{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:48:45Z","timestamp":1763642925216,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2020,8,3]],"date-time":"2020-08-03T00:00:00Z","timestamp":1596412800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,3]],"date-time":"2020-08-03T00:00:00Z","timestamp":1596412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s12243-020-00794-z","type":"journal-article","created":{"date-parts":[[2020,8,3]],"date-time":"2020-08-03T13:22:47Z","timestamp":1596460967000},"page":"573-581","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Profiling high leverage points for detecting anomalous users in telecom data networks"],"prefix":"10.1007","volume":"75","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0782-7054","authenticated-orcid":false,"given":"Shazia","family":"Tabassum","sequence":"first","affiliation":[]},{"given":"Muhammad Ajmal","family":"Azad","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Gama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,3]]},"reference":[{"key":"794_CR1","unstructured":"Alves R, Ferreira P, Belo O, Lopes J, Ribeiro J, Cortes\u00e3o L, Martins F (2006) Discovering telecom fraud situations through mining anomalous behavior patterns. In: Proceedings of the DMBA Workshop on the 12th ACM SIGKDD"},{"key":"794_CR2","doi-asserted-by":"crossref","unstructured":"Ferreira P, Alves R, Belo O, Cortes\u00e3o L (2006) Establishing fraud detection patterns based on signatures. In: Industrial Conference on Data Mining. Springer, pp 526\u2013538","DOI":"10.1007\/11790853_41"},{"issue":"\/447","key":"794_CR3","first-page":"593","volume":"12","author":"A Aghasaryan","year":"2010","unstructured":"Aghasaryan A., Dupont M.-P., Betge-brezetz S (2010) Applications for telecommunications services user profiling. US Patent App 12(\/447):593","journal-title":"US Patent App"},{"key":"794_CR4","unstructured":"Kou Y, Lu C-T, Sirwongwattana S, Huang Y-P (2004) Survey of fraud detection techniques. In: IEEE International conference on networking, sensing and control, vol. 2. IEEE, pp 749\u2013754"},{"key":"794_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2018.03.005","volume":"77","author":"MA Azad","year":"2018","unstructured":"Azad MA, Morla R, Salah K (2018) Systems and methods for spit detection in voip: survey and future directions. Comput Secur 77:1\u201320","journal-title":"Comput Secur"},{"key":"794_CR6","doi-asserted-by":"crossref","unstructured":"Murynets I, Zabarankin M, Jover RP, Panagia A (2014) Analysis and detection of simbox fraud in mobility networks. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, pp 1519\u20131526","DOI":"10.1109\/INFOCOM.2014.6848087"},{"key":"794_CR7","unstructured":"Manifest New York (2018) Estimated 24.9m americans lost $8.9b in phone scams. http:\/\/tiny.cc\/ia98bz"},{"key":"794_CR8","doi-asserted-by":"publisher","unstructured":"Gupta P, Perdisci R, Ahamad M (2018) Towards measuring the role of phone numbers in Twitter-advertised spam. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, ASIACCS \u201918. ACM, New York, pp 285\u2013296. https:\/\/doi.org\/10.1145\/3196494.3196516","DOI":"10.1145\/3196494.3196516"},{"key":"794_CR9","unstructured":"Mohammed Aamir A, Muhammad AJmal A, Mario Parreno C, Feng H, Aad Van M (2019) Consumer-facing technology fraud: economics, attack methods and potential solutions. Future Generation Computer Systems"},{"issue":"4","key":"794_CR10","first-page":"1709","volume":"9","author":"CS Hilas","year":"2015","unstructured":"Hilas CS, Mastorocostas PA, Rekanos IT (2015) Clustering of telecommunications user profiles for fraud detection and security enhancement in large corporate networks: a case study. Appl Math Inf Sci 9 (4):1709","journal-title":"Appl Math Inf Sci"},{"key":"794_CR11","unstructured":"Hilas CS, Sahalos JN (2005) User profiling for fraud detection in telecommunication networks. In: 5th International conference on technology and automation, pp 382\u2013387"},{"key":"794_CR12","unstructured":"Kaiafas G, Hammerschmidt C, State R, Nguyen CD, Ries T, Ourdane M (2019) An experimental analysis of fraud detection methods in enterprise telecommunication data using unsupervised outlier ensembles. In: 2019 IFIP\/IEEE Symposium on integrated network and service management (IM). IEEE, pp 37\u201342"},{"key":"794_CR13","unstructured":"Miranda C, Arora M, Thirumalaiappan K, Dowd B (2019) System and method for real time fraud analysis of communications data. US Patent App. 16\/090.720"},{"key":"794_CR14","doi-asserted-by":"crossref","unstructured":"Gupta P, Srinivasan B, Balasubramaniyan V, Ahamad M (2015) Phoneypot: Data-driven understanding of telephony threats. In: NDSS","DOI":"10.14722\/ndss.2015.23176"},{"key":"794_CR15","doi-asserted-by":"crossref","unstructured":"Lentzen D, Grutzek G, Knospe H, Porschmann C (2011) Content-based detection and prevention of spam over ip telephony-system design, prototype and first results. In: 2011 IEEE International conference on communications (ICC). IEEE, pp 1\u20135","DOI":"10.1109\/icc.2011.5963108"},{"key":"794_CR16","doi-asserted-by":"crossref","unstructured":"Iranmanesh SA, Sengar H, Wang H (2012) A voice spam filter to clean subscribers\u2019 mailbox. In: International Conference on Security and Privacy in Communication Systems. Springer, pp 349\u2013367","DOI":"10.1007\/978-3-642-36883-7_21"},{"key":"794_CR17","unstructured":"Balasubramaniyan V, Ahamad M, Park H (2007) Callrank: combating spit using call duration social networks and global reputation. In: CEAS"},{"key":"794_CR18","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.cose.2013.07.006","volume":"39","author":"MA Azad","year":"2013","unstructured":"Azad MA, Morla R (2013) Caller-rep: detecting unwanted calls with caller social strength. Comput Secur 39:219\u2013236","journal-title":"Comput Secur"},{"key":"794_CR19","unstructured":"Yang Y, Xu Y, Sun Y, Dong Y, Wu F, Zhuang YT (2019) Mining fraudsters and fraudulent strategies in large-scale mobile social networks. IEEE Transactions on Knowledge and Data Engineering"},{"key":"794_CR20","doi-asserted-by":"crossref","unstructured":"d\u2019Heureuse N, Tartarelli S, Niccolini S (2011) Analyzing telemarketer behavior in massive telecom data records. In: Trustworthy Internet. Springer, pp 261\u2013271","DOI":"10.1007\/978-88-470-1818-1_20"},{"key":"794_CR21","doi-asserted-by":"crossref","unstructured":"Tabassum S, Gama J (2016) Sampling massive streaming call graphs. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing. ACM, pp 923\u2013928","DOI":"10.1145\/2851613.2851654"},{"issue":"11","key":"794_CR22","doi-asserted-by":"publisher","first-page":"3747","DOI":"10.1073\/pnas.0400087101","volume":"101","author":"A Barrat","year":"2004","unstructured":"Barrat A, Barthelemy M (2004) Pastor-satorras, Romualdo and Vespignani, Alessandro The architecture of complex weighted networks. Proc Natl Acad Sci 101(11):3747\u20133752","journal-title":"Proc Natl Acad Sci"},{"key":"794_CR23","unstructured":"Everitt B, Skrondal A (2002) The Cambridge dictionary of statistics, vol 44. Cambridge University Press Cambridge"},{"key":"794_CR24","unstructured":"Mahalanobis PC (1936) On the generalized distance in statistics. In: Proc Natl Inst Sci India, vol 2, pp 49\u201355"},{"key":"794_CR25","unstructured":"Schinka JA, Velicer WF, Weiner IB (2013) Handbook of psychology: research methods in psychology, vol 2. John, New York"},{"key":"794_CR26","doi-asserted-by":"crossref","unstructured":"Varmuza K, Filzmoser P (2016) Introduction to multivariate statistical analysis in chemometrics. CRC press","DOI":"10.1201\/9781420059496"},{"issue":"1","key":"794_CR27","first-page":"100","volume":"28","author":"JA Hartigan","year":"1979","unstructured":"Hartigan JA, Wong MA (1979) Algorithm as 136: a k-means clustering algorithm. J R Stat Soc Ser C (Appl Stat) 28(1):100\u2013108","journal-title":"J R Stat Soc Ser C (Appl Stat)"},{"issue":"4","key":"794_CR28","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s10852-005-9022-1","volume":"5","author":"AP Reynolds","year":"2006","unstructured":"Reynolds AP, Richards G, De la Iglesia B, Rayward-Smith VJ (2006) Clustering rules: a comparison of partitioning and hierarchical clustering algorithms. J Math Modell Algorithm 5(4):475\u2013504","journal-title":"J Math Modell Algorithm"},{"key":"794_CR29","doi-asserted-by":"crossref","unstructured":"Schubert E, Rousseeuw PJ (2019) Faster k-medoids clustering: improving the Pam, Clara, and Clarans algorithms. In: International Conference on Similarity Search and Applications. Springer, pp 171\u2013187","DOI":"10.1007\/978-3-030-32047-8_16"},{"key":"794_CR30","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.procs.2016.02.095","volume":"78","author":"P Arora","year":"2016","unstructured":"Arora P, Varshney S (2016) Analysis of k-means and k-medoids algorithm for big data. Procedia Comput Sci 78:507\u2013512","journal-title":"Procedia Comput Sci"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-020-00794-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-020-00794-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-020-00794-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T23:45:17Z","timestamp":1627947917000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-020-00794-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,3]]},"references-count":30,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["794"],"URL":"https:\/\/doi.org\/10.1007\/s12243-020-00794-z","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2020,8,3]]},"assertion":[{"value":"22 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}