[1]
GSMA, Number of global mobile subscribers to surpass five billion this year, finds new GSMA study, http://tinyurl.com/wr786ehx, 2017.
[2]
Spam phone calls cost U.S. small businesses half-billion dollars in lost productivity, marchex study finds, http://tinyurl.com/44av3x5f, 2014.
[3]
U.S. Phones were hit by more than 50 billion robocalls in 2021, http://tinyurl.com/ysxw6zvf, 2023.
[4]
C. K. Jennifer, FTC releases updated do not call registry data book; impersonator fraud tops list of consumer complaints, http://tinyurl.com/mr2dmkvb, 2023.
[5]
Truecaller insights 2022 U.S. spam & scam report, http://tinyurl.com/3hx68k6m, 2023.
[6]
M. Hansen, M. Hansen, J. Möller, T. Rohwer, C. Tolkmit, and H. Waack, Developing a legally compliant reachability management system as a countermeasure against SPIT, in Proc. 3 rd Annu. VoIP Security Workshop, Berlin, Germany, 2006, pp. 1−7.
[9]
M. A. Azad and R. Morla, Multistage SPIT detection in transit VoIP, in Proc. 19 th Int. Conf. Software, Telecommunications and Computer Networks, Split, Croatia, 2011, pp. 1–9.
[10]
V. A. Balasubramaniyan, M. Ahamad, and H. Park, CallRank: Combating SPIT using call duration, social networks and global reputation, in Proc. 4 th Conf. Email and Anti-Spam, Mountain View, CA, USA, 2007, pp. 1−8
[12]
R. Dantu and P. Kolan, Detecting spam in VoIP networks, in Proc. Steps to Reducing Unwanted Traffic on the Internet Workshop, Cambridge, MA, USA, 2005, p. 5.
[14]
R. Schlegel, S. Niccolini, S. Tartarelli, and M. Brunner, ISE03-2: SPam over internet telephony (SPIT) prevention framework, in Proc. IEEE Globecom 2006, San Francisco, CA, USA, 2006, pp. 1–6.
[15]
D. Gritzalis and Y. Mallios, A SIP-oriented SPIT management framework, Comput. Secur., vol. 27, nos. 5&6, pp. 136–153, 2008.
[16]
M. A. Azad and S. Bag, Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network, in Proc. Symp. Applied Computing, Marrakech, Morocco, 2017, pp. 1711–1717.
[17]
M. A. Azad, S. Bag, S. Tabassum, and F. Hao, privy: Privacy preserving collaboration across multiple service providers to combat telecom spams, IEEE Trans. Emerging Top. Comput., vol. 8, no. 2, pp. 313–327, 2020.
[19]
H. K. Bokharaei, A. Sahraei, Y. Ganjali, R. Keralapura, and A. Nucci, You can SPIT, but you can’t hide: Spammer identification in telephony networks, in Proc. 2011 IEEE INFOCOM, Shanghai, China, 2011, pp. 41–45.
[20]
P. A. Chirita, J. Diederich, and W. Nejdl, MailRank: Using ranking for spam detection, in Proc. 14 th ACM Int. Conf. Information and Knowledge Management, Bremen, Germany, 2005, pp. 373–380.
[21]
H. Y. Lam and D. Y. Yeung, A learning approach to spam detection based on social networks, in Proc. 4 th Conf. Email and Anti-Spam, Mountain View, CA, USA, 2007, pp. 1−9.
[23]
H. Sengar, X. Y. Wang, and A. Nichols, Call behavioral analysis to thwart SPIT attacks on VoIP networks, in Proc. 7 th Int. Conf. Security and Privacy in Communication Systems, London, UK, 2012, pp. 501–510.
[24]
P. Gupta, B. Srinivasan, V. Balasubramaniyan, and M. Ahamad, Phoneypot: Data-driven understanding of telephony threats, in Proc. 22 nd Annu. Network and Distributed System Security Symp., San Diego, CA, USA, 2015, pp. 1−14.
[25]
M. Balduzzi, P. Gupta, L. Gu, D. B. Gao, and M. Ahamad, MobiPot: Understanding mobile telephony threats with honeycards, in Proc. 11 th ACM on Asia Conf. Computer and Communications Security, Xi'an China, 2016, pp. 723–734.
[26]
H. Li, X. Xu, C. Liu, T. Ren, K. Wu, X. Cao, W. Zhang, Y. Yu, and D. Song, A machine learning approach to prevent malicious calls over telephony networks, in Proc. 2018 IEEE Symp. Security and Privacy, San Francisco, CA, USA, 2018, pp. 53–69.
[27]
J. Liu, B. Rahbarinia, R. Perdisci, H. Du, and L. Su, Augmenting telephone spam blacklists by mining large CDR datasets, in Proc. 2018 on Asia Conf. Computer and Communications Security, Incheon, Republic of Korea, 2018, pp. 273–284.
[28]
H. Tu, A. Doupé, Z. Zhao, and G. J. Ahn, SoK: Everyone hates robocalls: A survey of techniques against telephone spam, in Proc. 2016 IEEE Symp. Security and Privacy, San Jose, CA, USA, 2016, pp. 320–338.
[30]
S. A. Iranmanesh, H. Sengar, and H. Wang, A voice spam filter to clean subscribers’ mailbox, in Proc. 8 th Int. Conf. Security and Privacy in Communication Systems, Padua, Italy, 2013, pp. 349–367.
[31]
J. Strobl, B. Mainka, G. Grutzek, and H. Knospe, An efficient search method for the content-based identification of telephone-SPAM, in Proc. 2012 IEEE Int. Conf. Communications, Ottawa, Canada, 2012, pp. 2623–2627.
[32]
D. Lentzen, G. Grutzek, H. Knospe, and C. Porschmann, Content-based detection and prevention of spam over IP telephony−system design, prototype and first results, in Proc. 2011 IEEE Int. Conf. Communications, Kyoto, Japan, 2011, pp. 1–5.
[33]
V. A. Balasubramaniyan, A. Poonawalla, M. Ahamad, M. T. Hunter, and P. Traynor, PinDr0p: Using single-ended audio features to determine call provenance, in Proc. 17 th ACM Conf. Computer and Communications Security, Chicago, IL, USA, 2010, pp. 109–120.
[34]
K. Ono and H. Schulzrinne, Have I met you before?: Using cross-media relations to reduce SPIT, in Proc. 3 rd Int. Conf. Principles, Systems and Applications of IP Telecommunications, Atlanta, GA, USA, 2009, p. 3.
[35]
R. Zhang and A. Gurtov, Collaborative reputation-based voice spam filtering, in Proc. 20 th Int. Workshop on Database and Expert Systems Application, Linz, Austria, 2009, pp. 33–37.
[36]
Y. S. Wu, S. Bagchi, N. Singh, and R. Wita, Spam detection in voice-over-IP calls through semi-supervised clustering, in Proc. 2009 IEEE/IFIP Int. Conf. Dependable Systems & Networks, Lisbon, Portugal, 2009, pp. 307–316.
[38]
S. Pandit, R. Perdisci, M. Ahamad, and P. Gupta, Towards measuring the effectiveness of telephony blacklists, in Proc. 25 th Annu. Network and Distributed System Security Symp., San Diego, CA, USA, 2018, pp. 1−15.
[41]
N. Chaisamran, T. Okuda, G. Blanc, and S. Yamaguchi, Trust-based VoIP spam detection based on call duration and human relationships, in Proc. 2011 IEEE/IPSJ Int. Symp. Applications and the Internet, Munich, Germany, 2011, pp. 451–456.