{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:25:46Z","timestamp":1729657546017,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596056","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"213-220","source":"Crossref","is-referenced-by-count":16,"title":["The role of phone numbers in understanding cyber-crime schemes"],"prefix":"10.1109","author":[{"given":"Andrei","family":"Costin","sequence":"first","affiliation":[]},{"given":"Jelena","family":"Isacenkova","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Balduzzi","sequence":"additional","affiliation":[]},{"given":"Aurelien","family":"Francillon","sequence":"additional","affiliation":[]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/2046614.2046618"},{"year":"2011","author":"stone-gross","journal-title":"The Underground Economy of Spam A Botmaster's Perspective of Coordinating Large-scale Spam Campaigns","key":"35"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/1653662.1653691"},{"doi-asserted-by":"publisher","key":"36","DOI":"10.1109\/SP.2011.25"},{"year":"2010","author":"fallmann","journal-title":"Covertly Probing Underground Economy Marketplaces","key":"18"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1016\/S1363-4127(99)80002-8"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1016\/S0167-4048(03)00505-4"},{"key":"34","doi-asserted-by":"crossref","DOI":"10.1145\/1897852.1897872","article-title":"Understanding scam victims: Seven principles for systems security","volume":"54","author":"stajano","year":"2011","journal-title":"Commun ACM"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1080\/15567280601049985"},{"key":"13","article-title":"Catching spam before it arrives: Domain specific dynamic blacklists","volume":"54","author":"cook","year":"2006","journal-title":"Proceedings of the 2006 Australasian workshops on Grid computing and e-research"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1177\/1043986201017004005"},{"year":"2001","author":"buchanan","journal-title":"Investigating and Prosecuting Nigerian Fraud","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/1866307.1866310"},{"year":"2012","author":"herley","journal-title":"Why Do Nigerian Scammers Say They Are from Nigeria?","key":"21"},{"year":"2005","author":"gao","journal-title":"Knowledge-based Information Extraction A Case Study of Recognizing Emails of Nigerian Frauds","key":"20"},{"year":"2009","author":"holz","journal-title":"Learning More about the Underground Economy A Case-study of Keyloggers and Dropzones","key":"22"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1038\/scientificamerican1106-70"},{"year":"2008","author":"jakobsson","journal-title":"Crimeware Understanding New Attacks and Defenses","key":"24"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1145\/2307636.2307660"},{"year":"2008","author":"kreibich","journal-title":"On the Spam Campaign Trail","key":"26"},{"year":"2010","author":"longe","journal-title":"Seeing beyond the Surface Understanding and Tracking Fraudulent Cyber Activities","key":"27"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1109\/CIT.2010.156"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1257\/jep.23.3.3"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"year":"2011","author":"appavu siva","journal-title":"Increased Smart Device Penetration Brings Malware Vulnerability Methods for Detecting Malware in A Large Cellular Network","key":"10"},{"year":"0","key":"1"},{"year":"2011","author":"niemela","journal-title":"Mobile Malware and Monetizing","key":"30"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"doi-asserted-by":"publisher","key":"32","DOI":"10.1145\/2187980.2188211"},{"year":"0","key":"5"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1016\/S1353-4858(05)00202-3"},{"year":"0","key":"4"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596056.pdf?arnumber=6596056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T22:11:26Z","timestamp":1498083086000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596056\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596056","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}