{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:45:19Z","timestamp":1729651519807,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/apcc.2015.7412527","type":"proceedings-article","created":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T05:44:17Z","timestamp":1462599857000},"page":"289-293","source":"Crossref","is-referenced-by-count":0,"title":["Two-stage SPIT detection scheme with betweenness centrality and social trust"],"prefix":"10.1109","author":[{"given":"Miho","family":"Kurata","sequence":"first","affiliation":[]},{"given":"Kentaroh","family":"Toyoda","sequence":"additional","affiliation":[]},{"given":"Iwao","family":"Sasase","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2013.6765923"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1705879"},{"key":"ref12","first-page":"501","article-title":"Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks","volume":"96","author":"sengar","year":"2012","journal-title":"Security and Privacy in Communication Networks ser LNCS Social Informatics and Telecommunications Engineering"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2009.9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2012.6478740"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654830"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.23.81"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.2001.9990249"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646063"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2009.95"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425529"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.204"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2009.19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2011.84"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.cose.2013.07.006","article-title":"Caller-REP: Detecting unwanted calls with caller social strength","volume":"39","year":"2013","journal-title":"Computers & Security"},{"key":"ref2","article-title":"CallRank: Combating SPIT using call duration, social networks and global reputation","author":"balasubramaniyan","year":"2007","journal-title":"Conference on Email and Anti-Spam"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.031611.00112"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.21.188"},{"key":"ref20","first-page":"1695","article-title":"The igraph software package for complex network research","author":"csardi","year":"2006","journal-title":"Inter Journal vol Complex Systems"}],"event":{"name":"2015 21st Asia-Pacific Conference on Communications (APCC)","start":{"date-parts":[[2015,10,14]]},"location":"Kyoto","end":{"date-parts":[[2015,10,16]]}},"container-title":["2015 21st Asia-Pacific Conference on Communications (APCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7400333\/7412489\/07412527.pdf?arnumber=7412527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T09:02:09Z","timestamp":1498294929000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7412527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/apcc.2015.7412527","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}