{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T19:23:00Z","timestamp":1769541780147,"version":"3.49.0"},"reference-count":41,"publisher":"Tsinghua University Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Big Data Min. Anal."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.26599\/bdma.2023.9020020","type":"journal-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T13:46:40Z","timestamp":1713793600000},"page":"340-356","source":"Crossref","is-referenced-by-count":0,"title":["ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph"],"prefix":"10.26599","volume":"7","author":[{"given":"Muhammad Ajmal","family":"Azad","sequence":"first","affiliation":[{"name":"College of Comnputer Science, Birmingham City University,Birmingham,UK,B5 5JU"}]},{"given":"Junaid","family":"Arshad","sequence":"additional","affiliation":[{"name":"College of Comnputer Science, Birmingham City University,Birmingham,UK,B5 5JU"}]},{"given":"Farhan","family":"Riaz","sequence":"additional","affiliation":[{"name":"School of Computer Science University of Lincoln,Lincoln,UK,LN6 7TS"}]}],"member":"11138","reference":[{"key":"ref1","article-title":"GSMA","volume-title":"Number of global mobile subscribers to surpass five billion this year, finds new GSMA study","year":"2017"},{"key":"ref2","article-title":"Spam phone calls cost U.S. small businesses half-billion dollars in lost productivity","volume-title":"marchex study finds","year":"2014"},{"key":"ref3","article-title":"U.S. Phones were hit by more than 50 billion robocalls in 2021","year":"2023"},{"key":"ref4","article-title":"FTC releases updated do not call registry data book; impersonator fraud tops list of consumer complaints","author":"Jennifer","year":"2023"},{"key":"ref5","article-title":"Truecaller insights 2022 U.S. spam & scam report","year":"2023"},{"key":"ref6","first-page":"1","article-title":"Developing a legally compliant reachability management system as a countermeasure against SPIT","volume-title":"Proc. 3rd Annu. VoIP Security Workshop","author":"Hansen"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1705879"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2941724"},{"key":"ref9","first-page":"1","article-title":"Multistage SPIT detection in transit VoIP","volume-title":"Proc. 19th Int. Conf. Software, Telecommunications and Computer Networks","author":"Azad"},{"key":"ref10","first-page":"1","article-title":"Call Rank: Combating SPIT using call duration, social networks and global reputation","volume-title":"Proc. 4th Conf. Email and Anti-Spam","author":"Balasubramaniyan"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1216895.1216897"},{"key":"ref12","first-page":"5","article-title":"Detecting spam in VoIP networks","volume-title":"Proc. Steps to Reducing Unwanted Traffic on the Internet Workshop","author":"Dantu"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.07.006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.192"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.05.007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019792"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2771251"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2382573"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935195"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099671"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14711\/thesis-b987573"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.132"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31909-9_31"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23176"},{"key":"ref25","first-page":"723","article-title":"Mobi Pot: Understanding mobile telephony threats with honeycards","volume-title":"Proc. 11th ACM on Asia Conf. Computer and Communications Security","author":"Balduzzi"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00034"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196553"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.03.005"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36883-7_21"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363654"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963108"},{"key":"ref33","first-page":"109","article-title":"PinDrOp: Using single-ended audio features to determine call provenance","volume-title":"Proc. 17th ACM Conf. Computer and Communications Security","author":"Balasubramaniyan"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1595637.1595641"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2009.95"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270323"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1656"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23243"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.02.009"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.026"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2011.84"}],"container-title":["Big Data Mining and Analytics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8254253\/10506765\/10506815.pdf?arnumber=10506815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T06:07:12Z","timestamp":1769494032000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10506815\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":41,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.26599\/bdma.2023.9020020","relation":{},"ISSN":["2096-0654","2097-406X"],"issn-type":[{"value":"2096-0654","type":"print"},{"value":"2097-406X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}