{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:03:17Z","timestamp":1725519797755},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540890539"},{"type":"electronic","value":"9783540890546"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89054-6_4","type":"book-chapter","created":{"date-parts":[[2008,10,22]],"date-time":"2008-10-22T10:34:17Z","timestamp":1224671657000},"page":"69-89","source":"Crossref","is-referenced-by-count":2,"title":["Automatic Adaptation and Analysis of SIP Headers Using Decision Trees"],"prefix":"10.1007","author":[{"given":"Andrea","family":"Hess","sequence":"first","affiliation":[]},{"given":"Michael","family":"Nussbaumer","sequence":"additional","affiliation":[]},{"given":"Helmut","family":"Hlavacs","sequence":"additional","affiliation":[]},{"given":"Karin Anna","family":"Hummel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC 3261 (June 2002)","DOI":"10.17487\/rfc3261"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1007\/978-3-540-32256-6_52","volume-title":"RoboCup 2004: Robot World Cup VII","author":"D. Wilking","year":"2005","unstructured":"Wilking, D., R\u00f6fer, T.: Realtime Object Recognition Using Decision Tree Learning. In: RoboCup 2004: Robot World Cup VII, pp. 556\u2013563. Springer, Heidelberg (2005)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Heisig, S., Moyle, S.: Using Model Trees to Characterize Computer Resource Usage. In: 1st ACM SIGSOFT Workshop on Self-Managed Systems, pp. 80\u201384 (2004)","DOI":"10.1145\/1075405.1075421"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Abbes, T., Bouhoula, A., Rusinowitch, M.: Protocol Analysis in Intrusion Detection Using Decision Trees. In: International Conference on Information Technology: Coding and Computing (ITCC 2004), pp. 404\u2013408 (2004)","DOI":"10.1109\/ITCC.2004.1286488"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Kang, H., Zhang, Z., Ranjan, S., Nucci, A.: SIP-based VoIP Traffic Behavior Profiling and Its Applications. In: MineNet 2007, pp. 39\u201344 (2007)","DOI":"10.1145\/1269880.1269891"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Aichernig, B., Peischl, B., Weiglhofer, M., Wotawa, F.: Protocol Conformance Testing a SIP Registrar: an Industrial Application of Formal Methods. In: 5th IEEE Int. Conference on Software Engineering and Formal Methods, pp. 215\u2013224 (2007)","DOI":"10.1109\/SEFM.2007.31"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Abdelnur, H., State, R., Festor, O.: KiF: A Stateful SIP Fuzzer. In: 1st Int. Conference on Principles, Systems and Applications of IP Telecommunications, iptcomm.org (2007)","DOI":"10.1145\/1326304.1326313"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Acharya, A., Wand, X., Wrigth, C., Banerjee, N., Sengupta, B.: Real-time Monitoring of SIP Infrastructure Using Message Classification. In: MineNet 2007, pp. 45\u201350 (2007)","DOI":"10.1145\/1269880.1269892"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H.: Reliability of provisional responses in session initiation protocol (sip). RFC 3262 (June 2002)","DOI":"10.17487\/rfc3262"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H.: Session initiation protocol (sip): Locating sip servers. RFC 3262 (June 2002)","DOI":"10.17487\/rfc3263"},{"key":"4_CR11","unstructured":"Roach, A.B.: Session initiation protocol (sip)-specific event notification. RFC 3265 (June 2002)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Sparks, R.: The session initiation protocol (sip) refer method. RFC 3515 (April 2003)","DOI":"10.17487\/rfc3515"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Rosenberg, J.: The session initiation protocol (sip) update method. RFC 3311 (September 2002)","DOI":"10.17487\/rfc3311"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Johnston, A., Donovan, S., Sparks, R., Cunningham, C., Summers, K.: Session initiation protocol (sip) basic call flow examples. RFC 3665 (December 2003)","DOI":"10.17487\/rfc3665"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Johnston, A., Donovan, S., Sparks, R., Cunningham, C., Summers, K.: Session initiation protocol (sip) public switched telephone network (pstn) call flows. RFC 3666 (Decmember (2003)","DOI":"10.17487\/rfc3666"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Marshall, W.: Private session initiation protocol (sip) extensions for media authorization. RFC 3313 (January 2003)","DOI":"10.17487\/rfc3313"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Peterson, J.: A privacy mechanism for the session initiation protocol (sip). RFC 3323 (November 2002)","DOI":"10.17487\/rfc3323"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Arkko, J., Torvinen, V., Camarillo, G., Niemi, A., Haukka, T.: Security Mechanism Agreement for the Session Initiation Protocol (SIP). RFC 3329 (January 2003)","DOI":"10.17487\/rfc3329"},{"key":"4_CR19","volume-title":"Machine Learning","author":"T. Mitchell","year":"1997","unstructured":"Mitchell, T.: Machine Learning. McGraw-Hill, New York (1997)"},{"key":"4_CR20","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"I. Witten","year":"2005","unstructured":"Witten, I., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, San Francisco (2005)"}],"container-title":["Lecture Notes in Computer Science","Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89054-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T17:13:29Z","timestamp":1557854009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89054-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540890539","9783540890546"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89054-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}