{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:01:05Z","timestamp":1725620465377},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642248603"},{"type":"electronic","value":"9783642248610"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24861-0_11","type":"book-chapter","created":{"date-parts":[[2011,10,11]],"date-time":"2011-10-11T21:18:10Z","timestamp":1318367890000},"page":"152-167","source":"Crossref","is-referenced-by-count":9,"title":["Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes"],"prefix":"10.1007","author":[{"given":"Ge","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"SPIT on VoIP. Communications News (January 2005), http:\/\/findarticles.com\/p\/articles\/mi_m0CMN\/is_1_42\/ai_n27865818\/?tag=mantle_skin;content (visited at May16, 2011)"},{"key":"11_CR2","volume-title":"Proceedings of CEAS 2007","author":"V.A. Balasubramaniyan","year":"2007","unstructured":"Balasubramaniyan, V.A., Ahamad, M., Park, H.: Callrank: Using call duration, social networks and pagerank to combat SPIT. In: Proceedings of CEAS 2007. ACM, New York (2007)"},{"key":"11_CR3","volume-title":"Proceedings of HPCC 2009","author":"Y. Bai","year":"2009","unstructured":"Bai, Y., Su, X., Bhargava, B.: Adaptive voice spam control with user behavior analysis. In: Proceedings of HPCC 2009. IEEE Computer Society, Los Alamitos (2009)"},{"key":"11_CR4","volume-title":"Proceedings of ICC 2007","author":"J. Quittek","year":"2007","unstructured":"Quittek, J., Niccolini, S., Tartarelli, S., Stiemerling, M., Brunner, M., Ewald, T.: Detecting SPIT calls by checking human communication patterns. In: Proceedings of ICC 2007. IEEE Communication Society, Los Alamitos (2007)"},{"key":"11_CR5","unstructured":"Sarafijanovic, S., Perez, S., Boudec, J.L.: Improving digest-based collaborative spam detection. In: Proceedings of MIT Spam Conference 2008 (2008)"},{"key":"11_CR6","unstructured":"Damiani, E., Vimercati, S.D.C., Paraboschi, S., Samarati, P.: An open digest-based technique for spam detection. In: Proceedings of ISCA PDCCS 2004. ISCA (2004)"},{"key":"11_CR7","volume-title":"Proceedings of S&P 2008","author":"C. Wright","year":"2008","unstructured":"Wright, C., Ballard, L., Coull, S., Monrose, F., Masson, G.: Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In: Proceedings of S&P 2008. IEEE Computer Society, Los Alamitos (2008)"},{"key":"11_CR8","volume-title":"Proceedings of S&P 2011","author":"A.M. White","year":"2011","unstructured":"White, A.M., Matthews, A.R., Snow, K.Z., Monrose, F.: Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks. In: Proceedings of S&P 2011. IEEE Computer Society, Los Alamitos (2011)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261 (2002)","DOI":"10.17487\/rfc3261"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A transport protocol for real-time applications, RFC 3550 (2003)","DOI":"10.17487\/rfc3550"},{"key":"11_CR11","unstructured":"G.711, http:\/\/www.itu.int\/rec\/T-REC-G.711\/e (visited at May 15, 2011)"},{"key":"11_CR12","unstructured":"Speex, http:\/\/www.speex.org\/ (visited at May 15, 2011)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Schroeder, M., Atal, B.: Code-excited linear prediction (CELP): High-quality speech at very low bit rates. In: Proceedings of ICASSP 1985. IEEE Signaling Proceesing Society (1985)","DOI":"10.1109\/ICASSP.1985.1168147"},{"key":"11_CR14","unstructured":"Skype, www.Skype.com (visited at May 15th, 2011)"},{"key":"11_CR15","unstructured":"Festival, http:\/\/www.cstr.ed.ac.uk\/projects\/festival\/ (visited at May 16, 2011)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Coskun, B., Memon, N.: Tracking encrypted VoIP calls via robust hashing of network flows. In: Proceedings of ICASSP 2010. IEEE Signaling Proceesing Society (2010)","DOI":"10.1109\/ICASSP.2010.5495398"},{"key":"11_CR17","unstructured":"Nilsimsa, http:\/\/ixazon.dynip.com\/~cmeclax\/nilsimsa.html (visited at May 16th, 2011)"},{"key":"11_CR18","unstructured":"Spamassassin, http:\/\/spamassassin.apache.org\/ (visited at May 16, 2011)"},{"key":"11_CR19","unstructured":"SMS spam corpus, http:\/\/www.dt.fee.unicamp.br\/~tiago\/smsspamcollection\/ (visited at May 16, 2011)"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Jennings, C.: The Session Initiation Protocol (SIP) and Spam, RFC 5039 (2008)","DOI":"10.17487\/rfc5039"},{"issue":"5","key":"11_CR21","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MNET.2006.1705879","volume":"20","author":"D. Shin","year":"2006","unstructured":"Shin, D., Ahn, J., Shim, C.: Progressive multi gray-leveling: a voice spam protection algorithm. IEEE Networks\u00a020(5), 18\u201324 (2006)","journal-title":"IEEE Networks"},{"key":"11_CR22","volume-title":"Proceedings of DEXA Workshop 2009","author":"R. Zhang","year":"2009","unstructured":"Zhang, R., Gurtov, A.: Collaborative reputation-based voice spam filtering. In: Proceedings of DEXA Workshop 2009. IEEE Computer Society, Los Alamitos (2009)"},{"key":"11_CR23","volume-title":"Proceedings of SOAPS 2008","author":"A. Markkola","year":"2008","unstructured":"Markkola, A., Lindqvist, J.: Accessible voice CAPTCHAs for internet telephony. In: Proceedings of SOAPS 2008. ACM, New York (2008)"},{"issue":"5","key":"11_CR24","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1016\/j.cose.2009.12.003","volume":"29","author":"Y. Soupionis","year":"2010","unstructured":"Soupionis, Y., Gritzalis, D.: Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony. Computers & Security\u00a029(5), 603\u2013618 (2010)","journal-title":"Computers & Security"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Salehin, S.M.A., Ventura, N.: Blocking unsolicited voice calls using decoys for the IMS. In: Proceedings of ICC 2007. IEEE Communication Society (2007)","DOI":"10.1109\/ICC.2007.326"},{"key":"11_CR26","volume-title":"Proceeding of WWW 2008","author":"B. Mehta","year":"2008","unstructured":"Mehta, B., Nangia, S., Gupta, M., Nejdl, W.: Detecting image spam using visual features and near duplicate detection. In: Proceeding of WWW 2008. ACM, New York (2008)"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1007\/11919568_84","volume-title":"Information Networking. Advances in Data Communications and Wireless Networks","author":"C. Yeh","year":"2006","unstructured":"Yeh, C., Lin, C.: Near-duplicate mail detection based on URL information for spam filtering. In: Chong, I., Kawahara, K. (eds.) ICOIN 2006. LNCS, vol.\u00a03961, pp. 842\u2013851. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24861-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T06:07:18Z","timestamp":1560751638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24861-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642248603","9783642248610"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24861-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}