{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T05:09:53Z","timestamp":1736140193088,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308492"},{"type":"electronic","value":"9783540322986"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11599371_25","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T09:56:37Z","timestamp":1132739797000},"page":"304-319","source":"Crossref","is-referenced-by-count":1,"title":["On Securing RTP-Based Streaming Content with Firewalls"],"prefix":"10.1007","author":[{"given":"Liang","family":"Lu","sequence":"first","affiliation":[]},{"given":"Rei","family":"Safavi-Naini","sequence":"additional","affiliation":[]},{"given":"Jeffrey","family":"Horton","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"http:\/\/nemesis.sourceforge.net\/"},{"key":"25_CR2","unstructured":"Packeteer, http:\/\/www.packeteer.com"},{"key":"25_CR3","unstructured":"Recommendation H.323: Visual Telephone Systems and Equipment for Local Area Networks Which Provide a Nonguaranteed Quality of Service. ITU-T (1996)"},{"key":"25_CR4","unstructured":"Connecting the World\u2019s Voice (2003), Available at http:\/\/www.packetcomm.org\/Documents\/Netrake_Comptel0205.ppt"},{"key":"25_CR5","unstructured":"NetScreen Concepts & Examples ScreenOS Reference Guide, Volume II: Fundermentals. Technical report, Juniper Networks (2004)"},{"key":"25_CR6","unstructured":"SnowShore Media Firewall. Technical report, Brooktrout Technology (2004)"},{"key":"25_CR7","unstructured":"Stateful Inspection Technology. Technical report, CheckPoint Software Technologies Ltd. (2004)"},{"key":"25_CR8","unstructured":"Cisco IOS Firewall. Technical report, Cisco Systems (2005), Available at http:\/\/www.cisco.com\/application\/pdf\/en\/us\/guest\/products\/ps1018\/c1244\/cdccont_0900aecd8029d0a6.pdf"},{"key":"25_CR9","volume-title":"Firewalls and Internet Security, Repelling the Wily Hacker","author":"W.R. Cheswick","year":"1994","unstructured":"Cheswick, W.R., Bellovin, S.M.: Firewalls and Internet Security, Repelling the Wily Hacker. Addison-Wesley, Reading (1994)"},{"key":"25_CR10","unstructured":"Fung, K.P.: SOCKS5-based Firewall Support for UDP-based Applications. Master\u2019s thesis, The Hong Kong Polytechnic Univ., Dept. of Computing, Hong Kong, PRC (1999), http:\/\/www2.comp.polyu.edu.hk\/~csrchang\/MSc\/Billy.pdf"},{"issue":"9","key":"25_CR11","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/26.61397","volume":"38","author":"R. Gusella","year":"1990","unstructured":"Gusella, R.: A Measurement Study of Diskless Workstation Traffic on an Ethernet. IEEE Transactions on Communications\u00a038(9), 1557\u20131568 (1990)","journal-title":"IEEE Transactions on Communications"},{"key":"25_CR12","volume-title":"Applied Multivariate Statistical Analysis","author":"R.A. Johnson","year":"1998","unstructured":"Johnson, R.A., Wichem, D.W.: Applied Multivariate Statistical Analysis. Prentice-Hall, Upper Saddle river (1998)"},{"key":"25_CR13","unstructured":"Schulzrinne, H.: rtpdump. http:\/\/www.cs.columbia.edu\/~hgs\/rtp\/rtpdump.html"},{"key":"25_CR14","unstructured":"Bacher, D., Swan, A., Rowe, L.A.: rtpmon: A Third-Party RTCP Monitor, http:\/\/bmrc.berkeley.edu\/people\/drbacher\/projects\/mm96-demo\/index.html"},{"issue":"7","key":"25_CR15","first-page":"1139","volume":"9","author":"H. Fowler","year":"1991","unstructured":"Fowler, H., Leland, W.: Local Area Network Traffic Characteristics, with Implications for Broadband Network Congestion Management. IEEE JSAC\u00a09(7), 1139\u20131149 (1991)","journal-title":"IEEE JSAC"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Rao, A., Lanphier, R.: Real Time Streaming Protocol (RTSP). RFC 2336 (April 1998)","DOI":"10.17487\/rfc2326"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications. RFC 3550 (July 2003)","DOI":"10.17487\/rfc3550"},{"key":"25_CR18","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/505672.505678","volume":"30","author":"J. Merwe","year":"2000","unstructured":"Merwe, J., Cceres, R., Chu, Y., Sreenan, C.: mmdump: a tool for monitoring internet multimedia traffic. ACM SIGCOMM Computer Communication Review\u00a030, 48\u201359 (2000)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Wack, J., Cutler, K., Pole, J.: Guidelines on Firewalls and Firewall Policy. Technical report, National Institute of Standards and Technology (2002)","DOI":"10.6028\/NIST.SP.800-41"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Fung, K.P., Chang, R.K.C.: Secure media streaming & secure adaptation for non-scalable video. In: ICIP, vol.\u00a03, pp. 1763\u20131766 (2004)","DOI":"10.1109\/ICIP.2004.1421415"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Handley, M., Schulzrinne, H., Schooler, E., Rosenberg, J.: SIP: Session Initiation Protocol. RFC 2543 (March 1999)","DOI":"10.17487\/rfc2543"},{"issue":"1","key":"25_CR22","first-page":"1","volume":"3","author":"P. Danzig","year":"1992","unstructured":"Danzig, P., Jamin, S., Caceres, R., Mitzel, D., Estrin, D.: An Empirical Workload Model for Driving Widearea TCP\/IP Network Simulations. Internetworking: Research and Experience\u00a03(1), 1\u201326 (1992)","journal-title":"Internetworking: Research and Experience"},{"issue":"6","key":"25_CR23","first-page":"986","volume":"4","author":"R. Jain","year":"1986","unstructured":"Jain, R., Routhier, S.: Packet Trains - Measurements and a New Model for Computer Network Traffic. IEEE JSAC\u00a04(6), 986\u2013995 (1986)","journal-title":"IEEE JSAC"},{"key":"25_CR24","unstructured":"Zimmermann, R., Fu, K., Shahabi, C., Jahangiri, M.: A Multi-Threshold Online Smoothing Technique for Variable Rate Multimedia Streams. Submitted for Journal Publication"},{"key":"25_CR25","unstructured":"Sun Microsystems Inc. Java Media Framework (1994-2005)"},{"issue":"3","key":"25_CR26","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/35.267444","volume":"32","author":"V. Frost","year":"1994","unstructured":"Frost, V., Melamed, B.: Traffic Modeling for Telecommunications Networks. IEEE Communications Magazine\u00a032(3), 70\u201380 (1994)","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"25_CR27","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/90.392383","volume":"3","author":"V. Paxson","year":"1995","unstructured":"Paxson, V., Floyd, S.: Wide-Area Traffic: The Failure of Poisson Modeling. IEEE\/ACM Transactions on Networking (TON)\u00a03(3), 226\u2013244 (1995)","journal-title":"IEEE\/ACM Transactions on Networking (TON)"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11599371_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T21:53:53Z","timestamp":1736114033000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11599371_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308492","9783540322986"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11599371_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}