杜磊 . 骚扰电话何时休. 计算机与网络, 2015,41(3) Du L . Harassing phone calls. Computer and Network, 2015,41(3)
2
王文超, 房一童 . 网间虚假主叫号码处理方案研究. 电信网技术, 2010(9): 65~68 Wang W C , Fang Y T . Study on the treatment of inter network false calling number. Telecommunications Network Technology, 2010(9): 65~68
3
李程, 李立卡 . 基于大数据处理技术的虚假主叫号码甄别探讨. 电信技术, 2014(10): 15~18 Li C , Li L K . Study on data processing technology based on the false calling number screening. Telecommunications Technology, 2014(10): 15~18
4
安茂波 . 诈骗电话特点分析及防范. 中国信息安全, 2014(5): 86~89 An M B . Characteristics of telephone fraud and its prevention. China Information Security, 2014(5): 86~89
5
计国华, 邵四清 . 上海移动骚扰电话分析拦截系统应用案例. 电信网技术, 2011(5): 82~87 Ji G H , Shao S Q . Case of annoyance call analysis and interception system of shanghai mobile. Telecommunications Network Technology, 2011(5): 82~87
6
彭华东 . 某地移动骚扰电话整治总结. 电脑知识与技术, 2014(15): 3647~3661 Peng H D . Summary of mobile phone and harassing phone calls in a certain place. Computer Knowledge and Technology, 2014(15): 3647~3661
7
李立卡, 马泽雄, 陈庆年 等. 电话诈骗防治技术解决方案与运维对策研究. 电信科学, 2014,30(11): 162~172 Li L K , Ma Z X , Chen Q N ,et al. Research of technology solutions and operation countermeasures to telephone fraud prevention and control. Telecommunications Science, 2014,30(11): 166~172
8
刘碧波 . 电信网内恶意呼叫的识别方法. 电信技术, 2014(10): 67~68 Liu B B . Identification method of malicious call in telecommunication network. Telecommunications Technology, 2014(10): 67~68
9
黄勇军, 冯明, 丁圣勇 等. 电信运营商大数据发展策略探讨. 电信科学, 2013,29(3): 7~11 Huang Y J , Feng M , Ding S Y ,et al. Discussion on the development strategy of telecom operators. Telecommunications Science, 2013,29(3): 7~11
10
杜海涛, 张峰, 高曼颖 等. 基于话音识别的骚扰电话呼叫检测技术分析. 电信工程技术与标准化, 2014(12): 5~9 Du H T , Zhang F , Gao M Y ,et al. Analysis and experiment of disturbing call detection technology based on speech recognition. Teleco m Engineering Technics and Standardization, 2014(12): 5~9
11
胡舜耕, 魏进武 . 大数据及其在电信运营中的应用研究. 电信技术, 2015(1): 14~17 Hu S G , Wei J W . Research on large data and its application in telecom operation. Telecommunications Technology, 2015(1): 14~17