{"id":"https://openalex.org/W2523801181","doi":"https://doi.org/10.1109/tmc.2016.2518668","title":"A Novel Graph-Based Descriptor for the Detection of Billing-Related Anomalies in Cellular Mobile Networks","display_name":"A Novel Graph-Based Descriptor for the Detection of Billing-Related Anomalies in Cellular Mobile Networks","publication_year":2016,"publication_date":"2016-01-18","ids":{"openalex":"https://openalex.org/W2523801181","doi":"https://doi.org/10.1109/tmc.2016.2518668","mag":"2523801181"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2016.2518668","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2016.2518668","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068558091","display_name":"Stavros Papadopoulos","orcid":"https://orcid.org/0000-0003-1018-2293"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Stavros Papadopoulos","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, Imperial College London, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, Imperial College London, London, United Kingdom","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109397355","display_name":"Anastasios Drosou","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134249","display_name":"Centre for Research and Technology Hellas","ror":"https://ror.org/03bndpq63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210134249"]},{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Anastasios Drosou","raw_affiliation_strings":["Information Technologies Institute, Centre for Research and Technology Hellas, PO Box 361, Thermi, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"Information Technologies Institute, Centre for Research and Technology Hellas, PO Box 361, Thermi, Thessaloniki, Greece","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087452615","display_name":"Dimitrios Tzovaras","orcid":"https://orcid.org/0000-0001-6915-6722"},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]},{"id":"https://openalex.org/I4210134249","display_name":"Centre for Research and Technology Hellas","ror":"https://ror.org/03bndpq63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210134249"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Dimitrios Tzovaras","raw_affiliation_strings":["Information Technologies Institute, Centre for Research and Technology Hellas, PO Box 361, Thermi, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"Information Technologies Institute, Centre for Research and Technology Hellas, PO Box 361, Thermi, Thessaloniki, Greece","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068558091"],"corresponding_institution_ids":["https://openalex.org/I47508984"],"apc_list":null,"apc_paid":null,"fwci":4.343,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.9475667,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"15","issue":"11","first_page":"2655","last_page":"2668"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8182775974273682},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7124912738800049},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.5532063841819763},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5063575506210327},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4939630627632141},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46967679262161255},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4549599885940552},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4235292673110962},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.41894322633743286},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41088971495628357},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.23407495021820068},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17878976464271545},{"id":"https://openalex.org/keywords/mobile-radio","display_name":"Mobile radio","score":0.1345781683921814},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1327078640460968}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8182775974273682},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7124912738800049},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.5532063841819763},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5063575506210327},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4939630627632141},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46967679262161255},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4549599885940552},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4235292673110962},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.41894322633743286},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41088971495628357},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.23407495021820068},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17878976464271545},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.1345781683921814},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1327078640460968}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2016.2518668","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2016.2518668","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G8699621779","display_name":null,"funder_award_id":"FP7-ICT-317888-NEMESYS","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320334960","display_name":"Seventh Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W172040345","https://openalex.org/W174953902","https://openalex.org/W227419255","https://openalex.org/W574382490","https://openalex.org/W1422120021","https://openalex.org/W1483650506","https://openalex.org/W1490222502","https://openalex.org/W1492581097","https://openalex.org/W1520462871","https://openalex.org/W1885483218","https://openalex.org/W1933130724","https://openalex.org/W1973644085","https://openalex.org/W1974089633","https://openalex.org/W2001325956","https://openalex.org/W2003798735","https://openalex.org/W2014199851","https://openalex.org/W2023307683","https://openalex.org/W2036166268","https://openalex.org/W2039568132","https://openalex.org/W2055034786","https://openalex.org/W2063053940","https://openalex.org/W2089554624","https://openalex.org/W2107384282","https://openalex.org/W2110357431","https://openalex.org/W2115026336","https://openalex.org/W2118000750","https://openalex.org/W2120900307","https://openalex.org/W2129281072","https://openalex.org/W2149169025","https://openalex.org/W2911964244","https://openalex.org/W3101581741","https://openalex.org/W4231560213","https://openalex.org/W4234473173","https://openalex.org/W6606907887","https://openalex.org/W6607153030","https://openalex.org/W6628933252","https://openalex.org/W6666053041","https://openalex.org/W7001282739"],"related_works":["https://openalex.org/W3003419070","https://openalex.org/W3005927381","https://openalex.org/W2124540127","https://openalex.org/W3197108443","https://openalex.org/W1973366582","https://openalex.org/W4210272022","https://openalex.org/W1844259124","https://openalex.org/W2145498826","https://openalex.org/W1974440652","https://openalex.org/W565993663"],"abstract_inverted_index":{"Mobile":[0],"devices":[1,19],"are":[2,211,234,242],"evolving":[3],"and":[4,47,59,94,116,159,252,261],"becoming":[5],"increasingly":[6],"popular":[7],"over":[8],"the":[9,80,87,97,101,108,121,133,155,171,189,203,207,215,221,246,253,264,270,275],"last":[10],"few":[11],"years.":[12],"This":[13,129,141],"growth,":[14],"however,":[15],"has":[16,111,278],"exposed":[17],"mobile":[18,84,109,127,175,194,225,257],"to":[20,67,76,150,161,167,269],"a":[21,35,112,114,184,282],"large":[22],"number":[23,122],"of":[24,37,50,82,99,123,132,154,173,191,223,255,263,284],"security":[25],"threats.":[26,73],"Malware":[27],"installed":[28],"in":[29,86,107,148,193,206,281],"smartphones":[30],"can":[31,145],"be":[32,90,146],"used":[33,244],"for":[34,188,236,245],"variety":[36,283],"malicious":[38],"purposes,":[39],"including":[40],"stealing":[41],"personal":[42],"data,":[43],"sending":[44],"spam":[45],"SMSs,":[46],"launching":[48],"Denial":[49],"Service":[51],"(DoS)":[52],"attacks":[53],"against":[54,71],"core":[55],"network":[56,64,88,110,157,250],"components.":[57],"Authentication":[58],"access-control-based":[60],"techniques,":[61],"employed":[62],"by":[63],"operators":[65],"fail":[66],"provide":[68,151],"integral":[69],"protection":[70],"malware":[72],"In":[74],"order":[75,149],"solve":[77],"this":[78,179,181],"issue,":[79],"activity":[81,106,135,172,205,222],"each":[83,174,218,237],"device":[85,176,226],"must":[89],"taken":[91],"into":[92],"account,":[93],"combined":[95],"with":[96,139],"activities":[98],"all":[100],"other":[102],"devices.":[103,258],"The":[104,199],"communication":[105,118,134],"source,":[113],"destination,":[115],"possibly":[117],"weights":[119],"(e.g.,":[120,227],"calls":[124],"between":[125],"two":[126],"devices).":[128],"relational":[130],"nature":[131],"is":[136],"naturally":[137],"represented":[138],"graphs.":[140],"indicates":[142],"that":[143,169,274],"graphs":[144,210],"utilized":[147],"better":[152,162],"representations":[153],"entire":[156],"activity,":[158],"lead":[160],"detection":[163,190,267],"results":[164,260],"when":[165],"compared":[166],"methods":[168],"consider":[170],"individually.":[177],"Towards":[178],"end,":[180],"paper":[182],"proposes":[183],"novel":[185],"graph-based":[186,200,216,276],"descriptor":[187,201,277],"anomalies":[192],"networks,":[195],"using":[196],"billing-related":[197],"information.":[198],"represents":[202],"total":[204],"network.":[208],"Smaller":[209],"afterwards":[212],"extracted":[213],"from":[214],"descriptor,":[217],"one":[219,224],"representing":[220],"Calls":[228],"or":[229],"SMSs),":[230],"while":[231],"multiple":[232],"features":[233,241],"calculated":[235],"such":[238],"graph.":[239],"These":[240],"subsequently":[243],"supervised":[247],"classification":[248],"on":[249],"events,":[251],"identification":[254],"anomalous":[256],"Experimental":[259],"comparison":[262],"proposed":[265],"anomaly":[266],"method":[268],"existing":[271],"work,":[272],"show":[273],"superior":[279],"performance":[280],"scenarios.":[285]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
