{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:53:03Z","timestamp":1755838383130,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/infocom.2014.6848087","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T15:18:13Z","timestamp":1406647093000},"page":"1519-1526","source":"Crossref","is-referenced-by-count":18,"title":["Analysis and detection of SIMbox fraud in mobility networks"],"prefix":"10.1109","author":[{"given":"Ilona","family":"Murynets","sequence":"first","affiliation":[]},{"given":"Michael","family":"Zabarankin","sequence":"additional","affiliation":[]},{"given":"Roger Piqueras","family":"Jover","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Panagia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-8471-4_9","article-title":"Statistical decision problems: Selected concepts and portfolio safeguard case studies","volume":"85","author":"zabarankin","year":"2014","journal-title":"Springer Series on Optimization and Its Applications"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"journal-title":"Multiclass Alternating Decision Trees","year":"2002","author":"holmes","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000027782.67192.13"},{"journal-title":"Physical Layer Procedures (FDD) 3GPP TS 25 214 V3 17 0","year":"1999","key":"13"},{"journal-title":"The Alternating Decision Tree Learning Algorithm","year":"1999","author":"freund","key":"14"},{"journal-title":"JDSU","article-title":"RCATS-Remote cellular active test system","year":"0","key":"11"},{"key":"12","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"baraba?si","year":"1999","journal-title":"Science"},{"key":"21","article-title":"Threat of mobile malware and abuse","author":"bobotek","year":"2010","journal-title":"Messaging Anti-Abuse Working Group (MAAWG)"},{"key":"20","article-title":"Spam invades a last refuge, the cellphone","author":"perlroth","year":"2012","journal-title":"The New York Times"},{"key":"22","article-title":"GGTracker technical tear down","author":"strazzere","year":"0","journal-title":"Lookout Mobile Security"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0020294"},{"key":"25","first-page":"477","article-title":"The detection of fraud in mobile phone networks","volume":"6","author":"barson","year":"1996","journal-title":"Neural Network World"},{"key":"26","article-title":"Wideband GSM sniffing","author":"nohl","year":"2010","journal-title":"27th Chaos Communication Congress"},{"journal-title":"SIM Box Detection Service","year":"0","key":"27"},{"journal-title":"Xintec","article-title":"SIMbox detector","year":"0","key":"28"},{"journal-title":"Reuters","article-title":"Raids on sim box\/gsm gateway fraudsters save mobile operators millions","year":"0","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70027-7"},{"journal-title":"Vonage Calling Cards","year":"0","key":"10"},{"key":"1","article-title":"Mobile revenue assurance & fraud management","author":"windsor","year":"0","journal-title":"Juniper Research"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398822"},{"key":"6","article-title":"Analysis of sms spam in mobility networks","volume":"3","author":"murynets","year":"2013","journal-title":"International Journal on Advanced Computing & Science (IJACSA"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5860-5_69"},{"journal-title":"Revector","article-title":"Fraud in the mobile world","year":"0","key":"4"},{"journal-title":"ZapTel Calling Cards","year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"IEEE INFOCOM 2014 - IEEE Conference on Computer Communications","start":{"date-parts":[[2014,4,27]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,5,2]]}},"container-title":["IEEE INFOCOM 2014 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6839150\/6847911\/06848087.pdf?arnumber=6848087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:29:50Z","timestamp":1498152590000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6848087\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/infocom.2014.6848087","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}