{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:20:46Z","timestamp":1743128446254,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214837"},{"type":"electronic","value":"9783642214844"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21484-4_3","type":"book-chapter","created":{"date-parts":[[2011,6,21]],"date-time":"2011-06-21T10:43:37Z","timestamp":1308653017000},"page":"26-37","source":"Crossref","is-referenced-by-count":3,"title":["Econometric Feedback for Runtime Risk Management in VoIP Architectures"],"prefix":"10.1007","author":[{"given":"Oussema","family":"Dabbebi","sequence":"first","affiliation":[]},{"given":"R\u00e9mi","family":"Badonnel","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Voice over IP Security Alliance, VoIP Security and Privacy Threat Taxonomy (October 2005), http:\/\/www.voipsa.org\/Activities\/taxonomy.php"},{"key":"3_CR2","volume-title":"Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures","author":"P. Thermos","year":"2007","unstructured":"Thermos, P., Takanen, A.: Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures. Addison-Wesley Professional, Reading (2007)"},{"key":"3_CR3","unstructured":"ISO\/IEC 27005, Information Security Risk Management, http:\/\/www.iso.org"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Dabbebi, O., Badonnel, R., Festor, O.: Automated Runtime Risk Management for Voice over IP Networks and Services. In: Proc. of the 12th IEEE\/IFIP Network Operations and Management Symposium, NOMS 2010 (April 2010)","DOI":"10.1109\/NOMS.2010.5488435"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Dantu, R., Kolan, P., Cangussu, J.W.: Network Risk Management using Attacker Profiling. Security and Communication Networks\u00a02(1) (2009)","DOI":"10.1002\/sec.58"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Bunini, M., Sicari, S.: Assessing the Risk of Intercepting VoIP Calls. Elsevier Journal on Computer Networks (May 2008)","DOI":"10.1016\/j.comnet.2008.05.001"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"d\u2019Heureuse, N., Seedorf, J., Niccolini, S., Ewald, T.: Protecting SIP-based Networks and Services from Unwanted Communications. In: Proc. of IEEE\/Global Telecommunications Conference (GLOBECOM 2008) (December 2008)","DOI":"10.1109\/GLOCOM.2008.ECP.1084"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-540-30143-1_16","volume-title":"Recent Advances in Intrusion Detection","author":"A. Gehani","year":"2004","unstructured":"Gehani, A., Kedem, G.: RheoStat: Real Time Risk Management. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 296\u2013314. Springer, Heidelberg (2004)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Soupionis, Y., Tountas, G., Gritzalis, D.: Audio Captcha for SIP-Based VoIP. Springer Journal 41, 25\u201338","DOI":"10.1007\/978-3-642-01244-0_3"},{"key":"3_CR10","unstructured":"Computer Literacy Tests: Are You Human?, Grossman. Times Magazine (2008)"},{"key":"3_CR11","volume-title":"Session Initiation Protocol (SIP): Controlling Convergent Networks","author":"T. Russell","year":"2008","unstructured":"Russell, T.: Session Initiation Protocol (SIP): Controlling Convergent Networks. McGraw-Hill, New York (2008)"},{"key":"3_CR12","doi-asserted-by":"crossref","DOI":"10.1515\/9780691218632","volume-title":"Time Series Analysis","author":"J. Hamilton","year":"1994","unstructured":"Hamilton, J.: Time Series Analysis. Princeton Univ. Press, Princeton (1994)"},{"key":"3_CR13","unstructured":"Caldwell, J.G.: The Box-Jenkins Forecasting Technique. Ph.D. dissertation, University of North Carolina (1971)"},{"key":"3_CR14","unstructured":"R language, R project, http:\/\/cran.r-project.org\/"},{"key":"3_CR15","unstructured":"Quittek, J., Niccolini, S., Tartarelli, S., Schlegel, R.: Prevention of Spam over IP Telephony (SPIT). NEC Technical Journal 1(2) (2006)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Schlegel, R., Niccolini, S., Tartarelli, S.: Spam over Internet Telephony (SPIT) Prevention Framework. In: Proc. of the IEEE GLOBECOM, San Francisco (2006)","DOI":"10.1109\/GLOCOM.2006.192"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-540-73530-4_9","volume-title":"Dependable and Adaptable Networks and Services","author":"V.M. Quinten","year":"2007","unstructured":"Quinten, V.M., van de Meent, R., Pras, A.: Analysis of Techniques for Protection Against Spam over Internet Telephony. In: Pras, A., van Sinderen, M. (eds.) EUNICE 2007. LNCS, vol.\u00a04606, pp. 70\u201377. Springer, Heidelberg (2007)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Vitalta, R., Apte, C.V., Hellerstein, J.L., Ma, S., Weiss, S.M.: Predictive Algorithms in the Management of Computer Systems. IBM System Journal\u00a041(3) (2003)","DOI":"10.1147\/sj.413.0461"},{"key":"3_CR19","unstructured":"Hossain, A., Nassar, M., Rahman, A.: Comparison of Finite mixture of ARMA-GARCH, Back Propagation Neural Networks and Support-Vector Machines in Forecasting Returns. Departement of Finance & Banking, Rajshahi University"}],"container-title":["Lecture Notes in Computer Science","Managing the Dynamics of Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21484-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T02:25:21Z","timestamp":1637893521000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21484-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214837","9783642214844"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21484-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}