{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:23Z","timestamp":1750309223357,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3657023","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"366-382","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Battle of Wits: To What Extent Can Fraudsters Disguise Their Tracks in International bypass Fraud?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8803-6256","authenticated-orcid":false,"given":"Anne Josiane","family":"Kouam","sequence":"first","affiliation":[{"name":"TU Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1483-6269","authenticated-orcid":false,"given":"Aline Carneiro","family":"Viana","sequence":"additional","affiliation":[{"name":"INRIA, Saclay, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7789-8400","authenticated-orcid":false,"given":"Alain","family":"Tchana","sequence":"additional","affiliation":[{"name":"Grenoble INP, Grenoble, France"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"volume-title":"Comparing Data Mining Classification Algorithms in Detection of Simbox Fraud. Master's thesis","author":"AlBougha Mhd Redwan","key":"e_1_3_2_1_1_1","unstructured":"Mhd Redwan AlBougha. 2016. Comparing Data Mining Classification Algorithms in Detection of Simbox Fraud. Master's thesis. St. Cloud State University."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISY.2017.8080566"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397536.3422248"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2645478"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3284028.3284032"},{"key":"e_1_3_2_1_6_1","volume-title":"CFCA 2019 Fraud Loss Survey. Report. https:\/\/cfca.org\/document\/cfca-2019-fraud-loss-survey-pdf\/","author":"CFCA.","year":"2019","unstructured":"CFCA. 2019. CFCA 2019 Fraud Loss Survey. Report. https:\/\/cfca.org\/document\/cfca-2019-fraud-loss-survey-pdf\/"},{"key":"e_1_3_2_1_7_1","unstructured":"Agence de R\u00e9gulation des T\u00e9l\u00e9communications Cameroun. 2018. INFORMATIONS STATISTIQUES. Technical Report. ART Cameroon Cameroon."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101584"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374688.1374695"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079914"},{"key":"e_1_3_2_1_11_1","unstructured":"Antrax FlamesGroup. 2021. Antrax. https:\/\/gitlab.com\/flamesgroup\/antrax."},{"volume-title":"n.d","author":"Antrax FlamesGroup","key":"e_1_3_2_1_12_1","unstructured":"Antrax FlamesGroup. n.d.. Antrax FlamesGroup playlists. YouTube video. https:\/\/www.youtube.com\/@FlamesGroup\/playlists"},{"key":"e_1_3_2_1_13_1","unstructured":"GoAntiFraud. 2016. GoAntiFraud is a cloud service for efficient GSM Termination. Article. https:\/\/goantifraud.com\/ Accessed: 2020-04-24."},{"key":"e_1_3_2_1_14_1","unstructured":"GoAntiFraud. 2019. GSM Termination for \"Dummies\": What are the \"Favorite\" Numbers? https:\/\/goantifraud.com\/en\/blog\/1125-gsm-termination-for-dummies-what-are-the-favorite-numbers.html."},{"key":"e_1_3_2_1_15_1","unstructured":"GoAntiFraud. 2019. GSM Termination for Dummies: What is IMEI? https:\/\/goantifraud.com\/en\/blog\/1146-gsm-termination-for-dummies-what-is-imei.html."},{"volume-title":"accessed","year":"2023","key":"e_1_3_2_1_16_1","unstructured":"GoAntiFraud. accessed 2023. Call Recording. https:\/\/goantifraud.com\/en\/ejointech-skyline-gsm-termination-solution#call-recording."},{"volume-title":"accessed","year":"2023","key":"e_1_3_2_1_17_1","unstructured":"GoAntiFraud. accessed 2023. Top 5 Popular GSM Gateway Manufacturers. https:\/\/goantifraud.com\/en\/blog\/818-top-5-popular-gsm-gateway-manufacturers.html."},{"key":"e_1_3_2_1_18_1","unstructured":"GoAntiFraud. n.d.. GoAntiFraud Blog. https:\/\/goantifraud.com\/en\/blog"},{"key":"e_1_3_2_1_19_1","unstructured":"GoAntiFraud. n.d.. GoAntiFraud playlists. YouTube video. https:\/\/www.youtube.com\/@GoAntiFraud\/playlists"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature06958"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature06958"},{"key":"e_1_3_2_1_22_1","volume-title":"Machine Learning: ECML","author":"Holmes Geoffrey","year":"2002","unstructured":"Geoffrey Holmes, Bernhard Pfahringer, Richard Kirkby, Eibe Frank, and Mark Hall. 2002. Multiclass Alternating Decision Trees. In Machine Learning: ECML 2002, Tapio Elomaa, Heikki Mannila, and Hannu Toivonen (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 161--172."},{"key":"e_1_3_2_1_23_1","unstructured":"Hybertone. 2022. GSM VoIP Gateway Model GoIP324. http:\/\/www.hybertone.com\/en\/pro_detail.asp?proid=63."},{"key":"e_1_3_2_1_24_1","unstructured":"Hybertone. 2022. Remote SIM Bank. http:\/\/www.hybertone.com\/en\/pro_detail.asp?proid=57."},{"key":"e_1_3_2_1_25_1","unstructured":"Hybertone. 2022. Remote SIM Bank. http:\/\/www.hybertone.com\/en\/pro_detail.asp?proid=43."},{"key":"e_1_3_2_1_26_1","first-page":"4","article-title":"Study to use NEO4J to analysis and detection SIM-BOX fraud","volume":"17","author":"Ibrahem Soliman Alsadi Nassir Abuhamoud","year":"2019","unstructured":"Nassir Abuhamoud Ibrahem Soliman Alsadi. 2019. Study to use NEO4J to analysis and detection SIM-BOX fraud. Journal of Pure & Applied Sciences 17, 4 (Jan. 2019), 31--35.","journal-title":"Journal of Pure & Applied Sciences"},{"key":"e_1_3_2_1_27_1","unstructured":"Ibrahim Ighneiwa and Hussamedin Mohamed. 2017. Bypass Fraud Detection: Artificial Intelligence Approach. arXiv:1711.04627 [cs.CY]"},{"key":"e_1_3_2_1_29_1","volume-title":"Helsinki facts and figures","author":"Jaakola Ari","year":"2019","unstructured":"Ari Jaakola, Teemu Vass, Solja Saarto, and Lotta Haglund. 2019. Helsinki facts and figures 2019. Technical Report. City Executive Office, Urban Research and Statistics, Helsinki, Finland."},{"volume-title":"SIM-Box Fraud Detection Using Data Mining Techniques: The Case of ethio telecom. Ph. D. Dissertation","author":"Kahsu Hagos","key":"e_1_3_2_1_30_1","unstructured":"Hagos Kahsu. 2018. SIM-Box Fraud Detection Using Data Mining Techniques: The Case of ethio telecom. Ph. D. Dissertation. School of Electrical and Computer Engineering Addis Ababa Institute of Technology."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMTECH.2019.8737828"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","unstructured":"David Kotz Tristan Henderson Ilya Abyzov and Jihwang Yeo. 2009. CRAWDAD dataset dartmouth\/campus (v. 2009-09-09). Downloaded from https:\/\/crawdad.org\/dartmouth\/campus\/20090909. 10.15783\/C7F59T","DOI":"10.15783\/C7F59T"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3100916"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2011.123"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVIA.2015.7351891"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848087"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2491361"},{"key":"e_1_3_2_1_40_1","volume-title":"Preventing SIM Box Fraud Using Device Model Fingerprinting. In Network and Distributed Systems Security (NDSS) Symposium. The Internet Society","author":"Oh Beomseok","year":"2023","unstructured":"Beomseok Oh, Junho Ahn, Sangwook Bae, Mincheol Son, Yonghwa Lee, Minsuk Kang, and Yongdae Kim. 2023. Preventing SIM Box Fraud Using Device Model Fingerprinting. In Network and Distributed Systems Security (NDSS) Symposium. The Internet Society 2023, San Diego, CA, USA."},{"key":"e_1_3_2_1_41_1","unstructured":"OpenCellID. 2022. The world's largest Open Database of Cell Towers. https:\/\/www.opencellid.org\/"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831196"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100240"},{"key":"e_1_3_2_1_44_1","unstructured":"Merve Sahin. 2017. Understanding Telephony Fraud as an Essential Step to Better Fight It. Ph. D. Dissertation. TELECOM ParisTech."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5860-5_69"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.11113\/jt.v74.2649"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2013.34"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","unstructured":"James Scott Richard Gass Jon Crowcroft Pan Hui Christophe Diot and Augustin Chaintreau. 2009. CRAWDAD dataset cambridge\/haggle (v. 2009-05-29). Downloaded from https:\/\/crawdad.org\/cambridge\/haggle\/20090529\/imote. traceset: imote. 10.15783\/C70011","DOI":"10.15783\/C70011"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459625"},{"volume-title":"Near-Real Time SIM-box Fraud Detection Using Machine Learning in the case of ethio telecom. Ph. D. Dissertation","author":"Tesfaye Fitsum","key":"e_1_3_2_1_51_1","unstructured":"Fitsum Tesfaye. 2020. Near-Real Time SIM-box Fraud Detection Using Machine Learning in the case of ethio telecom. Ph. D. Dissertation. School of Electrical and Computer Engineering Addis Ababa Institute of Technology."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003323"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-020-00808-w"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2012.03.002"}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3657023","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3657023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":51,"alternative-id":["10.1145\/3634737.3657023","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3657023","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}