{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:42:21Z","timestamp":1743108141206,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319200330"},{"type":"electronic","value":"9783319200347"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20034-7_10","type":"book-chapter","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T19:25:48Z","timestamp":1433359548000},"page":"87-99","source":"Crossref","is-referenced-by-count":4,"title":["Using Application-Aware Flow Monitoring for\u00a0SIP\u00a0Fraud\u00a0Detection"],"prefix":"10.1007","author":[{"given":"Tomas","family":"Cejka","sequence":"first","affiliation":[]},{"given":"Vaclav","family":"Bartos","sequence":"additional","affiliation":[]},{"given":"Lukas","family":"Truxa","sequence":"additional","affiliation":[]},{"given":"Hana","family":"Kubatova","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Bartos, V., Zadnik, M., Cejka, T.: Nemea: Framework for stream-wise analysis of network traffic. Tech. rep., CESNET (2013)"},{"key":"10_CR2","unstructured":"CESNET: Nemea, \n                      \n                        https:\/\/www.liberouter.org\/nemea\/"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Claise, B., et al.: Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information. RFC 7011 (September 2013)","DOI":"10.17487\/rfc7119"},{"key":"10_CR4","unstructured":"Communications Fraud Control Association: 2013 CFCA Global Fraud Loss Survey. Press release (October 2013), \n                      \n                        http:\/\/www.cfca.org\/pdf\/survey\/CFCA2013GlobalFraudLossSurvey-pressrelease.pdf"},{"key":"10_CR5","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-11530-1_10","volume-title":"Information Security and Digital Forensics","author":"F. El-moussa","year":"2010","unstructured":"El-moussa, F., Mudhar, P., Jones, A.: Overview of SIP attacks and countermeasures. In: Weerasinghe, D. (ed.) ISDF 2009. LNICST, vol.\u00a041, pp. 82\u201391. Springer, Heidelberg (2010)"},{"key":"10_CR6","unstructured":"Gauci, S.: SIPVicious. Tools for auditing sip based voip systems (2012), \n                      \n                        https:\/\/code.google.com\/p\/sipvicious\/"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-30633-4_11","volume-title":"Dependable Networks and Services","author":"L. Hellemons","year":"2012","unstructured":"Hellemons, L., Hendriks, L., Hofstede, R., Sperotto, A., Sadre, R., Pras, A.: SSHCure: A Flow-Based SSH Intrusion Detection System. In: Sadre, R., Novotn\u00fd, J., \u010celeda, P., Waldburger, M., Stiller, B. (eds.) AIMS 2012. LNCS, vol.\u00a07279, pp. 86\u201397. Springer, Heidelberg (2012)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Hoffstadt, D., Marold, A., Rathgeb, E.: Analysis of SIP-Based Threats Using a VoIP Honeynet System. In: Proccedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 541\u2013548 (June 2012)","DOI":"10.1109\/TrustCom.2012.90"},{"issue":"4","key":"10_CR9","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/COMST.2014.2321898","volume":"16","author":"R. Hofstede","year":"2014","unstructured":"Hofstede, R., Celeda, P., Trammell, B., Drago, I., Sadre, R., Sperotto, A., Pras, A.: Flow monitoring explained: From packet capture to data analysis with netflow and ipfix. IEEE Communications Surveys Tutorials\u00a016(4), 2037\u20132064 (2014)","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"10_CR10","unstructured":"INVEA-TECH a.s.: FlowMon Probe \u2013 High-performance NetFlow Probe up to 10 Gbps, \n                      \n                        http:\/\/www.invea-tech.com\/products-and-services\/flowmon\/flowmon-probes"},{"key":"10_CR11","unstructured":"KaplanSoft: SipCLI, \n                      \n                        http:\/\/www.kaplansoft.com\/sipcli\/"},{"issue":"2","key":"10_CR12","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1109\/SURV.2011.031611.00112","volume":"14","author":"A.D. Keromytis","year":"2012","unstructured":"Keromytis, A.D.: A comprehensive survey of voice over ip security research. IEEE Communications Surveys & Tutorials\u00a014(2), 514\u2013537 (2012)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"10_CR13","unstructured":"Ohlmeier, N.: SIP Swiss Army Knife (Sipsak), \n                      \n                        http:\/\/sourceforge.net\/projects\/sipsak.berlios\/"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-662-43862-6_20","volume-title":"Monitoring and Securing Virtualized Networks and Services","author":"P. Velan","year":"2014","unstructured":"Velan, P., \u010celeda, P.: Next generation application-aware flow monitoring. In: Sperotto, A., Doyen, G., Latr\u00e9, S., Charalambides, M., Stiller, B. (eds.) AIMS 2014. LNCS, vol.\u00a08508, pp. 173\u2013178. Springer, Heidelberg (2014)"},{"key":"10_CR15","unstructured":"VoP Security: SiVuS (SiP Vulnerability Scanner) \u2013 User Guide v1.07, \n                      \n                        http:\/\/www.voip-security.net\/pdfs\/SiVuS-User-Doc1.7.pdf"}],"container-title":["Lecture Notes in Computer Science","Intelligent Mechanisms for Network Configuration and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20034-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T20:08:39Z","timestamp":1559938119000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20034-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319200330","9783319200347"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20034-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}