{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:15:17Z","timestamp":1725542117029},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108372"},{"type":"electronic","value":"9783642108389"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10838-9_2","type":"book-chapter","created":{"date-parts":[[2009,12,16]],"date-time":"2009-12-16T07:20:05Z","timestamp":1260948005000},"page":"10-19","source":"Crossref","is-referenced-by-count":1,"title":["Design and Implementation of SIP-aware Security Management System"],"prefix":"10.1007","author":[{"given":"KyoungHee","family":"Ko","sequence":"first","affiliation":[]},{"given":"Hwan-Kuk","family":"Kim","sequence":"additional","affiliation":[]},{"given":"JeongWook","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Chang-Yong","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Soo-Gil","family":"Cha","sequence":"additional","affiliation":[]},{"given":"Hyun Cheol","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"IETF RFC 3261, SIP: Session Initiation Protocol, \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc3261.txt"},{"key":"2_CR2","unstructured":"http:\/\/www.netiq.com\/"},{"key":"2_CR3","unstructured":"http:\/\/www.q1labs.com\/"},{"key":"2_CR4","unstructured":"http:\/\/www.acmepacket.com"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Nassar, M., et al.: Holistic VoIP Intrusion Detection and Prevention System. In: IPTCOMM 2007 (2007)","DOI":"10.1145\/1326304.1326306"},{"key":"2_CR6","unstructured":"Ko, K., et al.: The Design of SIP-based Enterprise Security Management System. In: Conference on Information Security and Cryptology \u2013 Winter, Written in Korean (2008)"},{"key":"2_CR7","unstructured":"IETF RFC, RTP: A Transport Protocol for Real-Time Applications (1889), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc1889.txt"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Jiang, G., et al.: Temporal and Spatial Distributed Event Correlation for Network Security. In: American Control Conference (2004)","DOI":"10.23919\/ACC.2004.1386701"},{"key":"2_CR9","unstructured":"http:\/\/www.3gpp.org"},{"key":"2_CR10","unstructured":"IETF RFC 4765, The Intrusion Detection Message Exchange Format (IDMEF), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc4765.txt"},{"key":"2_CR11","unstructured":"Internet Security Technical Forum, Telecommunications Technology Association, Written in Korean (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10838-9_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:42:24Z","timestamp":1619782944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10838-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108372","9783642108389"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10838-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}