{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T22:30:35Z","timestamp":1775946635398,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,1]]},"DOI":"10.23919\/wac50355.2021.9559478","type":"proceedings-article","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T19:32:30Z","timestamp":1633894350000},"page":"180-185","source":"Crossref","is-referenced-by-count":9,"title":["Honeypot System for Automatic Reporting of Illegal Online Gambling Sites Utilizing SMS Spam"],"prefix":"10.23919","author":[{"given":"Moohong","family":"Min","sequence":"first","affiliation":[{"name":"Korea University,Department of Information Security School of Cybersecurity,Seoul,South Korea"}]},{"given":"Jemin Justin","family":"Lee","sequence":"additional","affiliation":[{"name":"Korea University,Center for Information Security Technology (CIST),Seoul,South Korea"}]},{"given":"Hyunbeom","family":"Park","sequence":"additional","affiliation":[{"name":"A3security,Consulting Biz Division,Seoul,South Korea"}]},{"given":"Kyungho","family":"Lee","sequence":"additional","affiliation":[{"name":"Korea University,Department of Information Security School of Cybersecurity,Seoul,South Korea"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Impact Of illegal gambling In Hong Kong","year":"2016"},{"key":"ref11","article-title":"Illegal Sports Betting","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4309\/jgi.2010.24.5"},{"key":"ref13","first-page":"3","article-title":"Why would we get attacked? An analysis of attacker&#x2019;s aims behind DDoS attacks","volume":"11","author":"abhishta","year":"2020","journal-title":"J Wireless Mobile Netw Ubiquitous Comput Dependable Appl"},{"key":"ref14","article-title":"Report of Spam Analysis for the First Half of 2020 Years","year":"2020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MELCON.2014.6820574"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099649"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2013.6921920"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2017.8073403"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20951-3_21"},{"key":"ref4","article-title":"Report of Spam Analysis for the First Half of 2019 Years","year":"2019"},{"key":"ref3","article-title":"Illegal gambling sites lure punters with bets on new Covid-19 cases in S&#x2019;pore, Malaysia, Thailand","year":"2020","journal-title":"The Straits Times"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359817"},{"key":"ref5","article-title":"Report of Spam Analysis for the Second Half of 2019 Years","year":"2020"},{"key":"ref8","year":"2017","journal-title":"Preventing criminal risks linked to the sports betting market"},{"key":"ref7","article-title":"Statute Law Database","year":"2005","journal-title":"Gambling Act 2005"},{"key":"ref2","year":"0","journal-title":"Good Practices in Addressing Illegal Betting A Handbook for Horse Racing and Other Sports to Uphold Integrity"},{"key":"ref1","author":"silver","year":"2020","journal-title":"Legal Sports Betting Still Faces Competition From Illegal Market Low State Taxes Could Turn The Tide"},{"key":"ref9","year":"2020","journal-title":"Gambling Statistics in Korea"},{"key":"ref20","first-page":"1","article-title":"Greystar: Fast and accurate detection of sms spam numbers in large cellular networks using grey phone space","author":"jiang","year":"2013","journal-title":"22nd USENIX Security Symposium (USENIX Security'13) USENIX"}],"event":{"name":"2021 World Automation Congress (WAC)","location":"Taipei, Taiwan","start":{"date-parts":[[2021,8,1]]},"end":{"date-parts":[[2021,8,5]]}},"container-title":["2021 World Automation Congress (WAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9559429\/9559420\/09559478.pdf?arnumber=9559478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T13:30:41Z","timestamp":1685021441000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9559478\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,1]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/wac50355.2021.9559478","relation":{},"subject":[],"published":{"date-parts":[[2021,8,1]]}}}