{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:02Z","timestamp":1750220162591,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Special Funds for the Cultivation of Guangdong College Students' Scientific and Technological Innovation (?Climbing Program? Special Funds)","award":["pdjh2021b0356"],"award-info":[{"award-number":["pdjh2021b0356"]}]},{"name":"Special Funds for the Cultivation of Guangdong College Students' Scientific and Technological Innovation (?Climbing Program? Special Fund)","award":["pdjh2022b0373"],"award-info":[{"award-number":["pdjh2022b0373"]}]},{"name":"Training plan for young backbone teachers of Guangdong police college","award":["2020QNGG03"],"award-info":[{"award-number":["2020QNGG03"]}]},{"name":"Youth scientific research project of Guangdong police college","award":["2022-QN04"],"award-info":[{"award-number":["2022-QN04"]}]},{"name":"Cooperative education project of industry university cooperation between Ministry of education and 360 enterprise security group -- Web Attack and Defense Technology (web security and operation)","award":["3ccc6d0b-6740-4680-8577-54c121c24fdb"],"award-info":[{"award-number":["3ccc6d0b-6740-4680-8577-54c121c24fdb"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3558819.3558820","type":"proceedings-article","created":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T01:37:33Z","timestamp":1666834653000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Application of Association Rules in Telecommunication Network Fraud Cases"],"prefix":"10.1145","author":[{"given":"Shuo","family":"Wen","sequence":"first","affiliation":[{"name":"Guangdong Police College, China"}]},{"given":"Weiting","family":"Huang","sequence":"additional","affiliation":[{"name":"Guangdong Police College, China"}]},{"given":"Qi","family":"Wu","sequence":"additional","affiliation":[{"name":"Guangdong Police College, China"}]},{"given":"Jinying","family":"Zheng","sequence":"additional","affiliation":[{"name":"Guangdong Police College, China"}]},{"given":"Peixin","family":"Wang","sequence":"additional","affiliation":[{"name":"Guangdong Police College, China"}]},{"given":"Zhilong","family":"Ye","sequence":"additional","affiliation":[{"name":"Guangdong Police College, China"}]},{"given":"Shangxuan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Guangdong Police College, China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"e_1_3_2_1_2_1","volume-title":"Research of Telecommunication Network Fraud Cases Characteristics and Control Countermeasures: Data Mining based on Python","author":"Ting DI","year":"2020","unstructured":"DI Ting . Research of Telecommunication Network Fraud Cases Characteristics and Control Countermeasures: Data Mining based on Python . Shanxi Normal University , 2020 DI Ting. Research of Telecommunication Network Fraud Cases Characteristics and Control Countermeasures: Data Mining based on Python. Shanxi Normal University,2020"},{"issue":"13","key":"e_1_3_2_1_3_1","first-page":"219","article-title":"Research on mining association rules of fraud cases based on Apriori algorithm. Management informatization","volume":"18","author":"Xiaobing Li","year":"2015","unstructured":"Li Xiaobing . Research on mining association rules of fraud cases based on Apriori algorithm. Management informatization in China , 2015 , 18 ( 13 ): 219 - 222 . Li Xiaobing. Research on mining association rules of fraud cases based on Apriori algorithm. Management informatization in China, 2015, 18(13):219-222.","journal-title":"China"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-05-2016-0029"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.19335\/j.cnki.2095-6649.2021.6.110"},{"key":"e_1_3_2_1_6_1","volume-title":"Identification and management of fraud calls based on big data mining technology. Changjiang information and communication","author":"Jingjing Bai","year":"2021","unstructured":"Bai Jingjing , Zhang Lihong . Identification and management of fraud calls based on big data mining technology. Changjiang information and communication , 2021 , 34(05):126-128. Bai Jingjing, Zhang Lihong. Identification and management of fraud calls based on big data mining technology. Changjiang information and communication, 2021, 34(05):126-128."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.193"},{"key":"e_1_3_2_1_8_1","volume-title":"Huang. Causes and Prevention of Telecommunication Network Fraud. Proceedings of the 2nd International Conference on Humanities Science and Society Development (ICHSSD 2017)","author":"Zuhe","year":"2017","unstructured":"Zuhe Huang. Causes and Prevention of Telecommunication Network Fraud. Proceedings of the 2nd International Conference on Humanities Science and Society Development (ICHSSD 2017) , 2017 . Zuhe Huang. Causes and Prevention of Telecommunication Network Fraud. Proceedings of the 2nd International Conference on Humanities Science and Society Development (ICHSSD 2017), 2017."},{"key":"e_1_3_2_1_9_1","volume-title":"On the Countermeasures of preventing and controlling the crime of telecommunication fraud","author":"Yunlong Lai","year":"2019","unstructured":"Lai Yunlong . On the Countermeasures of preventing and controlling the crime of telecommunication fraud . Jilin : Jilin University , 2019 : 18-20. Lai Yunlong. On the Countermeasures of preventing and controlling the crime of telecommunication fraud. Jilin: Jilin University, 2019: 18-20."},{"key":"e_1_3_2_1_10_1","unstructured":"CAICT. Research Report on the Governance of Telecom Network Fraud under the New Situation (2020) published by CAICT.(2020-12-18)[2022-2-21] https:\/\/weibo.com\/ttarticle\/p\/show?id=2309404583516829516058&sudaref=www.baidu.com  CAICT. Research Report on the Governance of Telecom Network Fraud under the New Situation (2020) published by CAICT.(2020-12-18)[2022-2-21] https:\/\/weibo.com\/ttarticle\/p\/show?id=2309404583516829516058&sudaref=www.baidu.com"},{"key":"e_1_3_2_1_11_1","unstructured":"Xiaobaogong. General Trend Big Data Analysis of the Telecom Fraud Crime in 2011-2021 (the first volume).(2021-5-31)[2022-2-24]https:\/\/mp.weixin.qq.com\/s?__biz=MzU2OTY1OTg3MQ==&mid=2247494063&idx=1&sn=5071884b45e0dcb697f5bf450acc27fb&chksm=fcf9f11fcb8e7809d846443bbf6c41f0f1629a643e7f1adfbf6a1dc9a4709c407bf150098982&scene=21#wechat_redirect  Xiaobaogong. General Trend Big Data Analysis of the Telecom Fraud Crime in 2011-2021 (the first volume).(2021-5-31)[2022-2-24]https:\/\/mp.weixin.qq.com\/s?__biz=MzU2OTY1OTg3MQ==&mid=2247494063&idx=1&sn=5071884b45e0dcb697f5bf450acc27fb&chksm=fcf9f11fcb8e7809d846443bbf6c41f0f1629a643e7f1adfbf6a1dc9a4709c407bf150098982&scene=21#wechat_redirect"},{"volume-title":"China Mobile Security Report for the First Half of","year":"2021","key":"e_1_3_2_1_12_1","unstructured":"360 browser. China Mobile Security Report for the First Half of 2021 .(2021-8-24)[2022-2-21]https:\/\/www.360.cn\/n\/12015.html 360 browser. China Mobile Security Report for the First Half of 2021.(2021-8-24)[2022-2-21]https:\/\/www.360.cn\/n\/12015.html"}],"event":{"name":"ICCSIE2022: 7th International Conference on Cyber Security and Information Engineering","acronym":"ICCSIE2022","location":"Brisbane QLD Australia"},"container-title":["Proceedings of the 7th International Conference on Cyber Security and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3558820","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558819.3558820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:28Z","timestamp":1750186828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3558820"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":12,"alternative-id":["10.1145\/3558819.3558820","10.1145\/3558819"],"URL":"https:\/\/doi.org\/10.1145\/3558819.3558820","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}