{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:33:11Z","timestamp":1761294791074,"version":"3.38.0"},"reference-count":28,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.056854","type":"journal-article","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T07:14:10Z","timestamp":1729149250000},"page":"3301-3323","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["DC-FIPD: Fraudulent IP Identification Method Based on Homology Detection"],"prefix":"10.32604","volume":"81","author":[{"given":"Yuanyuan","family":"Ma","sequence":"first","affiliation":[]},{"given":"Ang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Cunzhi","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Ruixia","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Jinghui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ruixiang","family":"Li","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","series-title":"2019 IEEE Symp. Ser. Comput. Intell. (SSCI)","first-page":"64","article-title":"Detect malicious IP addresses using cross-protocol analysis","author":"Huang","year":"2019"},{"key":"ref2","series-title":"Proc. 2018 Asia Conf. Comput. Commun. Secur. (ASIACCS \u201918)","first-page":"273","article-title":"Augmenting telephone spam blacklists by mining large CDR datasets","author":"Liu","year":"2018"},{"key":"ref3","unstructured":"UNSPAM, \u201cProject Honeypot,\u201d Accessed: Jul. 15, 2024. [Online]. Available: https:\/\/www.projecthoneypot.org"},{"key":"ref4","unstructured":"S. Linford et al., \u201cSpamhaus,\u201d Accessed: Jul. 15, 2024. [Online]. Available: https:\/\/www.spamhaus.org"},{"key":"ref5","series-title":"Proc. 2018 Work. IoT Secur. Priv. (IoT S&P \u201918)","first-page":"36","article-title":"IP-based IoT device detection","author":"Guo","year":"2018"},{"key":"ref6","series-title":"2010 3rd IEEE Int. Conf. Broadband Netw. Multim. Techn. (IC-BNMT)","first-page":"1192","article-title":"The metric of bulk repeated call detection","author":"Hu","year":"2011"},{"key":"ref7","series-title":"2010 Second Int. Conf. Commun. Syst. Netw. (COMSNETS 2010)","first-page":"1","article-title":"On the effectiveness of IP reputation for spam filtering","author":"Esquivel","year":"2010"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-018-0008-5","article-title":"Detecting telecommunication fraud by understanding the contents of a call","volume":"1","author":"Zhao","year":"Aug. 2018","journal-title":"Cybersecurity"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1016\/j.future.2022.07.020","article-title":"BTG: A bridge to graph machine learning in telecommunications fraud detection","volume":"137","author":"Hu","year":"Dec. 2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref10","series-title":"2017 Conf. Techn. Appl. Artif. Intel. (TAAI)","first-page":"6","article-title":"Data-driven and deep learning methodology for deceptive advertising and phone scams detection","author":"Huang","year":"2017"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"4564","DOI":"10.1109\/TDSC.2022.3228797","article-title":"Exploiting spatial-temporal behavior patterns for fraud detection in telecom networks","volume":"20","author":"Chu","year":"2023","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.3390\/e25010150","article-title":"Mining mobile network fraudsters with augmented graph neural networks","volume":"25","author":"Hu","year":"Jan. 2023","journal-title":"Entropy"},{"key":"ref13","article-title":"GraphNEI: A GNN-based network entity identification method for IP geolocation","volume":"235","author":"Ma","year":"Jul. 2023","journal-title":"Comput. Netw."},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-022-26518-y","article-title":"High-accuracy model recognition method of mobile device based on weighted feature similarity","volume":"12","author":"Li","year":"Dec. 2022","journal-title":"Sci. Rep."},{"key":"ref15","first-page":"1","article-title":"LandmarkMiner: Street-level network landmarks mining method for IP geolocation","volume":"2","author":"Li","year":"Jul. 2021","journal-title":"ACM Trans. Int. Things"},{"key":"ref16","article-title":"GWS-Geo: A graph neural network based model for street-level IPv6 geolocation","volume":"75","author":"Ma","year":"May 2023","journal-title":"J. Infor. Secur. Appl."},{"key":"ref17","article-title":"Street-level landmark evaluation based on nearest routers","volume":"1","author":"Li","year":"Jul. 2018","journal-title":"Secur. Commun. Netw."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"59237","DOI":"10.1109\/ACCESS.2019.2914972","article-title":"Street-level geolocation based on router multilevel partitioning","volume":"7","author":"Zhao","year":"2019","journal-title":"IEEE Access"},{"key":"ref19","unstructured":"MAXMIND, \u201cMaxMind GeoIP Databases,\u201d Accessed: Jul. 15, 2024. [Online]. Available: https:\/\/www.maxmind.com"},{"key":"ref20","unstructured":"IP2LOCATION, \u201cIP2location Databases,\u201d Accessed: Jul. 15, 2024. [Online]. Available: https:\/\/www.ip2location.com"},{"key":"ref21","unstructured":"IPIP, \u201cIP Geolocation Databases,\u201d Accessed: Jul. 15, 2024. [Online]. Available: https:\/\/www.ipip.net"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.3390\/electronics13010015","article-title":"Evaluation method of IP geolocation database based on city delay characteristics","volume":"13","author":"Xie","year":"Dec. 2023","journal-title":"Electronics"},{"key":"ref23","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","volume":"96","author":"Ester","year":"1996","journal-title":"KDD\u201996: Proc. Second Int. Conf. Knowl. Discov. Data Min."},{"key":"ref24","first-page":"23","article-title":"A modified DBSCAN algorithm for anomaly detection in time-series data with seasonality","volume":"19","author":"Jain","year":"2022","journal-title":"Int. Arab J. Inf. Technol."},{"key":"ref25","unstructured":"APNIC, \u201cAPNIC Whois,\u201d Accessed: Jul. 15, 2024. [Online]. Available: https:\/\/www.apnic.net"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/978-3-540-73190-0_7","author":"Sivanandam","year":"2008","journal-title":"Introduction to Genetic Algorithms"},{"key":"ref27","series-title":"Proc. 2nd Annu. Conf. Genetic Evol. Comput. (GECCO\u201900)","first-page":"251","article-title":"Efficient numerical optimization algorithm based on Genetic Algorithm for inverse problem","author":"Tominaga","year":"2000"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.future.2021.01.004","article-title":"Intelligent dynamic malware detection using machine learning in IP reputation for forensics data analytics","volume":"118","author":"Usman","year":"2021","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_56854\/TSP_CMC_56854.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:18:34Z","timestamp":1741321114000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58663"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":28,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.056854","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}