{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:06:45Z","timestamp":1762376805252,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T00:00:00Z","timestamp":1600473600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T00:00:00Z","timestamp":1600473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s12243-020-00808-w","type":"journal-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T11:02:59Z","timestamp":1600513379000},"page":"583-596","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Interconnect bypass fraud detection: a case study"],"prefix":"10.1007","volume":"75","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7980-0972","authenticated-orcid":false,"given":"Bruno","family":"Veloso","sequence":"first","affiliation":[]},{"given":"Shazia","family":"Tabassum","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Martins","sequence":"additional","affiliation":[]},{"given":"Raphael","family":"Espanha","sequence":"additional","affiliation":[]},{"given":"Raul","family":"Azevedo","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Gama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,19]]},"reference":[{"key":"808_CR1","unstructured":"AlBougha MR (2016) Comparing data mining classification algorithms in detection of simbox fraud"},{"key":"808_CR2","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.future.2019.03.041","volume":"100","author":"MA Ali","year":"2019","unstructured":"Ali MA, Azad MA, Centeno MP, Hao F, van Moorsel A (2019) Consumer-facing technology fraud: economics, attack methods and potential solutions. Futur Gener Comput Syst 100:408\u2013427","journal-title":"Futur Gener Comput Syst"},{"key":"808_CR3","doi-asserted-by":"crossref","unstructured":"Alraouji Y, Bramantoro A (2014) International call fraud detection systems and techniques. In: Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, pp 159\u2013166","DOI":"10.1145\/2668260.2668272"},{"key":"808_CR4","unstructured":"Alsadi IS, Abuhamoud N (2018) Study to use neo4j to analysis and detection sim-box fraud. Journal of Pure and Applied Sciences 17(4)"},{"key":"808_CR5","unstructured":"Association CFC et al (2017) Global fraud loss survey. Press Release"},{"issue":"1","key":"808_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00778-009-0172-z","volume":"19","author":"G Cormode","year":"2010","unstructured":"Cormode G, Hadjieleftheriou M (2010) Methods for finding frequent items in data streams. VLDB J 19(1):3\u201320","journal-title":"VLDB J"},{"issue":"4","key":"808_CR7","doi-asserted-by":"publisher","first-page":"2:1","DOI":"10.1145\/1324172.1324174","volume":"1","author":"G Cormode","year":"2008","unstructured":"Cormode G, Korn F, Muthukrishnan S, Srivastava D (2008) Finding hierarchical heavy hitters in streaming data. ACM Trans Knowl Discov Data 1(4):2:1\u20132:48. https:\/\/doi.org\/10.1145\/1324172.1324174","journal-title":"ACM Trans Knowl Discov Data"},{"key":"808_CR8","doi-asserted-by":"crossref","unstructured":"Elmi AH, Ibrahim S, Sallehuddin R (2013) Detecting sim box fraud using neural network. In: IT Convergence and security 2012. Springer, pp 575\u2013582","DOI":"10.1007\/978-94-007-5860-5_69"},{"key":"808_CR9","unstructured":"Gama J (2010) Knowledge discovery from data streams. Chapman and hall \/ CRC data mining and knowledge discovery series. CRC Press"},{"key":"808_CR10","unstructured":"Jiang JYJ, Gillot D (2015) Advanced predictive intelligence for termination bypass detection and prevention. US Patent 9,002,320"},{"key":"808_CR11","unstructured":"Kahsu H (2018) Sim-box fraud detection using data mining techniques: the case of ethio telecom. Ph.D. thesis AAU"},{"key":"808_CR12","doi-asserted-by":"crossref","unstructured":"Kashir M, Bashir S (2019) Machine learning techniques for sim box fraud detection. In: 2019 International Conference on Communication Technologies (ComTech). IEEE, pp 4\u20138","DOI":"10.1109\/COMTECH.2019.8737828"},{"key":"808_CR13","doi-asserted-by":"crossref","unstructured":"Laleh N, Azgomi MA (2009) A taxonomy of frauds and fraud detection techniques. In: International Conference on Information Systems, Technology and Management. Springer, pp 256\u2013267","DOI":"10.1007\/978-3-642-00405-6_28"},{"key":"808_CR14","unstructured":"Lefler AC, Plaza AG, Rios JLM (2018) Method, mobile switching centre, MSC, and a computer program product for detecting interconnect bypass. US Patent App. 15\/570,014"},{"key":"808_CR15","doi-asserted-by":"publisher","first-page":"13,386","DOI":"10.1016\/j.eswa.2011.04.167","volume":"38","author":"CW Li","year":"2011","unstructured":"Li CW, Jea KF (2011) An adaptive approximation method to discover frequent itemsets over sliding-window-based data streams. Expert Syst Appl 38:13,386\u201313,404","journal-title":"Expert Syst Appl"},{"key":"808_CR16","doi-asserted-by":"crossref","unstructured":"Manku GS, Motwani R (2002) Approximate frequency counts over data streams. In: Proceedings of the 28th International Conference on Very Large Data Bases, VLDB \u201902. VLDB Endowment, pp 346\u2013357. http:\/\/dl.acm.org\/citation.cfm?id=1287369.1287400","DOI":"10.1016\/B978-155860869-6\/50038-X"},{"key":"808_CR17","doi-asserted-by":"crossref","unstructured":"Marah HM, Elrajubi OM, Abouda AA (2015) Fraud detection in international calls using fuzzy logic. In: International Conference on Computer Vision and Image Analysis Applications. IEEE, pp 1\u20136","DOI":"10.1109\/ICCVIA.2015.7351891"},{"key":"808_CR18","unstructured":"Martino GDS, Navarin N, Sperduti A (2013) A lossy counting based approach for learning on streams of graphs on a budget. In: Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence. AAAI Press, pp 1294\u20131301"},{"key":"808_CR19","doi-asserted-by":"crossref","unstructured":"Metwally A, Agrawal D, El Abbadi A (2005) Efficient computation of frequent and top-k elements in data streams. In: Proceedings of the 10th International Conference on Database Theory, ICDT\u201905. Springer, Berlin, pp 398\u2013412","DOI":"10.1007\/978-3-540-30570-5_27"},{"key":"808_CR20","doi-asserted-by":"crossref","unstructured":"Moreau Y, Verrelst H, Vandewalle J (1997) Detection of mobile phone fraud using supervised neural networks: a first prototype. In: International Conference on Artificial Neural Networks. Springer, pp 1065\u20131070","DOI":"10.1007\/BFb0020294"},{"key":"808_CR21","doi-asserted-by":"crossref","unstructured":"Murynets I, Zabarankin M, Jover RP, Panagia A (2014) Analysis and detection of simbox fraud in mobility networks. In: IEEE INFOCOM 2014-IEEE Conference on computer communications. IEEE, pp 1519\u20131526","DOI":"10.1109\/INFOCOM.2014.6848087"},{"issue":"2","key":"808_CR22","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1561\/0400000002","volume":"1","author":"S Muthukrishnan","year":"2005","unstructured":"Muthukrishnan S (2005) Data streams: algorithms and applications. Found Trends Theor Comput Sci 1(2):117\u2013236","journal-title":"Found Trends Theor Comput Sci"},{"key":"808_CR23","doi-asserted-by":"crossref","unstructured":"Nishina T, Iwanuma K (2019) Yamamoto, y.: a skipping FP-tree for incrementally intersecting closed itemsets in on-line stream mining. 2019 IEEE International Conference on Big Data and Smart Computing (BigComp), pp 1\u20134","DOI":"10.1109\/BIGCOMP.2019.8679296"},{"key":"808_CR24","unstructured":"Reaves B, Shernan E, Bates A, Carter H, Traynor P (2015) Boxed out: blocking cellular interconnect bypass fraud at the network edge. In: 24Th {USENIX} Security Symposium ({USENIX} security 15), pp 833\u2013848"},{"key":"808_CR25","unstructured":"Rosas E, Analide C (2009) Telecommunications fraud: problem analysis-an agent-based KDD perspective. Aveiro: EPIA 2009"},{"key":"808_CR26","doi-asserted-by":"crossref","unstructured":"Sahin M, Francillon A (2016) Over-the-top bypass: study of a recent telephony fraud. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 1106\u20131117","DOI":"10.1145\/2976749.2978334"},{"key":"808_CR27","unstructured":"Subbulakshmi B, Nayaki AP (2018) Compact pattern stream tree algorithm"},{"key":"808_CR28","unstructured":"Tewodros H (2018) Network traffic classification using machine learning: a step towards over-the-top bypass fraud detection. Ph.D Thesis"},{"key":"808_CR29","doi-asserted-by":"crossref","unstructured":"Veloso B, Martins C, Espanha R, Azevedo R, Gama J (2020) Fraud detection using heavy hitters: a case study. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp 482\u2013489","DOI":"10.1145\/3341105.3373842"},{"key":"808_CR30","unstructured":"Veloso B, Martins C, WEDO B, Espanha R, Azevedo R, Gama J Detecting bursts of activity from streams"},{"issue":"3","key":"808_CR31","first-page":"15","volume":"8","author":"GI Webb","year":"2014","unstructured":"Webb GI, Vreeken J (2014) Efficient discovery of the most interesting associations. ACM Trans Knowl Discov Data (TKDD) 8(3):15","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"key":"808_CR32","unstructured":"Worku T (2018) Predictive modeling for international roaming fraud detection in ethio telecom. Ph.D. thesis, Addis Ababa University"},{"key":"808_CR33","doi-asserted-by":"crossref","unstructured":"Yulianto A, Bijaksana MA, Lhaksmana KM, et al. (2017) Fraud detection on international direct dial call using hybrid NBTree algorithm and Kullback Leibler divergence. In: 2017 5Th International Conference on Information and Communication Technology (ICoIC7). IEEE, pp 1\u20136","DOI":"10.1109\/ICoICT.2017.8074676"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-020-00808-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-020-00808-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-020-00808-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:04:38Z","timestamp":1632009878000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-020-00808-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,19]]},"references-count":33,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["808"],"URL":"https:\/\/doi.org\/10.1007\/s12243-020-00808-w","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2020,9,19]]},"assertion":[{"value":"17 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}