{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:08:10Z","timestamp":1750136890211,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":64,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642107719"},{"type":"electronic","value":"9783642107726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10772-6_1","type":"book-chapter","created":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T07:37:49Z","timestamp":1258097869000},"page":"1-17","source":"Crossref","is-referenced-by-count":15,"title":["A Survey of Voice over IP Security Research"],"prefix":"10.1007","author":[{"given":"Angelos D.","family":"Keromytis","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abdelnur, H., Avanesov, T., Rusinowitch, M., State, R.: Abusing SIP Authentication. In: Proceedings of the 4th International Conference on Information Assurance and Security (ISIAS), September 2008, pp. 237\u2013242 (2008)","DOI":"10.1109\/IAS.2008.29"},{"key":"1_CR2","unstructured":"Adelsbach, A., Alkassar, A., Garbe, K.-H., Luzaic, M., Manulis, M., Scherer, E., Schwenk, J., Siemens, E.: Voice over IP: Sichere Umstellung der Sprachkommunikation auf IP-Technologie. Bundesanzeiger Verlag (2005)"},{"key":"1_CR3","unstructured":"Anwar, Z., Yurcik, W., Johnson, R.E., Hafiz, M., Campbell, R.H.: Multiple Design Patterns for Voice over IP (VoIP) Security. In: Proceedings of the IEEE Workshop on Information Assurance (WIA), held in conjunction with the 25th IEEE International Performance Computing and Communications Conference (IPCCC) (April 2006)"},{"key":"1_CR4","unstructured":"Balasubramaniyan, V., Ahamad, M., Park, H.: CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation. In: Proceedings of the 4th Conference on Email and Anti-Spam (CEAS) (August 2007)"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Barbieri, R., Bruschi, D., Rosti, E.: Voice over IPsec: Analysis and Solutions. In: Proceedings of the 18 th Annual Computer Security Applications Conference (ACSAC), December 2002, pp. 261\u2013270 (2002)","DOI":"10.1109\/CSAC.2002.1176297"},{"key":"1_CR6","unstructured":"Bilien, J., Eliasson, E., Orrblad, J., Vatn, J.-O.: Secure VoIP: Call Establishment and Media Protection. In: Proceedings of the 2nd Workshop on Securing Voice over IP (June 2005)"},{"issue":"6","key":"1_CR7","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1109\/TSMCC.2007.905853","volume":"37","author":"D. Butcher","year":"2007","unstructured":"Butcher, D., Li, X., Guo, J.: Security Challenge and Defense in VoIP Infrastructures. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews\u00a037(6), 1152\u20131162 (2007)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"issue":"4","key":"1_CR8","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/MCOM.2006.1632661","volume":"44","author":"F. Cao","year":"2006","unstructured":"Cao, F., Malik, S.: Vulnerability Analysis and Best Practices for Adopting IP Telephony in Critical Infrastructure Sectors. IEEE Communications Magazine\u00a044(4), 138\u2013145 (2006)","journal-title":"IEEE Communications Magazine"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Conner, W., Nahrstedt, K.: Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks. In: Proceedings of the 10 th IEEE International Symposium on Multimedia (ISM), December 2008, pp. 340\u2013347 (2008)","DOI":"10.1109\/ISM.2008.65"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Cretu, G.F., Stavrou, A., Locasto, M.E., Stolfo, S.J., Keromytis, A.D.: Casting out Demons: Sanitizing Training Data for Anomaly Sensors. In: Proceedings of the IEEE Security and Privacy Symposium, May 2008, pp. 81\u201395 (2008)","DOI":"10.1109\/SP.2008.11"},{"key":"1_CR11","unstructured":"Dagiuklas, T., Geneiatakis, D., Kambourakis, G., Sisalem, D., Ehlert, S., Fiedler, J., Markl, J., Rokis, M., Botron, O., Rodriguez, J., Liu, J.: General Reliability and Security Framework for VoIP Infrastructures. Technical Report Deliverable D2.2, SNOCER COOP-005892 (September 2005)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Dantu, R., Fahmy, S., Schulzrinne, H., Cangussu, J.: Issues and Challenges in Securing VoIP. Computers & Security (to appear, 2009)","DOI":"10.1016\/j.cose.2009.05.003"},{"issue":"6","key":"1_CR13","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1016\/j.comcom.2006.12.023","volume":"30","author":"D. Geneiatakis","year":"2007","unstructured":"Geneiatakis, D., Lambrinoudakis, C.: An Ontology Description for SIP Security Flaws. Computer Communications\u00a030(6), 1367\u20131374 (2007)","journal-title":"Computer Communications"},{"issue":"4","key":"1_CR14","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1049\/ip-vis:20020457","volume":"149","author":"J.-I. Guo","year":"2002","unstructured":"Guo, J.-I., Yen, J.-C., Pai, H.-F.: New Voice over Internet Protocol Technique with Hierarchical Data Security Protection. IEE Proceedings \u2014 Vision, Image and Signal Processing\u00a0149(4), 237\u2013243 (2002)","journal-title":"IEE Proceedings \u2014 Vision, Image and Signal Processing"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Gupta, P., Shmatikov, V.: Security Analysis of Voice-over-IP Protocols. In: Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSFW), July 2007, pp. 49\u201363 (2007)","DOI":"10.1109\/CSF.2007.31"},{"key":"1_CR16","unstructured":"Keromytis, A.D.: Voice over IP: Risks, Threats and Vulnerabilities. In: Proceedings of the Cyber Infrastructure Protection (CIP) Conference (June 2009)"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Kolan, P., Dantu, R.: Socio-technical Defense Against Voice Spamming. ACM Transactions on Autonomous and Adaptive Systems (TAAS)\u00a02(1) (March 2007)","DOI":"10.1145\/1216895.1216897"},{"issue":"1","key":"1_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1404880.1404886","volume":"5","author":"P. Kolan","year":"2008","unstructured":"Kolan, P., Dantu, R., Cangussu, J.W.: Nuisance of a Voice Call. ACM Transactions on Multimedia Computing, Communications and Applications (TOMCCAP)\u00a05(1), 6:1\u20136:22 (2008)","journal-title":"ACM Transactions on Multimedia Computing, Communications and Applications (TOMCCAP)"},{"key":"1_CR19","unstructured":"Krebs, B.: Security Fix: Default Passwords Led to $55 Million in Bogus Phone Charges (June 2009)"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Kuhn, D.R., Walsh, T.J., Fries, S.: Security Considerations for Voice Over IP Systems. US National Institute of Standards and Technology (NIST) Special Publication SP 800-58 (January 2005)","DOI":"10.6028\/NIST.SP.800-58"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Kuntze, N., Schmidt, A.U., Hett, C.: Non-Repudiation in Internet Telephony. In: Proceedings of the IFIP International Information Security Conference, May 2007, pp. 361\u2013372 (2007)","DOI":"10.1007\/978-0-387-72367-9_31"},{"key":"1_CR22","unstructured":"Larson, J., Dawson, T., Evans, M., Straley, J.C.: Defending VoIP Networks from DDoS Attacks. In: Proceedings of the 2 nd Workshop on Securing Voice over IP (June 2005)"},{"issue":"1","key":"1_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/ip-vis:20045234","volume":"153","author":"C. Li","year":"2006","unstructured":"Li, C., Li, S., Zhang, D., Chen, G.: Cryptanalysis of a Data Security Protection Scheme for VoIP. IEE Proceedings\u2014Vision, Image and Signal Processing\u00a0153(1), 1\u201310 (2006)","journal-title":"IEE Proceedings\u2014Vision, Image and Signal Processing"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Luo, M., Peng, T., Leckie, C.: CPU-based DoS Attacks Against SIP Servers. In: Proceedings of the IEEE Network Operations and Management Symposium (NOMS), April 2008, pp. 41\u201348 (2008)","DOI":"10.1109\/NOMS.2008.4575115"},{"key":"1_CR25","unstructured":"Marias, G.F., Dritsas, S., Theoharidou, M., Mallios, J., Mitrou, L., Gritzalis, D., Dagiuklas, T., Rebahi, Y., Ehlert, S., Pannier, B., Capsada, O., Juell, J.F.: SPIT Detection and Handling Strategies for VoIP Infrastructures. Technical Report Deliverable WP2\/D2.2, SPIDER COOP-32720 (March 2007)"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Marshall, W., Faryar, A.F., Kealy, K., de los Reyes, G., Rosencrantz, I., Rosencrantz, R., Spielman, C.: Carrier VoIP Security Architecture. In: Proceedings of the 12 th International Telecommunications Network Strategy and Planning Symposium, November 2006, pp. 1\u20136 (2006)","DOI":"10.1109\/NETWKS.2006.300384"},{"issue":"6","key":"1_CR27","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MSP.2008.149","volume":"6","author":"B. Mathieu","year":"2008","unstructured":"Mathieu, B., Niccolini, S., Sisalem, D.: SDRS: A Voice-over-IP Spam Detection and Reaction System. IEEE Security & Privacy Magazine\u00a06(6), 52\u201359 (2008)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Nassar, M., State, R., Festor, O.: VoIP Honeypot Architecture. In: Proceedings of the 10 th IFIP\/IEEE International Symposium on Integrated Network Management, May 2007, pp. 109\u2013118 (2007)","DOI":"10.1109\/INM.2007.374775"},{"key":"1_CR29","unstructured":"Niccolini, S.: SPIT Prevention: State of the Art and Research Challenges. In: Proceedings of the 3 rd Workshop on Securing Voice over IP (June 2006)"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Niccolini, S., Garroppo, R.G., Giordano, S., Risi, G., Ventura, S.: SIP Intrusion Detection and Prevention: Recommendations and Prototype Implementation. In: Proceedings of the 1 st IEEE Workshop on VoIP Management and Security (VoIP MaSe), April 2006, pp. 47\u201352 (2006)","DOI":"10.1109\/VOIPMS.2006.1638122"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Ormazabal, G., Nagpal, S., Yardeni, E., Schulzrinne, H.: Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems. In: Proceedings of the 2 nd International Conference on Principles, Systems and Applications of IP Telecommunications (IPTComm), July 2008, pp. 107\u2013132 (2008)","DOI":"10.1007\/978-3-540-89054-6_6"},{"key":"1_CR32","unstructured":"Persky, D.: VoIP Security Vulnerabilities. White paper, SANS Institute (2007)"},{"issue":"5","key":"1_CR33","first-page":"673","volume":"14","author":"M. Petraschek","year":"2008","unstructured":"Petraschek, M., Hoeher, T., Jung, O., Hlavacs, H., Gansterer, W.N.: Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP. Journal of Universal Computer Science\u00a014(5), 673\u2013692 (2008)","journal-title":"Journal of Universal Computer Science"},{"key":"1_CR34","unstructured":"P\u00f6rschmann, C., Knospe, H.: Analysis of Spectral Parameters of Audio Signals for the Identification of Spam Over IP Telephony. In: Proceedings of the 5 th Conference on Email and Anti-Spam (CEAS) (August 2008)"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Quittek, J., Niccolini, S., Tartarelli, S., Stiemerling, M., Brunner, M., Ewald, T.: Detecting SPIT Calls by Checking Human Communication Patterns. In: Proceedings of the IEEE International Conference on Communications (ICC), June 2007, pp. 1979\u20131984 (2007)","DOI":"10.1109\/ICC.2007.329"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Rafique, M.Z., Akbar, M.A., Farooq, M.: Evaluating DoS Attacks Against SIP-Based VoIP Systems. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), November\/December (2009)","DOI":"10.1109\/GLOCOM.2009.5426247"},{"key":"1_CR37","unstructured":"Rebahi, Y., Ehlert, S., Dritsas, S., Marias, G.F., Gritzalis, D., Pannier, B., Capsada, O., Golubenco, T., Juell, J.F., Hoffmann, M.: General Anti-Spam Security Framework for VoIP Infrastructures. Technical Report Deliverable WP2\/D2.3, SPIDER COOP-32720 (July 2007)"},{"key":"1_CR38","unstructured":"Rebahi, Y., Ehlert, S., Theoharidou, M., Mallios, J., Dritsas, S., Marias, G.F., Mitrou, L., Dagiuklas, T., Avgoustianakis, M., Gritzalis, D., Pannier, B., Capsada, O., Markl, J.: SPIT Threat Analysis. Deliverable wp2\/d2.1, SPIDER COOP-32720 (January 2007)"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Rebahi, Y., Pallares, J.J., Kovacs, G., Minh, N.T., Ehlert, S., Sisalem, D.: Performance Analysis of Identity Management in the Session Initiation Protocol (SIP). In: Proceedings of the IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA), March\/April 2008, pp. 711\u2013717 (2008)","DOI":"10.1109\/AICCSA.2008.4493606"},{"key":"1_CR40","unstructured":"Reynolds, B., Ghosal, D.: Secure IP Telephony using Multi-layered Protection. In: Proceedings of the ISOC Symposium on Network and Distributed Systems Security (NDSS) (February 2003)"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Rieck, K., Wahl, S., Laskov, P., Domschitz, P., M\u00fcller, K.-R.: A Self-learning System for Detection of Anomalous SIP Messages. In: Proceedings of the 2 nd Internation Conference on Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks: Second International Conference (IPTComm), July 2008, pp. 90\u2013106 (2008)","DOI":"10.1007\/978-3-540-89054-6_5"},{"key":"#cr-split#-1_CR42.1","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC 3261 (Proposed Standard) (June 2002);","DOI":"10.17487\/rfc3261"},{"key":"#cr-split#-1_CR42.2","unstructured":"Updated by RFCs 3265, 3853, 4320, 4916, 5393"},{"issue":"6","key":"1_CR43","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MNET.2002.1081764","volume":"16","author":"S. Salsano","year":"2002","unstructured":"Salsano, S., Veltri, L., Papalilo, D.: SIP Security Issues: The SIP Authentication Procedure and its Processing Load. IEEE Network\u00a016(6), 38\u201344 (2002)","journal-title":"IEEE Network"},{"key":"1_CR44","doi-asserted-by":"crossref","unstructured":"Schlegel, R., Niccolini, S., Tartarelli, S., Brunner, M.: SPam over Internet Telephony (SPIT) Prevention Framework. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), November\/December 2006, pp. 1\u20136 (2006)","DOI":"10.1109\/GLOCOM.2006.192"},{"issue":"5","key":"1_CR45","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MNET.2006.1705882","volume":"20","author":"J. Seedorf","year":"2006","unstructured":"Seedorf, J.: Security challenges for peer-to-peer SIP. IEEE Network\u00a020(5), 38\u201345 (2006)","journal-title":"IEEE Network"},{"key":"1_CR46","unstructured":"Seedorf, J.: Using Cryptographically Generated SIP-URIs to Protect the Integrity of Content in P2P-SIP. In: Proceedings of the 3 rd Workshop on Securing Voice over IP (June 2006)"},{"issue":"6","key":"1_CR47","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1109\/TPDS.2007.70786","volume":"19","author":"H. Sengar","year":"2008","unstructured":"Sengar, H., Wang, H., Wijesekera, D., Jajodia, S.: Detecting VoIP Floods Using the Hellinger Distance. IEEE Transactions on Parallel and Distributed Systems\u00a019(6), 794\u2013805 (2008)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1_CR48","unstructured":"Sisalem, D., Ehlert, S., Geneiatakis, D., Kambourakis, G., Dagiuklas, T., Markl, J., Rokos, M., Botron, O., Rodriguez, J., Liu, J.: Towards a Secure and Reliable VoIP Infrastructure. Technical Report Deliverable D2.1, SNOCER COOP-005892 (May 2005)"},{"key":"1_CR49","unstructured":"Srivastava, K., Schulzrinne, H.: Preventing Spam For SIP-based Instant Messages and Sessions. Technical Report CUCS-042-04, Columbia University, Department of Computer Science (2004)"},{"key":"1_CR50","unstructured":"State, R., Festor, O., Abdelanur, H., Pascual, V., Kuthan, J., Coeffic, R., Janak, J., Floroiu, J.: SIP digest authentication relay attack. draft-state-sip-relay-attack-00 (March 2009)"},{"key":"1_CR51","unstructured":"The Register. Two charged with VoIP fraud (June 2006), http:\/\/www.theregister.co.uk\/2006\/06\/08\/voip_fraudsters_nabbed\/"},{"key":"1_CR52","unstructured":"The Register. Fugitive VOIP hacker cuffed in Mexico (February 2009), http:\/\/www.theregister.co.uk\/2009\/02\/11\/fugitive_voip_hacker_arrested\/"},{"key":"1_CR53","volume-title":"Securing VoIP Networks","author":"P. Thermos","year":"2008","unstructured":"Thermos, P., Takanen, A.: Securing VoIP Networks. Pearson Education, London (2008)"},{"key":"1_CR54","unstructured":"VoIP Security Alliance. VoIP Security and Privacy Threat Taxonomy, version 1.0 (October 2005), http:\/\/www.voipsa.org\/Activities\/taxonomy.php"},{"key":"1_CR55","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, R., Yang, X., Jiang, X., Wijesekera, D.: Voice Pharming Attack and the Trust of VoIP. In: Proceedings of the 4 th International Conference on Security and Privacy in Communication Networks (SecureComm), September 2008, pp. 1\u201311 (2008)","DOI":"10.1145\/1460877.1460908"},{"key":"1_CR56","unstructured":"Wieser, C., Laakso, M., Schulzrinne, H.: Security Testing of SIP Implementations. Technical Report CUCS-024-03, Columbia University, Department of Computer Science (2003)"},{"key":"1_CR57","doi-asserted-by":"crossref","unstructured":"Wright, C.V., Ballard, L., Coulls, S., Monrose, F.N., Masson, G.M.: Spot Me If You Can: Recovering Spoken Phrases in Encrypted VoIP Conversations. In: Proceedings of IEEE Symposium on Security and Privacy, May 2008, pp. 35\u201349 (2008)","DOI":"10.1109\/SP.2008.21"},{"key":"1_CR58","unstructured":"Wright, C.V., Ballard, L., Monrose, F.N., Masson, G.M.: Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? In: Proceedings of 16 th USENIX Security Symposium, August 2007, pp. 1\u201312 (2007)"},{"key":"1_CR59","doi-asserted-by":"crossref","unstructured":"Wu, Y., Bagchi, S., Garg, S., Singh, N.: SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. In: Proceedings of the Conference on Dependable Systems and Networks (DSN), June\/July 2004, pp. 433\u2013442 (2004)","DOI":"10.1109\/DSN.2004.1311913"},{"issue":"3","key":"1_CR60","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s10207-008-0071-0","volume":"8","author":"Y.-S. Wu","year":"2009","unstructured":"Wu, Y.-S., Apte, V., Bagchi, S., Garg, S., Singh, N.: Intrusion Detection in Voice over IP Environments. International Journal of Information Security\u00a08(3), 153\u2013172 (2009)","journal-title":"International Journal of Information Security"},{"key":"1_CR61","doi-asserted-by":"crossref","unstructured":"Zhang, G., Ehlert, S., Magedanz, T., Sisalem, D.: Denial of Service Attack and Prevention on SIP VoIP Infrastructures Using DNS Flooding. In: Proceedings of the 1 st International Conference on Principles, Systems and Applications of IP Telecommunications (IPTCOMM), July 2007, pp. 57\u201366 (2007)","DOI":"10.1145\/1326304.1326314"},{"key":"1_CR62","doi-asserted-by":"crossref","unstructured":"Zhang, R., Wang, X., Farley, R., Yang, X., Jiang, X.: On the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers. In: Proceedings of the 4 th International ACM Symposium on Information, Computer, and Communications Security (ASIACCS), March 2009, pp. 61\u201369 (2009)","DOI":"10.1145\/1533057.1533069"},{"key":"1_CR63","unstructured":"Zhang, R., Wang, X., Yang, X., Jiang, X.: Billing Attacks on SIP-based VoIP Systems. In: Proceedings of the 1st USENIX workshop on Offensive Technologies, August 2007, pp. 1\u20138 (2007)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10772-6_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T06:17:43Z","timestamp":1739427463000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10772-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642107719","9783642107726"],"references-count":64,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10772-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}