{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:03:33Z","timestamp":1761807813392},"reference-count":49,"publisher":"Elsevier BV","content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1016\/j.cose.2013.07.006","type":"journal-article","created":{"date-parts":[[2013,7,30]],"date-time":"2013-07-30T12:16:23Z","timestamp":1375186583000},"page":"219-236","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":27,"special_numbering":"PB","title":["Caller-REP: Detecting unwanted calls with caller social strength"],"prefix":"10.1016","volume":"39","author":[{"given":"Muhammad Ajmal","family":"Azad","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Morla","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2013.07.006_bib1","series-title":"Software, telecommunications and computer networks (SoftCOM), 2011 19th international conference on","first-page":"1","article-title":"Multistage SPIT detection in transit VoIP","author":"Azad","year":"2011"},{"key":"10.1016\/j.cose.2013.07.006_bib2","series-title":"Fourth conference on email and anti-spam (CEAS2007)","article-title":"CallRank: combating SPIT using call duration, social networks and global reputation","author":"Balasubramaniyan","year":"2007"},{"key":"10.1016\/j.cose.2013.07.006_bib3","series-title":"2006 International conference on wireless communications and mobile computing, ser. IWCMC '06. ACM","first-page":"201","article-title":"Anti-vamming trust enforcement in peer-to-peer VoIP networks","author":"Banerjee","year":"2006"},{"key":"10.1016\/j.cose.2013.07.006_bib4","series-title":"2011 IEEE INFOCOM","first-page":"41","article-title":"You can SPIT, but you can\u2019t hide: spammer identification in telephony networks","author":"Bokharaei","year":"2011"},{"key":"10.1016\/j.cose.2013.07.006_bib5","series-title":"John Wiley security and communication networks","article-title":"A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks","author":"Bou-Harb","year":"2012"},{"key":"10.1016\/j.cose.2013.07.006_bib6","first-page":"61","article-title":"Leveraging social networks to fight spam","volume":"38","author":"Boykin","year":"2005"},{"key":"10.1016\/j.cose.2013.07.006_bib7","series-title":"14th ACM international conference on information and knowledge management, ser. CIKM \u201905","first-page":"373","article-title":"MailRank: using ranking for spam detections","author":"Chirita","year":"2005"},{"key":"10.1016\/j.cose.2013.07.006_bib8","series-title":"Proceedings of the 2005 workshop on digital identity management, ser. DIM '05","first-page":"84","article-title":"Privacy enhancing identity management: protection against re-identification and profiling","author":"Clau\u03b2","year":"2005"},{"key":"10.1016\/j.cose.2013.07.006_bib9","series-title":"Communications fraud control association (CFCA) announces results of worldwide telecom fraud survey","year":"2013"},{"key":"10.1016\/j.cose.2013.07.006_bib10","series-title":"ISSA 2005 new knowledge today conference, Johannesburg, South Africa","article-title":"A model for spam prevention in IP telephony networks using anonymous verifying authorities","author":"Croft","year":"2005"},{"key":"10.1016\/j.cose.2013.07.006_bib11","series-title":"The steps to reducing unwanted traffic on the internet","first-page":"31","article-title":"Detecting spam in VoIP networks","author":"Dantu","year":"2005"},{"issue":"4","key":"10.1016\/j.cose.2013.07.006_bib12","doi-asserted-by":"crossref","first-page":"e10012","DOI":"10.1371\/journal.pone.0010012","article-title":"Efficient and exact sampling of simple graphs with given arbitrary degree sequence","volume":"5","author":"Del Genio","year":"2010","journal-title":"PLoS ONE Public Library Science"},{"key":"10.1016\/j.cose.2013.07.006_bib13","series-title":"Trustworthy Internet","first-page":"261","article-title":"Analyzing telemarketer behavior in massive telecom data records","author":"d'Heureuse","year":"2011"},{"key":"10.1016\/j.cose.2013.07.006_bib14","unstructured":"ETSI standard: telecommunications and internet converged services and protocols for advanced networking (TISPAN); IP multimedia call control protocol based on session initiation protocol (SIP) and session description protocol (SDP) stage 3.\u201d"},{"key":"10.1016\/j.cose.2013.07.006_bib15","series-title":"FTC issues FY 2012 national do not call registry data book","year":"2012"},{"issue":"6","key":"10.1016\/j.cose.2013.07.006_bib16","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1086\/225469","article-title":"The strength of weak ties","volume":"78","author":"Granovetter","year":"1973","journal-title":"American Journal Sociology JSTOR"},{"key":"10.1016\/j.cose.2013.07.006_bib17","series-title":"Third annual VoIP security workshop, Berlin, Germany","article-title":"Developing a legally compliant reachability management system as a countermeasure against SPIT","author":"Hansen","year":"2006"},{"key":"10.1016\/j.cose.2013.07.006_bib18","series-title":"The 3rd annual VoIP security workshop","article-title":"Incorporating active fingerprinting into SPIT prevention systems","author":"Hong","year":"2006"},{"key":"10.1016\/j.cose.2013.07.006_bib19","series-title":"12th international conference on World Wide Web","first-page":"640","article-title":"The Eigentrust algorithm for reputation management in P2P networks","author":"Kamvar","year":"2003"},{"key":"10.1016\/j.cose.2013.07.006_bib20","first-page":"1","article-title":"A comprehensive survey of voice over IP security research","volume":"99","author":"Keromytis","year":"2011","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"1","key":"10.1016\/j.cose.2013.07.006_bib21","doi-asserted-by":"crossref","DOI":"10.1145\/1216895.1216897","article-title":"Socio-technical defense against voice spamming","volume":"2","author":"Kolan","year":"2007","journal-title":"ACM Transactions on Autonomous and Adaptive Systems"},{"key":"10.1016\/j.cose.2013.07.006_bib22","series-title":"Fourth conference on email and anti-spam (CEAS2007)","article-title":"A learning approach to spam detection based on social networks","author":"Lam","year":"2007"},{"key":"10.1016\/j.cose.2013.07.006_bib23","series-title":"IEEE international conference on communications ICC2011, Koyto, Japan","first-page":"1","article-title":"Content-based detection and prevention of spam over IP telephony \u2013 system design, prototype and first results","author":"Lentzen","year":"2011"},{"key":"10.1016\/j.cose.2013.07.006_bib24","series-title":"Consumer communications and networking conference, 2007. CCNC 2007. 4th IEEE","first-page":"896","article-title":"Cure for spam over internet telephony","author":"Lindqvist","year":"2007"},{"key":"10.1016\/j.cose.2013.07.006_bib25","series-title":"Proceedings of the 15th ACM international conference on information and knowledge management, ser. CIKM \u201906","first-page":"435","article-title":"On the structural properties of massive telecom call graphs: findings and implications","author":"Nanavati","year":"2006"},{"key":"10.1016\/j.cose.2013.07.006_bib26","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1080\/00107510500052444","article-title":"Power laws, Pareto distributions and Zipf\u2019s law","volume":"46","author":"Newman","year":"2005","journal-title":"Contemporary Physics"},{"key":"10.1016\/j.cose.2013.07.006_bib27","series-title":"Proceedings of 3rd workshop on data mining Standards (DM-SSP 2004), conjuction with KDD","first-page":"7","article-title":"Toward standardization in privacy-preserving data mining","author":"Oliveira","year":"2004"},{"key":"10.1016\/j.cose.2013.07.006_bib28","series-title":"3rd International conference on principles, systems and applications of IP telecommunications, ser. IPTComm '09","first-page":"1","article-title":"Have I met you before?: using cross-media relations to reduce SPIT","author":"Ono","year":"2009"},{"key":"10.1016\/j.cose.2013.07.006_bib29","first-page":"247","volume":"vol. 6","author":"Penders","year":"2004"},{"key":"10.1016\/j.cose.2013.07.006_bib30","series-title":"Designing privacy enhancing technologies, ser","first-page":"1","article-title":"Anonymity, unobservability, and pseudonymity \u2013 a proposal for terminology","volume":"vol. 2009","author":"Pfitzmann","year":"2001"},{"issue":"8","key":"10.1016\/j.cose.2013.07.006_bib31","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MCOM.2008.4597108","article-title":"On spam over internet telephony (SPIT) prevention","volume":"46","author":"Quittek","year":"2008","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/j.cose.2013.07.006_bib32","series-title":"IEEE international conference on communications, Glasgow, Scotland","first-page":"1979","article-title":"Detecting SPIT calls by checking human communication patterns","author":"Quittek","year":"2007"},{"key":"10.1016\/j.cose.2013.07.006_bib33","series-title":"International conference on digital telecommunications, ICDT \u201906, Cap Esterel, France","first-page":"68","article-title":"SIP spam detection","author":"Rebahi","year":"2006"},{"key":"10.1016\/j.cose.2013.07.006_bib34","series-title":"The session initiation protocol (SIP) and spam. RFC 5039","author":"Rosenberg","year":"2008"},{"key":"10.1016\/j.cose.2013.07.006_bib35","series-title":"SIP: session initiation protocol. RFC 3261","author":"Rosenberg","year":"2002"},{"issue":"1","key":"10.1016\/j.cose.2013.07.006_bib36","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MVT.2010.939906","article-title":"Sender scorecards","volume":"6","author":"Schmidt","year":"2011","journal-title":"IEEE Vehicular Technology Magazine"},{"key":"10.1016\/j.cose.2013.07.006_bib37","series-title":"Security and privacy in communication networks, ser","first-page":"501","article-title":"Call Behavioral analysis to Thwart SPIT attacks on VoIP networks","volume":"vol. 96","author":"Sengar","year":"2012"},{"key":"10.1016\/j.cose.2013.07.006_bib38","series-title":"Quality of service (IWQoS), 2011 IEEE 19th international workshop on","first-page":"1","article-title":"Thwarting spam over internet telephony (SPIT) attacks on VoIP networks","author":"Sengar","year":"2011"},{"key":"10.1016\/j.cose.2013.07.006_bib39","series-title":"14th ACM SIGKDD international conference on knowledge discovery and data mining, ser. KDD '08","first-page":"596","article-title":"Mobile call graphs: beyond power-law and lognormal distributions","author":"Seshadri","year":"2008"},{"key":"10.1016\/j.cose.2013.07.006_bib40","series-title":"8th International conference on security and privacy in communication networks","first-page":"349","article-title":"A voice spam filter to clean subscriber's mailbox","author":"Seyed","year":"2012"},{"key":"10.1016\/j.cose.2013.07.006_bib41","first-page":"18","article-title":"Progressive multi gray-leveling: a voice spam protection algorithm","volume":"vol. 20","author":"Shin","year":"2006"},{"key":"10.1016\/j.cose.2013.07.006_bib42","series-title":"ICC '09. IEEE international conference on communications","first-page":"1","article-title":"A provider-level reputation system for assessing the quality of SPIT mitigation algorithms","author":"Sorge","year":"2009"},{"key":"10.1016\/j.cose.2013.07.006_bib43","unstructured":"Study of mechanisms for protection against unsolicited communication for IMS (PUCI). In: Release 3GPP technical specification. 3GPP, September 2012."},{"key":"10.1016\/j.cose.2013.07.006_bib44","unstructured":"3rd Generation partnership project; technical specification group services and system aspects, IP multimedia subsystem (IMS); 3GPP technical specification release 7.\u201d"},{"key":"10.1016\/j.cose.2013.07.006_bib45","series-title":"Beware of Skype voice spam","author":"Tynan","year":"2011"},{"key":"10.1016\/j.cose.2013.07.006_bib46","series-title":"2010 international conference on security and cryptography (SECRYPT)","first-page":"1","article-title":"Don't follow me: spam detection in Twitter","author":"Wang","year":"2010"},{"key":"10.1016\/j.cose.2013.07.006_bib47","series-title":"4th ACM European conference on computer systems, ser. EuroSys \u201909","first-page":"205","article-title":"User interactions in social networks and their implications","author":"Wilson","year":"2009"},{"key":"10.1016\/j.cose.2013.07.006_bib48","series-title":"39th annual IEEE\/IFIP international conference on dependable systems and networks (DSN), Lisbon Portugal","first-page":"307","article-title":"Spam detection in voice- over-IP calls through semi-supervised clustering","author":"Wu","year":"2009"},{"key":"10.1016\/j.cose.2013.07.006_bib49","series-title":"14th International conference on information security, ser. ISC\u201911","first-page":"152","article-title":"Detecting near-duplicate SPITs in voice mailboxes using hashes","author":"Zhang","year":"2011"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404813001090?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404813001090?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,10,14]],"date-time":"2018-10-14T03:58:11Z","timestamp":1539489491000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404813001090"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":49,"alternative-id":["S0167404813001090"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2013.07.006","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2013,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Caller-REP: Detecting unwanted calls with caller social strength","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2013.07.006","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}