Academic literature on the topic 'Telephone fraud'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Telephone fraud.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Telephone fraud"

1

Sergeyev, A. Yu, and O. V. Shirokova. "Fraud in a digital society in the context of social change." Digital Sociology 6, no. 1 (2023): 59–71. http://dx.doi.org/10.26425/2658-347x-2023-6-1-59-71.

Full text
Abstract:
The article analyzes the problems of fraud in the modern digital society in the context of social changes caused by both the COVID-19 pandemic and the current geopolitical situation. The authors study in detail the types of financial fraud in this area. They pay special attention to the types of digital fraud: telephone fraud and IP-telephony, SMS fraud, phishing, sniffering (message interception), skimming (theft of card data), which are associated with the emergence of cryptocurrencies. The article presents the data of the authors’ sociological research conducted by the method of an online q
APA, Harvard, Vancouver, ISO, and other styles
2

Mikhaleva, U. A. "Application of mivar expert systems in the fight against telephone fraud." Herald of Dagestan State Technical University. Technical Sciences 51, no. 1 (2024): 166–72. http://dx.doi.org/10.21822/2073-6185-2024-51-1-166-172.

Full text
Abstract:
Objective. Currently, there is no comprehensive approach to solving the problems of telephone fraud. Despite the widespread awareness of citizens about telephone fraud through the media, the number of victims of this type of fraud is growing day by day. The purpose of the study is to substantiate the possibility of using mivar technologies as part of an expert system to combat telephone fraud.Method. This article uses the following methods: description, analysis, deduction.Result. The analysis of the use of mivar expert systems in various areas of life allowed us to conclude that their use in
APA, Harvard, Vancouver, ISO, and other styles
3

Zhan, Rong-Fang, Elias Mpofu, and Cheng Yin. "TELEPHONE FRAUD AGAINST OLDER ADULTS IN CHINA: EVIDENCE FROM THE CHINA HEALTH AND RETIREMENT LONGITUDINAL STUDY." Innovation in Aging 6, Supplement_1 (2022): 14. http://dx.doi.org/10.1093/geroni/igac059.049.

Full text
Abstract:
Abstract Background Falling victim to telephone fraud is a devastating crisis for older adults because they can lose their life savings, adversely affecting their well-being. This study aimed to identify risk factors associated with telephone fraud among Chinese older adults. Method: A case-control study was conducted using the fourth wave of the 2018 China Health and Retirement Longitudinal Study data on older adults 60 years and above (N = 445 with telephone fraud experience; 9,994 with no fraud and other fraud experience). Control variables for the logistic regression analysis included the
APA, Harvard, Vancouver, ISO, and other styles
4

Kuzmin, Yury A. "PREVENTION OF TELEPHONE FRAUD (CRIMINOLOGICAL ASPECT)." Oeconomia et Jus, no. 3 (September 30, 2022): 47–54. http://dx.doi.org/10.47026/2499-9636-2022-3-47-54.

Full text
Abstract:
The problems of committing fraud using telephone communication are updated. The relevance of issues related to the prevention of telephone fraud, first and foremost caller ID spoofing and phishing, is substantiated. The article analyzes the methods of preventing telephone fraud, such as the possibility of establishing the number of fraudsters through electronic search services, special free services, Viber and WhatsApp messengers, Sberbank Online, caller ID for incoming calls on "Avito" and "Yula", through applications for iPhone and Android, caller ID from "Kaspersky Lab" – Kaspersky Who Call
APA, Harvard, Vancouver, ISO, and other styles
5

Dyatlov, G. A. "Comparative Analysis of the Telephone Fraud Liability in the Criminal Law of Russia and Foreign Countries Based on the Dynamics of Damage Example." Legal Order and Legal Values 2, no. 3 (2024): 61–67. http://dx.doi.org/10.23947/2949-1843-2024-2-3-61-67.

Full text
Abstract:
Introduction. The telephone fraud is a serious problem faced both in Russia and abroad. With the development of digital technologies and Internet, the fraudsters find the new ways to deceive citizens by calling them on the phone, pretending to be the representatives of banks, law enforcement agencies or other official institutions. The dynamics of damage caused by such crimes is constantly growing, therefore, the efficient measures should be taken to prevent and suppress fraud. The aim of the article is to conduct a comparative analysis of the criminal law with respect to telephone fraud liabi
APA, Harvard, Vancouver, ISO, and other styles
6

Аnanchenkova, P. I., I. А. Turin, and K. K. Makarova. "Role of digital socialisation of the elderly in protecting against telephone fraud." Digital Sociology 7, no. 4 (2025): 22–32. https://doi.org/10.26425/2658-347x-2024-7-4-22-32.

Full text
Abstract:
The study is relevant for sociological theory and public practice, as it is devoted to the analysis of the role of digital socialisation of older people in protecting against telephone fraud. The purpose of the study is to characterise modern telephone fraud and identify the features of the role of digital socialisation of older people in effective protection against becoming a victim. Informational and empirical basis of the research: data of the Federal State Statistics Service “Distribution of the population who are active Internet users by type of settlement and gender and age groups”, 202
APA, Harvard, Vancouver, ISO, and other styles
7

Hassenjürgen, Christoph. "How to avoid telephone and internet fraud." Bankfachklasse 43, no. 1-2 (2021): 32–33. http://dx.doi.org/10.1007/s35139-020-0551-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Meyer, Helen. "Telephone fraud poses threat to UK business." Computers & Security 15, no. 8 (1996): 686–87. http://dx.doi.org/10.1016/s0167-4048(97)89707-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gomonova, O. A., and S. A. Ivanov. "Telephone fraud as a complex social problem." Sociology and Law 16, no. 1 (2024): 38–47. http://dx.doi.org/10.35854/2219-6242-2024-1-38-47.

Full text
Abstract:
The article studies telephone fraud as a new type of crime and an acute social problem. Attention is drawn to the complex nature of the problem, as it should be considered in the plane of different disciplines: general jurisprudence, criminology, social psychology, social engineering, information technology. The Bank of Russia estimates the scale of spread of this type of crime and the amount of stolen money. According to statistics, the majority of fraudulent schemes are based on social engineering techniques. The results of a sociological survey of the population conducted under the guidance
APA, Harvard, Vancouver, ISO, and other styles
10

RATNAKUMARI, Mrs J., SHAIK NAILO ASMIN THAHENATH, TOLUSURI SRI LAKSHMI, PERAVALI NAGA DILEEP KUMAR, and KADIYAM VEERAIAH. "DETECTION OF FRAUDULENT OR DECEPTIVE PHONE CALLS USING ARTIFICIAL INTELLIGENCE." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 15, no. 1 (2024): 96–99. http://dx.doi.org/10.61841/turcomat.v15i1.14546.

Full text
Abstract:
With an increase advancement of technology, fraud phone calls, including spam’s and malicious calls have become a major concern in telecommunication industry and causes millions of global financial losses every year. Fraudulent phone calls or scams and spams via telephone or mobile phone have become a common threat to individuals and organizations. Artificial Intelligence (AI) and Machine Learning (ML) has emerged as powerful tools in detecting and analyzing fraud or malicious calls. This project presents an overview of AI-based fraud or spam detection and analysis techniques, along with its c
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Telephone fraud"

1

Van, Heerden Johan H. "Detecting fraud in cellular telephone networks." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/50314.

Full text
Abstract:
Thesis (MSc)--University of Stellenbosch, 2005.<br>ENGLISH ABSTRACT: Cellular network operators globally loose between 3% and 5% of their annual revenue to telecommunications fraud. Hence it is of great importance that fraud management systems are implemented to detect, alarm, and shut down fraud within minutes, minimising revenue loss. Modern proprietary fraud management systems employ (i) classification methods, most often artificial neural networks learning from classified call data records to classify new call data records as fraudulent or legitimate, (ii) statistical methods building
APA, Harvard, Vancouver, ISO, and other styles
2

Abidogun, Olusola Adeniyi. "Data mining, fraud detection and mobile telecommunications: call pattern analysis with unsupervised neural networks." Thesis, University of the Western Cape, 2005. http://etd.uwc.ac.za/index.php?module=etd&amp.

Full text
Abstract:
Huge amounts of data are being collected as a result of the increased use of mobile telecommunications. Insight into information and knowledge derived from these databases can give operators a competitive edge in terms of customer care and retention,<br /> marketing and fraud detection. One of the strategies for fraud detection checks for signs of questionable changes in user behavior. Although the intentions of the mobile phone users cannot be observed, their intentions are reflected in the call data which define usage patterns. Over a period of time, an individual phone generates a large pat
APA, Harvard, Vancouver, ISO, and other styles
3

Федорова, А. В. "Одна з небезпек сьогодення - шахрайство по телефону". Thesis, Сумський державний університет, 2016. http://essuir.sumdu.edu.ua/handle/123456789/45452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

WANG, YAW-HUEI, and 王耀輝. "The Causes and Prevention Strategies of Telephone Fraud." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/00351497100532315496.

Full text
Abstract:
碩士<br>國立臺北大學<br>犯罪學研究所<br>95<br>Telephone fraud has been a newly developing crime in recent years in Taiwan. Due to causing a lot of victims and money loss, it results in panic of the public and gets attention of the authorities. However, criminals of telephone fraud, who need not to present, cheat people by telephone , the public does not understand this kind of crime very much. This research expects to analyze crime pattern through interviewing with the criminals deeply. The study was based on in-depth interviews which selected five telephone fraud criminals to analyze the crime from crimi
APA, Harvard, Vancouver, ISO, and other styles
5

Ching-Hai, Wu, and 吳清海. "The Research on Prevention Policy for Telephone Fraud Crime." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/58748085833121081139.

Full text
Abstract:
碩士<br>佛光大學<br>公共事務學系<br>95<br>Telephone fraud is different from traditional fraud in which victims and swindlers are face-to-face. This new type of fraud makes use of various media, such as the convergence of information and communication, mass media, telecommunication network and financial services, etc., to contact victims indirectly in order to take advantage of the weaknesses of human nature. Cheated by excellent manipulation skill, victims are trapped and give away their money. Telephone fraud not only seriously affects citizen’s daily life but also makes a great impact on the public orde
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Chiayu, and 劉家妤. "A Study on the Characteristics of Cross-Border Telephone Fraud Groups." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/90191096844243254689.

Full text
Abstract:
碩士<br>國立臺北大學<br>犯罪學研究所<br>100<br>In these years, people in Taiwan have been disturbed by telephone fraud groups so frequently that it seems unavoidable. These groups hide originally somewhere in Taiwan. However, since the governments across the Taiwan Straits have signed Cross-strait Joint Fight against Crime and Mutual Legal Assistance Agreement (CJFCMLAA), telephone fraud groups gradually transfer their bases from Taiwan to Mainland China or south-east Asian, in order to prevent being caught. Thus telephone fraud is changed from being a local crime problem to a cross-border one, and this mak
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Po-Piao, and 吳柏鏢. "The Research of Telephone Fraud Crime Characteristics—A Case Study of Taipei County." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/44578842770062852735.

Full text
Abstract:
碩士<br>輔仁大學<br>應用統計學研究所<br>94<br>After 2003, the organized and transnational syndicate of deception has been established. They not only use a large amount of people account and telephone, but also combine the financial institution ATM transfer service at the same time, to cheat the people by any sham reasons even cooperate with current events. According to statistics of the criminal police office, the deception cases taken place have increased one the amount of time suddenly among 2003 to 2005. Obviously, it is a serious problem and also affect by the depressed situation of Taiwan economy, the
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Jei-Sheng, and 黃瑞盛. "A Study on Criminal Liability for the conduct of providingdummy account—Focused upon the telephone Fraud." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/05109671500982592181.

Full text
Abstract:
碩士<br>國立臺灣海洋大學<br>海洋法律研究所<br>99<br>Abstract In recent years financial institutions have become numerous, as living standards have been elevated, people have more chances to use financial accounts. At the same time, since the application process is fast and easy, everyone has multiple financial accounts. Furthermore, in recent years there have been more telephone fraud cases, in which the criminal groups used dummy accounts, dummy mobile phones, ATMs, or the internet to obtain illegal income. They also use human weaknesses of greed, ignorance, and negligence in various ways to engage in fraud,
APA, Harvard, Vancouver, ISO, and other styles
9

Hus, Yu Nung, and 徐雨農. "Fraud Pattern Identification on IP2PSTN Telephony." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/83777478368351223561.

Full text
Abstract:
碩士<br>醒吾技術學院<br>資訊科技應用研究所<br>100<br>The utility rate of internet phone is increased rapidly, as internet communication grows up. Due to the differences in nature and characteristic of systems, the connections between internet phone and traditional public switched phone induce serious phone swindles of IP2PSTN communication. In some researches, “non-authorized dial-up connection requests” were sifted out by “Authorization Verifying Code, AVC” to break the possibility for internet scam clan. However, it breaks not only the scammers but also the non-scammed connection requesters who aren’t author
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Telephone fraud"

1

United States. Federal Trade Commission. Office of Consumer and Business Education, ed. Telephone investment fraud: Fast facts. Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer & Business Education, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Economic Crimes Policy Team (U.S.). Cellular telephone cloning: Final report. The Commission, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Federal Trade Commission. Office of Consumer and Business Education and American Society of Travel Agents, eds. Telemarketing travel fraud. Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer & Business Education, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Common Carrier Bureau. Enforcement Division, ed. Telephone toll fraud: Don't be its next victim. Federal Communications Commission, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Congress. Senate. Committee on Governmental Affairs. Permanent Subcommittee on Investigations. "Cramming" an emerging telephone billing fraud: Hearing before the Permanent Subcommittee on Investigations of the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, July 23, 1998. U.S. G.P.O., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United, States Congress Senate Committee on Commerce Science and Transportation Subcommittee on the Consumer. Charitable solicitation fraud: Hearing before the Subcommittee on Consumer of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Third Congress, first session, October 11, 1993. U.S. G.P.O., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on the Consumer. Charitable solicitation fraud: Hearing before the Subcommittee on Consumer of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Third Congress, first session, October 11, 1993. U.S. G.P.O., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on the Consumer. Charitable solicitation fraud: Hearing before the Subcommittee on Consumer of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Third Congress, second session, March 24, 1994. U.S. G.P.O., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on the Consumer. Charitable solicitation fraud: Hearing before the Subcommittee on Consumer of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Third Congress, first session, October 11, 1993. U.S. G.P.O., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on the Consumer. Charitable solicitation fraud: Hearing before the Subcommittee on Consumer of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Third Congress, second session, March 24, 1994. U.S. G.P.O., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Telephone fraud"

1

Deng, Shiqi, Zhen Zhang, and Liang Hong. "Domain Ontology Construction for Intelligent Anti-Telephone-Fraud Applications." In Lecture Notes in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59413-8_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Duffy, Colin, and Richard Timothy Coupe. "Detecting and Combating Internet Telephony Fraud." In Crime Solvability Factors. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17160-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grosser, H., P. Britos, and R. García-Martínez. "Detecting Fraud in Mobile Telephony Using Neural Networks." In Innovations in Applied Artificial Intelligence. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11504894_85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rivers, Zach. "Derrida in Correspondances." In Going Postcard. punctum books, 2017. https://doi.org/10.21983/p3.0171.1.10.

Full text
Abstract:
“6 October 1978. I am writing you in a taxi. I avoid the subway, here too, precisely because I like it [parce que je l’aime]. And because I get lost [je m’égare] in the correspondances, although the system is much simpler than in Paris” (PC, 166/179). This passage from Jacques Derrida’s “En-vois” in The Post Card: From Socrates to Freud and Beyond in which he writes from a New York City taxi seems relatively mundane. Perhaps it is. Yet, I’d like to linger within this unex-ceptionable scene for the paths it might already be leading us down. Derrida’s avoidance of the subway precisely because he
APA, Harvard, Vancouver, ISO, and other styles
5

Simonson, Ed, and Jeff Dixon. "Dealing with Telephone Toll Fraud." In The NETWORK MANAGER’S Handbook 1999. Auerbach Publications, 2018. http://dx.doi.org/10.1201/9781351077187-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Simonson, Edwin L., and Brian McDaniel. "Protecting the Telephone System Against Toll Fraud." In The Network Manager’s Handbook, 3rd ed. Auerbach Publications, 2021. http://dx.doi.org/10.1201/9781003069409-22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Morgado, Eduardo M., João Pedro Albino, Ana Cláudia Pires Ferreira de Lima, Carla Gonçalves Távora, and Ivany Bucchianico. "Detailing a Case of Cyber Fraud Through Telephone in Brazil." In Exploring Cyber Criminals and Data Privacy Measures. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-8422-7.ch013.

Full text
Abstract:
The goal is to initiate a discussion over the measures to protect the victims, whom unfortunately, in Brazil, composes 30% of elderly people (older than 60 years old). The case report portrays the scam through spoofing, programs that change the caller's identification in a communication, together with Social Engineering, to trick the victim into carrying out operations in the bank's application, thus encouraging transfers to the scammer's account. The victim ended up following these guidelines and made appointments to send money to the scammer, however, he ended up suspecting the situation, de
APA, Harvard, Vancouver, ISO, and other styles
8

Silva, Paula, João Vinagre, and João Gama. "Federated Online Learning for Heavy Hitter Detection." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2024. http://dx.doi.org/10.3233/faia241065.

Full text
Abstract:
Effective anomaly detection in telecommunication networks is essential for securing digital transactions and supporting the sustainability of our global information ecosystem. However, the volume of data in such high-speed distributed environments imposes strict latency and scalability requirements on anomaly detection systems. This study focuses on distributed heavy hitter detection in telephone networks – a critical component of network traffic analysis and fraud detection. We propose a federated version of the Lossy Counting algorithm and compare it to its centralized version. Our experimen
APA, Harvard, Vancouver, ISO, and other styles
9

Mendes Armando B. "BI and Data Warehouse Solutions for Energy Production Industry: Application of the CRISP-DM methodology." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2010. https://doi.org/10.3233/978-1-60750-577-8-211.

Full text
Abstract:
This paper reports two projects for supporting decisions of the Company of Electricity in Azores Islands, Electricidade dos A&amp;ccedil;ores. There were several decisions to support, such as whether communications between islands should moved from the present telephone lines to VoIP, and if better models to support forecast power consumption should be adopted. The solution established integrates OLAP cubes in a data mining project, based on CRISP-DM process model. Both for strategic and more operational decisions the objective was always to get accurate data, build a data warehouse and to get
APA, Harvard, Vancouver, ISO, and other styles
10

"Auditing the Telephony System: Defenses against Communications Security Breaches and Toll Fraud." In Information Security Management Handbook, Volume 3. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9781420003406-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Telephone fraud"

1

Zhang, Hua, Xiangming Wen, Peizhou He, and Wei Zheng. "Dealing with Telephone Fraud Using CAPTCHA." In 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science. IEEE, 2009. http://dx.doi.org/10.1109/icis.2009.125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Едреев, Т. Ш. М. "Criminal liability for telephone fraud: problems and prospects." In ХI Международная научно-практическая конференция "ТРАНСФОРМАЦИЯ РОССИЙСКОЙ НАУКИ В ЭПОХУ ИНФОРМАЦИОННОГО ОБЩЕСТВА". Crossref, 2025. https://doi.org/10.26118/3051.2024.54.51.049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anwer, Humaira, Khush Naseeb Fatima, and Nazar A. Saqib. "Fraud-sentient security architecture for improved telephone banking experience." In 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2016. http://dx.doi.org/10.1109/iemcon.2016.7746260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shelupanova, Polina A., Vladimir S. Repkin, Albina V. Osipenko, Konstantin V. Medentsev, Christina Y. Drozdova, and Daria V. Gapon. "Identification of Suspicious Patterns and Prevention of Telephone Fraud Incidents Using a Neural Network." In 2023 IEEE 24th International Conference of Young Professionals in Electron Devices and Materials (EDM). IEEE, 2023. http://dx.doi.org/10.1109/edm58354.2023.10225248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sahin, Merve, Aurelien Francillon, Payas Gupta, and Mustaque Ahamad. "SoK: Fraud in Telephony Networks." In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2017. http://dx.doi.org/10.1109/eurosp.2017.40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chiang, Hsia-Ling, Chia-Hwa Liu, Shih-Ming Cho, and Sebastian Lai. "An anti-fraud mechanism on IP2PSTN telephony." In 2010 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, 2010. http://dx.doi.org/10.1109/ccst.2010.5678733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Marzuoli, Aude, Hassan A. Kingravi, David Dewey, and Robert Pienta. "Uncovering the Landscape of Fraud and Spam in the Telephony Channel." In 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 2016. http://dx.doi.org/10.1109/icmla.2016.0153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!