In: University of Virginia, Computer Science Department, Tech. Rep. (1999)"},{"key":"14_CR24","unstructured":"Kumar, S., Spafford, E.: A pattern matching model for misuse intrusion detection. In: Proceedings of the 17th National Computer Security Conference (1994)"},{"key":"14_CR25","unstructured":"TeleManagement Forum: IPDR Service Specification. Design Guide (September 2008), http:\/\/tmforum.org\/edn"},{"issue":"5","key":"14_CR26","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1016\/j.csi.2005.01.009","volume":"27","author":"J. McGibneya","year":"2005","unstructured":"McGibneya, J., Schmidtb, N., Patelb, A.: A service-centric model for intrusion detection in next-generation networks. Computer Standards & Interfaces\u00a027(5), 513\u2013520 (2005)","journal-title":"Computer Standards & Interfaces"},{"key":"14_CR27","volume-title":"Artificial Intelligence: A Modern Approach","author":"S. Russell","year":"2003","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach. Prentice-Hall, Englewood Cliffs (2003)"},{"issue":"2","key":"14_CR28","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1017\/S0269888900008122","volume":"10","author":"M. Wooldridge","year":"1995","unstructured":"Wooldridge, M., Jennings, N.: Intelligent agents: Theory and practice. Knowledge Eengineering Review\u00a010(2), 115\u2013152 (1995)","journal-title":"Knowledge Eengineering Review"},{"key":"14_CR29","volume-title":"How to Build a Business Rules Engine Extending Application Functionality through Metadata Engineering","author":"M. Chisholm","year":"2004","unstructured":"Chisholm, M.: How to Build a Business Rules Engine Extending Application Functionality through Metadata Engineering. Elsevier Inc., Amsterdam (2004)"},{"issue":"4","key":"14_CR30","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/52.391832","volume":"12","author":"B. Kitchenham","year":"1995","unstructured":"Kitchenham, B., Pickard, L., Pfleeger, S.: Case studies for method and tool evaluation. IEEE software\u00a012(4), 52\u201362 (1995)","journal-title":"IEEE software"},{"key":"14_CR31","unstructured":"TeleManagement Forum: Service Specification - Voice over IP (VoIP) (November 2004), http:\/\/tmforum.org\/edn"},{"key":"14_CR32","volume-title":"The Best of 2600: A Hacker Odyssey (Kindle Edition)","author":"E. Goldstein","year":"2008","unstructured":"Goldstein, E.: The Best of 2600: A Hacker Odyssey (Kindle Edition). Wiley, Chichester (2008)"},{"key":"14_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/3-540-36159-6_23","volume-title":"Information and Communications Security","author":"E. Lundin","year":"2002","unstructured":"Lundin, E., Kvarnstrom, H., Jonsson, E.: A synthetic fraud data generation methodology. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 265\u2013277. Springer, Heidelberg (2002)"},{"key":"14_CR34","unstructured":"Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Chalmers University of Technology, Dept. of Computer Engineering, G\u00f6teborg, Sweden, Technical Report 99\u201315"},{"key":"14_CR35","first-page":"46","volume":"XXVI","author":"W. Baluja","year":"2005","unstructured":"Baluja, W., Llanes, A.: Estado actual y tendencias del enfrentamiento del fraude en las redes de telecomunicaciones. Ingenier\u00eda Electr\u00f3nica, Autom\u00e1tica y Comunicaciones\u00a0XXVI, 46\u201352 (2005)","journal-title":"Ingenier\u00eda Electr\u00f3nica, Autom\u00e1tica y Comunicaciones"},{"key":"14_CR36","unstructured":"Bihina Bella, M.A., Eloff, J.H.P., Olivier, M.S.: Using the IPDR standard for NGN billing and fraud detection. Research in progress paper (June\/July 2005), http:\/\/mo.co.za\/abstract\/ipdrfraud.htm"},{"issue":"11","key":"14_CR37","doi-asserted-by":"publisher","first-page":"3004","DOI":"10.1093\/ietcom\/e90-b.11.3004","volume":"E90-B","author":"M.J. Choi","year":"2007","unstructured":"Choi, M.J., Hong, J.W.K.: Towards management of next generation networks. IEICE Trans. Commun.\u00a0E90-B(11), 3004\u20133014 (2007)","journal-title":"IEICE Trans. Commun."},{"key":"14_CR38","unstructured":"Hearne, S., McGibney, J., Patel, A.: Addressing fraud detection and management in next-generation telecommunications networks (2004)"},{"key":"14_CR39","unstructured":"JBoss: Drools documentation, http:\/\/jboss.org\/drools\/"},{"issue":"2","key":"14_CR40","first-page":"51","volume":"1","author":"T. Takuji","year":"2006","unstructured":"Takuji, T.: Backend systems architectures in the age of the next generation network. NEC Technical Journal\u00a01(2), 51\u201355 (2006)","journal-title":"NEC Technical Journal"},{"key":"14_CR41","unstructured":"Vincent, J., Mintram, R., Phalp, K., Anyakoha, C.: AI solutions for MDS: Artificial Intelligence techniques for Misuse Detection and localisation in telecommunication environments (2007)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T01:44:27Z","timestamp":1559007867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}