{"id":"https://openalex.org/W2008445509","doi":"https://doi.org/10.1145/1216895.1216897","title":"Socio-technical defense against voice spamming","display_name":"Socio-technical defense against voice spamming","publication_year":2007,"publication_date":"2007-03-01","ids":{"openalex":"https://openalex.org/W2008445509","doi":"https://doi.org/10.1145/1216895.1216897","mag":"2008445509"},"language":"en","primary_location":{"id":"doi:10.1145/1216895.1216897","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1216895.1216897","pdf_url":null,"source":{"id":"https://openalex.org/S16632050","display_name":"ACM Transactions on Autonomous and Adaptive Systems","issn_l":"1556-4665","issn":["1556-4665","1556-4703"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Autonomous and Adaptive Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027939466","display_name":"Prakash Kolan","orcid":null},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Prakash Kolan","raw_affiliation_strings":["University of North Texas, Denton, Texas","university of north texas , Denton, Texas,"],"affiliations":[{"raw_affiliation_string":"University of North Texas, Denton, Texas","institution_ids":["https://openalex.org/I123534392"]},{"raw_affiliation_string":"university of north texas , Denton, Texas,","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077121598","display_name":"Ram Dantu","orcid":"https://orcid.org/0000-0001-9362-1559"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ram Dantu","raw_affiliation_strings":["University of North Texas, Denton, Texas","university of north texas , Denton, Texas,"],"affiliations":[{"raw_affiliation_string":"University of North Texas, Denton, Texas","institution_ids":["https://openalex.org/I123534392"]},{"raw_affiliation_string":"university of north texas , Denton, Texas,","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027939466"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":14.2417,"has_fulltext":false,"cited_by_count":77,"citation_normalized_percentile":{"value":0.98544276,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2","issue":"1","first_page":"2","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.9069728851318359},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8336648941040039},{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.8155808448791504},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5466925501823425},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5211915373802185},{"id":"https://openalex.org/keywords/public-switched-telephone-network","display_name":"Public switched telephone network","score":0.49197980761528015},{"id":"https://openalex.org/keywords/telephone-network","display_name":"Telephone network","score":0.4890778660774231},{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.4861437976360321},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.474250465631485},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45582354068756104},{"id":"https://openalex.org/keywords/voice-command-device","display_name":"Voice command device","score":0.42976564168930054},{"id":"https://openalex.org/keywords/voice-activity-detection","display_name":"Voice activity detection","score":0.4111522138118744},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4024944305419922},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.401551216840744},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.271634578704834},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.24798616766929626},{"id":"https://openalex.org/keywords/speech-processing","display_name":"Speech processing","score":0.14094102382659912}],"concepts":[{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.9069728851318359},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8336648941040039},{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.8155808448791504},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5466925501823425},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5211915373802185},{"id":"https://openalex.org/C2780391855","wikidata":"https://www.wikidata.org/wiki/Q243961","display_name":"Public switched telephone network","level":3,"score":0.49197980761528015},{"id":"https://openalex.org/C197698232","wikidata":"https://www.wikidata.org/wiki/Q2354216","display_name":"Telephone network","level":2,"score":0.4890778660774231},{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.4861437976360321},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.474250465631485},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45582354068756104},{"id":"https://openalex.org/C178718744","wikidata":"https://www.wikidata.org/wiki/Q2350070","display_name":"Voice command device","level":2,"score":0.42976564168930054},{"id":"https://openalex.org/C204201278","wikidata":"https://www.wikidata.org/wiki/Q1332614","display_name":"Voice activity detection","level":3,"score":0.4111522138118744},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4024944305419922},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.401551216840744},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.271634578704834},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.24798616766929626},{"id":"https://openalex.org/C61328038","wikidata":"https://www.wikidata.org/wiki/Q3358061","display_name":"Speech processing","level":2,"score":0.14094102382659912},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1216895.1216897","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1216895.1216897","pdf_url":null,"source":{"id":"https://openalex.org/S16632050","display_name":"ACM Transactions on Autonomous and Adaptive Systems","issn_l":"1556-4665","issn":["1556-4665","1556-4703"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Autonomous and Adaptive Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1991066","https://openalex.org/W148103248","https://openalex.org/W247265067","https://openalex.org/W1521374031","https://openalex.org/W1530970771","https://openalex.org/W1555008886","https://openalex.org/W1562858266","https://openalex.org/W1576189261","https://openalex.org/W1577527831","https://openalex.org/W1577953800","https://openalex.org/W1591919839","https://openalex.org/W1597927454","https://openalex.org/W1648885110","https://openalex.org/W1670431108","https://openalex.org/W1845088154","https://openalex.org/W1976611840","https://openalex.org/W1986147097","https://openalex.org/W2097726984","https://openalex.org/W2099606292","https://openalex.org/W2100107987","https://openalex.org/W2106094088","https://openalex.org/W2110966887","https://openalex.org/W2117397064","https://openalex.org/W2120239604","https://openalex.org/W2120312633","https://openalex.org/W2131020277","https://openalex.org/W2134661798","https://openalex.org/W2135300639","https://openalex.org/W2155421596","https://openalex.org/W2159761160","https://openalex.org/W2161644106","https://openalex.org/W2168053229","https://openalex.org/W2206554098","https://openalex.org/W2347017209","https://openalex.org/W2987236599","https://openalex.org/W2997060564","https://openalex.org/W4242138061","https://openalex.org/W4242500534"],"related_works":["https://openalex.org/W4231452606","https://openalex.org/W2290815506","https://openalex.org/W1561558549","https://openalex.org/W32436167","https://openalex.org/W63135143","https://openalex.org/W2096406147","https://openalex.org/W1525583812","https://openalex.org/W2972255505","https://openalex.org/W2535564529","https://openalex.org/W2008445509"],"abstract_inverted_index":{"Voice":[0],"over":[1,38],"IP":[2,263,318],"(VoIP)":[3],"is":[4,29,76,97,112,200,241],"a":[5,100,138,163,187,218,256,266,306,311,326,338,346],"key":[6],"enabling":[7],"technology":[8],"for":[9,61,206,222,243,249,350],"migration":[10],"of":[11,24,57,73,125,146,150,259,328,354],"circuit-switched":[12],"PSTN":[13],"(Public":[14],"Switched":[15],"Telephone":[16],"Network)":[17],"architectures":[18],"to":[19,34,50,79,98,121,134,177,194,337],"packet-based":[20],"networks.":[21],"One":[22],"problem":[23],"the":[25,58,71,81,85,91,94,104,123,143,151,227,235,245,251,279,289,294,303,315,322,332,352,364],"present":[26,345],"VoIP":[27,46,239],"networks":[28],"filtering":[30,281],"spam":[31,42,47,63,101,115,166,179,224,285,308,358],"calls":[32,48,286],"referred":[33],"as":[35,84,357],"SPIT":[36],"(Spam":[37],"Internet":[39],"Telephony).":[40],"Unlike":[41],"in":[43,53,70,180,331],"e-mail":[44,62],"systems,":[45],"have":[49,88],"be":[51],"identified":[52],"real":[54,95,262],"time.":[55],"Many":[56],"techniques":[59],"devised":[60],"detection":[64,246,252],"rely":[65],"upon":[66],"content":[67,82],"analysis,":[68],"and":[69,154,175,209,231,265,272,287,296,320,341,360],"case":[72,333],"VoIP,":[74],"it":[75,111,132],"too":[77],"late":[78],"analyze":[80],"(voice)":[83],"user":[86],"would":[87],"already":[89],"attended":[90],"call.":[92],"Therefore,":[93,248],"challenge":[96],"block":[99],"call":[102,199,309],"before":[103],"telephone":[105],"rings.":[106],"In":[107,158,183],"addition,":[108],"we":[109,161,185,254,344],"believe":[110],"imperative":[113],"that":[114,270],"filters":[116],"integrate":[117],"human":[118,219],"behavioral":[119],"aspects":[120],"gauge":[122],"legitimacy":[124],"voice":[126,139,181],"calls.":[127,182,275],"We":[128,202,212,276,299],"know":[129],"that,":[130,301],"when":[131,334],"comes":[133],"receiving":[135],"or":[136],"rejecting":[137],"call,":[140],"people":[141],"use":[142],"social":[144],"meaning":[145],"trust,":[147,174],"reputation,":[148],"friendship":[149],"calling":[152,236,313],"party":[153],"their":[155],"own":[156],"mood.":[157],"this":[159,214],"article,":[160],"describe":[162,186],"multi-stage,":[164],"adaptive":[165],"filter":[167,304,323],"based":[168,225],"on":[169,217,226,363],"presence":[170],"(location,":[171],"mood,":[172],"time),":[173],"reputation":[176,210,297],"detect":[178],"particular,":[184],"closed-loop":[188],"feedback":[189],"control":[190],"between":[191],"different":[192],"stages":[193],"decide":[195],"whether":[196],"an":[197],"incoming":[198,274],"spam.":[201],"further":[203],"propose":[204],"formalism":[205],"voice-specific":[207],"trust":[208,295],"analysis.":[211],"base":[213],"formal":[215],"model":[216],"intuitive":[220],"behavior":[221],"detecting":[223],"called":[228],"party's":[229],"direct":[230],"indirect":[232],"relationships":[233],"with":[234],"party.":[237],"No":[238],"corpus":[240],"available":[242],"testing":[244],"mechanism.":[247],"verifying":[250],"accuracy,":[253],"used":[255],"laboratory":[257],"setup":[258],"several":[260],"soft-phones,":[261],"phones":[264],"commercial-grade":[267],"proxy":[268],"server":[269],"receives":[271],"processes":[273],"experimentally":[277],"validated":[278],"proposed":[280],"mechanisms":[282],"by":[283,292],"simulating":[284],"measured":[288],"filter's":[290,365],"accuracy":[291],"applying":[293],"formalism.":[298],"observed":[300],"while":[302],"blocks":[305],"second":[307],"from":[310,314],"spammer":[312,335],"same":[316],"end":[317],"host":[319,340],"domain,":[321],"needs":[324],"only":[325],"maximum":[327],"three":[329],"calls---even":[330],"moves":[336],"new":[339],"domain.":[342],"Finally,":[343],"detailed":[347],"sensitivity":[348],"analysis":[349],"examining":[351],"influence":[353],"parameters":[355],"such":[356],"volume":[359],"network":[361],"size":[362],"accuracy.":[366]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":11},{"year":2012,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
