{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:25:10Z","timestamp":1766298310349,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978334","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1106-1117","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Over-The-Top Bypass"],"prefix":"10.1145","author":[{"given":"Merve","family":"Sahin","sequence":"first","affiliation":[{"name":"Eurecom &amp; Monaco Digital Security Agency, Biot, France"}]},{"given":"Aur\u00e9lien","family":"Francillon","sequence":"additional","affiliation":[{"name":"Eurecom, Biot, France"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"volume-title":"World Radiocommunication Conference","year":"2012","author":"Alternative","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"BSMilano Worldwide National Numbering Plans Collection. http:\/\/bsmilano.it\/.  BSMilano Worldwide National Numbering Plans Collection. http:\/\/bsmilano.it\/."},{"volume-title":"Nexmo Knowledge base","year":"2016","author":"Details","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"The international public telecommunications numbering plan. ITU-T Recommendation E.164 1997.  The international public telecommunications numbering plan. ITU-T Recommendation E.164 1997."},{"volume-title":"whitepaper","year":"2013","author":"Subex Limited Subex","key":"e_1_3_2_1_5_1"},{"volume-title":"2015 global fraud loss surveys","year":"2015","author":"Communications Fraud Control Association (cfca)","key":"e_1_3_2_1_6_1"},{"volume-title":"October","year":"2015","author":"Smart","key":"e_1_3_2_1_7_1"},{"volume-title":"Revector Company Blog","year":"2016","author":"New","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866320"},{"key":"e_1_3_2_1_10_1","first-page":"A4","article-title":"barth, call termination on ott network, patent wo 2014087269 a4","volume":"2014087269","author":"Barth M.","year":"2014","journal-title":"Patent WO"},{"volume-title":"Telecom Regulatory Authority of India","year":"2015","author":"Bhawan M. D.","key":"e_1_3_2_1_11_1"},{"volume-title":"Fraud for thought blog","year":"2012","author":"Bignell C.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282386"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484356"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"volume-title":"Telecom 101","year":"2008","author":"Coll E.","key":"e_1_3_2_1_16_1"},{"volume-title":"TechCrunch","year":"2013","author":"Crook J.","key":"e_1_3_2_1_17_1"},{"volume-title":"Signaling System No. 7 (SS7\/C7): protocol, architecture, and services","year":"2005","author":"Dryburgh L.","key":"e_1_3_2_1_18_1"},{"volume-title":"Analysis and signature of skype voip session traffic","year":"2006","author":"Ehlert S.","key":"e_1_3_2_1_19_1"},{"volume-title":"K. J. Kim and K.-Y","year":"2012","author":"Elmi A.","key":"e_1_3_2_1_20_1"},{"volume-title":"November","year":"2015","key":"e_1_3_2_1_21_1"},{"volume-title":"First IP Telephony Workshop","year":"2000","author":"Eyers T.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581294"},{"volume-title":"Fisher Investments on Telecom","year":"2011","author":"Investments Fisher","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575121"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1186560"},{"volume-title":"Voice calls for free: How the black market establishes free phone calls - trapped and uncovered by a voip honeynet","year":"2013","author":"Gruber M.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","unstructured":"S. Guerraoui. Morocco banned skype viber whatsapp and facebook messenger. it didn't go down well. middleeasteye.net 9\/3\/2016.  S. Guerraoui. Morocco banned skype viber whatsapp and facebook messenger. it didn't go down well. middleeasteye.net 9\/3\/2016."},{"volume-title":"Abusing phone numbers and cross-application features for crafting targeted attacks. CoRR, abs\/1512.07330","year":"2015","author":"Gupta S.","key":"e_1_3_2_1_29_1"},{"volume-title":"rec-e.771","year":"1996","author":"Network","key":"e_1_3_2_1_30_1"},{"volume-title":"rec-e.721","year":"1999","author":"Network","key":"e_1_3_2_1_31_1"},{"volume-title":"Ott bypass","year":"2016","author":"ITU Study Group 3, Question 9\/3.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364024"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125170.1125230"},{"volume-title":"Computer and communication sciences","year":"2010","author":"Le Boudec J.-Y.","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","first-page":"1","article-title":"A technique for the measurement of attitudes","volume":"142","author":"Likert R.","year":"1932","journal-title":"Archives of Psychology"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449298808901877"},{"volume-title":"R. 88, nr 5b: 154--156","year":"2012","author":"Mati\u0107 V.","key":"e_1_3_2_1_38_1"},{"volume-title":"Morgan Kaufmann","year":"2007","author":"Medhi D.","key":"e_1_3_2_1_39_1"},{"volume-title":"Arab Regional Forum on Future Networks: Regulatory and Policy Aspects in Converged Networks","year":"2015","author":"Mnakri M.","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848087"},{"volume-title":"USENIX Security","year":"2015","author":"Reaves B.","key":"e_1_3_2_1_42_1"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.7663"},{"volume-title":"NDSS","year":"2012","author":"Schrittwieser S.","key":"e_1_3_2_1_44_1"},{"volume-title":"Sept.","year":"2014","key":"e_1_3_2_1_45_1"},{"volume-title":"September","year":"2014","author":"Wasmi N. A.","key":"e_1_3_2_1_46_1"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978334","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:17Z","timestamp":1750222577000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978334"}},"subtitle":["Study of a Recent Telephony Fraud"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":46,"alternative-id":["10.1145\/2976749.2978334","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978334","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}