{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:29:48Z","timestamp":1775244588315,"version":"3.50.1"},"reference-count":99,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/comst.2021.3100916","type":"journal-article","created":{"date-parts":[[2021,7,29]],"date-time":"2021-07-29T20:04:13Z","timestamp":1627589053000},"page":"2295-2323","source":"Crossref","is-referenced-by-count":13,"title":["<i>SIMBox<\/i> Bypass Frauds in Cellular Networks: Strategies, Evolution, Detection, and Future Directions"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8803-6256","authenticated-orcid":false,"given":"Anne Josiane","family":"Kouam","sequence":"first","affiliation":[]},{"given":"Aline Carneiro","family":"Viana","sequence":"additional","affiliation":[]},{"given":"Alain","family":"Tchana","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2017","journal-title":"Session Period Script Commit Hash ee1d40cf"},{"key":"ref38","year":"0","journal-title":"Instructions for Using Multi-SIM Function of DWG"},{"key":"ref33","year":"2020","journal-title":"Smart GSM Termination With ANTRAX Solutions"},{"key":"ref32","year":"2020","journal-title":"Pilot GSM Server"},{"key":"ref31","year":"2020","journal-title":"Fraud Prevention Services"},{"key":"ref30","year":"2020","journal-title":"Webpage"},{"key":"ref37","year":"2010","journal-title":"SIM Server User Manual Version 2 0 1"},{"key":"ref36","year":"2016","journal-title":"GoIP User Manual Version 1 5"},{"key":"ref35","year":"2017","journal-title":"Sim Server Factor Script Commit Hash ee1d40cf"},{"key":"ref34","year":"2020","journal-title":"Webpage"},{"key":"ref28","year":"2020","journal-title":"Webpage"},{"key":"ref27","year":"2020","journal-title":"CSG Assure Illegal Bypass Detection"},{"key":"ref29","year":"2020","journal-title":"Test Call Generator"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMTECH.2019.8737828"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-020-00808-w"},{"key":"ref21","article-title":"Near-real time SIM-box fraud detection using machine learning in the case of ethio telecom","author":"tesfaye","year":"2020"},{"key":"ref24","first-page":"31","article-title":"Study to use NEO4J to analysis and detection SIM-BOX fraud","volume":"17","author":"alsadi","year":"2019","journal-title":"Journal of Pure & Applied Sciences"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2668260.2668272"},{"key":"ref26","year":"2013","journal-title":"Subex Wholesale Fraud Management Survey 2013 Is the Industry Ready to Tackle a Growing Issue?"},{"key":"ref25","year":"2011","journal-title":"Bypass fraud- are you getting it right?"},{"key":"ref50","year":"2018","journal-title":"GoIP32-X4 Quick Setup Manual"},{"key":"ref51","year":"2020","journal-title":"Goantifraud GSM Termination in Africa Top 5 Destinations in 2020"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.03.010"},{"key":"ref58","year":"2003","journal-title":"Telecommunication Management Charging Management Charging Data Record (CDR) Parameter Description Specification"},{"key":"ref57","author":"guerraoui","year":"2016","journal-title":"Morocco Banned Skype Viber Whatsapp and Facebook Messenger It Didn&#x2019;t Go Down Well"},{"key":"ref56","author":"morrow","year":"2017","journal-title":"Telco Corruption Fuels Simbox Frauds"},{"key":"ref55","article-title":"Access to mobile services and proof of identity 2019: Assessing the impact on digital and financial inclusion","author":"theodorou","year":"2019"},{"key":"ref54","article-title":"International traffic termination","year":"2014","journal-title":"OECD Digital Economy Papers No 238"},{"key":"ref53","year":"2018","journal-title":"Top-5 Popular GSM Gateway Manufacturers"},{"key":"ref52","year":"2016","journal-title":"10 Misconceptions About GSM Termination"},{"key":"ref40","year":"2017","journal-title":"Activity Period Script Commit Hash ee1d40cf"},{"key":"ref4","article-title":"An assessment of international voice traffic termination rates","year":"2015"},{"key":"ref3","article-title":"CFCA 2017 fraud loss survey","year":"2017"},{"key":"ref6","year":"2016","journal-title":"Simbox Fraud and OTT Bypass Biggest Threats to Mobile Operator Revenues"},{"key":"ref5","year":"2021","journal-title":"Webpage"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079914"},{"key":"ref49","year":"2017","journal-title":"SMS Commit Hash ee1d40cf"},{"key":"ref7","year":"2015","journal-title":"Mapping the Interconnect Resale Routes of Fraudsters How a Global Robot Network Detects Voice and SMS Bypass"},{"key":"ref9","first-page":"833","article-title":"Boxed out: Blocking cellular interconnect bypass fraud at the network edge","author":"reaves","year":"2015","journal-title":"Proc 24th USENIX Conf Security Symp"},{"key":"ref46","year":"2017","journal-title":"HTTP Request Commit Hash ee1d40cf"},{"key":"ref45","year":"2017","journal-title":"IMEI Generator Script Commit Hash ee1d40cf"},{"key":"ref48","year":"2005","journal-title":"2N VoiceBlue Enterprise User Manual Version 1 11"},{"key":"ref47","year":"2017","journal-title":"USSD Commit Hash ee1d40cf"},{"key":"ref42","year":"2019","journal-title":"EJOIN ACOM5xx VoIP Gateway User Manual Version 1 4"},{"key":"ref41","year":"2017","journal-title":"UC2000-VE\/F\/G GSM\/CDMA\/WCDMA VoIP Gateway User Manual Version 2 2"},{"key":"ref44","year":"2017","journal-title":"Gateway Selector Script Version 1 01 1"},{"key":"ref43","year":"2017","journal-title":"Gateway Selector Script Commit Hash ee1d40cf"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36755-1_14"},{"key":"ref72","first-page":"124","article-title":"The alternating decision tree learning algorithm","author":"freund","year":"1999","journal-title":"Proc 16th Int Conf Mach Learn"},{"key":"ref71","first-page":"1589","article-title":"Probabilistic boosting-tree: Learning discriminative models for classification, recognition, and clustering","volume":"2","author":"tu","year":"2005","journal-title":"Proc 10th IEEE Int Conf Comput Vis (ICCV)"},{"key":"ref70","author":"haykin","year":"2007","journal-title":"Neural Networks A Comprehensive Foundation"},{"key":"ref76","author":"traut","year":"2012","journal-title":"Getting Started Guide for Oracle Complex Event Processing Version 11 1 1 6 3"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50038-X"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000027782.67192.13"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142520"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2629586"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866320"},{"key":"ref60","author":"blackman","year":"2011","journal-title":"Telecommunications Regulation Handbook Tenth Anniversary Edition"},{"key":"ref62","article-title":"Understanding telephony fraud as an essential step to better fight it","author":"sahin","year":"2017"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.243"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48247-5_27"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312303"},{"key":"ref65","doi-asserted-by":"crossref","DOI":"10.1596\/978-1-4648-1259-0","article-title":"The global findex database 2017 measuring financial inclusion and the fintech revolution","author":"demirg\u00fc\u00e7-kunt","year":"2018"},{"key":"ref66","year":"2019","journal-title":"Araxxe on the Art of Deception and Analysis in SIM Box Fraud Warfare"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/11790853_41"},{"key":"ref68","first-page":"13","article-title":"The CRISP-DM model: The new blueprint for data mining","volume":"5","author":"shearer","year":"2000","journal-title":"J Data Warehousing"},{"key":"ref2","first-page":"31","article-title":"A study on Internet bypass fraud: National security threat","volume":"7","author":"baskar","year":"2019","journal-title":"Forensic Research & Criminology International"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00063-5"},{"key":"ref1","article-title":"CFCA 2019 fraud loss survey, version 1.0","year":"2019"},{"key":"ref95","author":"wasmi","year":"2014","journal-title":"TRA Says Viber Is &#x2018;Unlicensed&#x2019; in the UAE"},{"key":"ref94","year":"2015","journal-title":"Regulatory framework for over-the-top (OTT) services"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2015\/v8iS4\/62238"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2525398"},{"key":"ref91","article-title":"Virtual SIM card for mobile handsets","author":"shi","year":"2014"},{"key":"ref90","article-title":"Method and system for international roaming using virtual SIM card","author":"liu","year":"2008"},{"key":"ref98","article-title":"Telephone with voice changer and control method and control program for the telephone","author":"horikawa","year":"2006"},{"key":"ref99","article-title":"Telecommunication terminal able to modify the voice transmitted during a telephone call","author":"bonnard","year":"2010"},{"key":"ref96","article-title":"The impact of taxation on the digital economy","author":"katz","year":"2015"},{"key":"ref97","article-title":"Systems and methods for digital multimedia capture using haptic control, cloud voice changer, and protecting digital multimedia privacy","author":"zhou","year":"2015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVIA.2015.7351891"},{"key":"ref11","article-title":"Technical note on illegal international long distance telephone exchange in India","author":"kumar","year":"2012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.40"},{"key":"ref13","first-page":"35","article-title":"Grappling with the challenges of interconnect bypass fraud","volume":"6","author":"okumbor n anthony","year":"2019","journal-title":"IOSR J Mob Comput Appl"},{"key":"ref14","article-title":"Comparing data mining classification algorithms in detection of simbox fraud","author":"albougha","year":"2016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848087"},{"key":"ref16","first-page":"575","article-title":"Detecting SIM box fraud using neural network","author":"sallehuddin","year":"2013","journal-title":"IT Convergence and Security"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2692307"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.11113\/jt.v74.2649"},{"key":"ref81","article-title":"Network protocol analysis: A new tool for blocking international bypass fraud before revenue is lost","year":"2015"},{"key":"ref18","article-title":"Real-time grey call detection system using complex event processing","author":"kehelwala","year":"2015"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2461602"},{"key":"ref19","article-title":"Sim-box fraud detection using data mining techniques: The case of ethio telecom","author":"kahsu","year":"2018"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2328098"},{"key":"ref80","author":"garofolo","year":"1993","journal-title":"TIMIT Acoustic-Phonetic Continuous Speech Corpus"},{"key":"ref89","article-title":"System and method for virtual SIM card","author":"polehn","year":"2018"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900271"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900287"},{"key":"ref87","article-title":"The virtual SIM&#x2014;A feasibility study","author":"richarme","year":"2008"},{"key":"ref88","article-title":"Virtual SIM card cloud platform","author":"zhao","year":"2019"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9621320\/09501030.pdf?arnumber=9501030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:25Z","timestamp":1652194345000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9501030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":99,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2021.3100916","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}