{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:02:17Z","timestamp":1725753737503},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642412837"},{"type":"electronic","value":"9783642412844"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41284-4_17","type":"book-chapter","created":{"date-parts":[[2013,10,22]],"date-time":"2013-10-22T13:35:11Z","timestamp":1382448911000},"page":"328-347","source":"Crossref","is-referenced-by-count":5,"title":["Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses"],"prefix":"10.1007","author":[{"given":"Nan","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yu","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Ann","family":"Skudlark","sequence":"additional","affiliation":[]},{"given":"Zhi-Li","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Federal communications commission. Spam: unwanted text messages and email (2012), \n                    \n                      http:\/\/www.fcc.gov\/guides\/spam-unwanted-text-messages-and-email"},{"key":"17_CR2","unstructured":"69% of mobile phone users get text spam (2012), \n                    \n                      http:\/\/abcnews.go.com\/blogs\/technology\/2012\/08\/69-of-mobile-phone-users-get-textspam\/"},{"issue":"6","key":"17_CR3","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MIS.2012.3","volume":"27","author":"Q. Xu","year":"2012","unstructured":"Xu, Q., Xiang, E., Yang, Q., Du, J., Zhong, J.: Sms spam detection using noncontent features. IEEE Intelligent Systems\u00a027(6), 44\u201351 (2012)","journal-title":"IEEE Intelligent Systems"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-19260-9_10","volume-title":"Passive and Active Measurement","author":"T. Ouyang","year":"2011","unstructured":"Ouyang, T., Ray, S., Rabinovich, M., Allman, M.: Can network characteristics detect spam effectively in a stand-alone enterprise? In: Spring, N., Riley, G.F. (eds.) PAM 2011. LNCS, vol.\u00a06579, pp. 92\u2013101. Springer, Heidelberg (2011)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Sirivianos, M., Kim, K., Yang, X.: Introducing Social Trust to Collaborative Spam Mitigation. In: INFOCOM 2011 (2011)","DOI":"10.1109\/INFCOM.2011.5935047"},{"key":"17_CR6","unstructured":"Hao, S., Syed, N., Feamster, N., Gray, A., Krasser, S.: Detecting spammers with snare: spatio-temporal network-level automatic reputation engine. In: USENIX Security Symposium 2009 (2009)"},{"key":"17_CR7","unstructured":"Pitsillidis, A., Levchenko, K., Kreibich, C., Kanich, C., Voelker, G.M., Paxson, V., Weaver, N., Savage, S.: Botnet judo: Fighting spam with itself. In: NDSS 2009 (2010)"},{"key":"17_CR8","unstructured":"Cluto - software for clustering high-dimensional datasets, \n                    \n                      http:\/\/glaros.dtc.umn.edu\/gkhome\/views\/cluto"},{"key":"17_CR9","unstructured":"Zhao, Y., Karypis, G.: Criterion functions for document clustering: Experiments and analysis. Technical report, University of Minnesota (2002)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Murynets, I., Jover, R.: Crime scene investigation: Sms spam data analysis. In: IMC 2012 (2012)","DOI":"10.1145\/2398776.2398822"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Yadav, K., Kumaraguru, P., Goyal, A., Gupta, A., Naik, V.: Smsassassin: crowdsourcing driven mobile-based system for sms spam filtering. In: HotMobile 2011 (2011)","DOI":"10.1145\/2184489.2184491"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Cormack, G., Hidalgo, J., S\u00e1nz, E.: Feature engineering for mobile (sms) spam filtering. In: SIGIR 2007 (2007)","DOI":"10.1145\/1277741.1277951"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.: Detecting and characterizing social spam campaigns. In: IMC 2010 (2010)","DOI":"10.1145\/1879141.1879147"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Viswanath, B., Kooti, F., Sharma, N., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.: Understanding and combating link farming in the twitter social network. In: WWW 2012 (2012)","DOI":"10.1145\/2187836.2187846"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: WWW 2012 (2012)","DOI":"10.1145\/2187836.2187847"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: CCS 2010 (2010)","DOI":"10.1145\/1866307.1866311"},{"key":"17_CR17","unstructured":"Tinyurl, \n                    \n                      http:\/\/tinyurl.com\/"},{"key":"17_CR18","unstructured":"800notes - Directory of unknown callers, \n                    \n                      http:\/\/www.800notes.com"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Jiang, N., Jin, Y., Skudlark, A., Hsu, W., Jacobson, G., Prakasam, S., Zhang, Z.-L.: Isolating and analyzing fraud activities in a large cellular network via voice call graph analysis. In: MobiSys 2012 (2012)","DOI":"10.1145\/2307636.2307660"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Karypis, G., Fayyad, U.: Hierarchical clustering algorithms for document datasets. Data Min. Knowl. Discov. (2005)","DOI":"10.1137\/1.9781611972757.32"},{"key":"17_CR21","unstructured":"Jacob, G., Hund, R., Kruegel, C., Holz, T.: Jackstraws: picking command and control connections from bot traffic. In: SEC 2011 (2011)"},{"key":"17_CR22","unstructured":"Skudlark, A., Jiang, N., Jin, Y., Zhang, Z.-L.: Understanding and detecting sms spam through mining customer reports. Technical report, AT&T Labs (2012)"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N., Vempala, S.: Filtering spam with behavioral blacklisting. In: CCS 2007 (2007)","DOI":"10.1145\/1315245.1315288"},{"key":"17_CR24","unstructured":"Sms watchdog, \n                    \n                      http:\/\/www.smswatchdog.com"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Jiang, N., Jin, Y., Skudlark, A., Zhang, Z.-L.: Greystar: Fast and accurate detection of sms spam numbers in large cellular networks using gray phone space. In: USENIX SEC 2013 (2013)","DOI":"10.1145\/2465529.2465530"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41284-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T18:42:34Z","timestamp":1558636954000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41284-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642412837","9783642412844"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41284-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}