{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:16:36Z","timestamp":1743221796836,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642306327"},{"type":"electronic","value":"9783642306334"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30633-4_10","type":"book-chapter","created":{"date-parts":[[2012,5,30]],"date-time":"2012-05-30T03:25:28Z","timestamp":1338348328000},"page":"74-85","source":"Crossref","is-referenced-by-count":1,"title":["SPRT for SPIT: Using the Sequential Probability Ratio Test for Spam in VoIP Prevention"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Jung","sequence":"first","affiliation":[]},{"given":"Sylvain","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Damien","family":"Ernst","sequence":"additional","affiliation":[]},{"given":"Guy","family":"Leduc","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Chaisamran, N., Okuda, T., Blanc, G., Yamaguchi, S.: Trust-based voip spam detection based on call duration and human relationships. In: Proc. of the 11th Int. Symp. on Applications and the Internet, SAINT (2011)","DOI":"10.1109\/SAINT.2011.84"},{"issue":"36","key":"10_CR2","doi-asserted-by":"publisher","first-page":"15274","DOI":"10.1073\/pnas.0900282106","volume":"106","author":"N. Eagle","year":"2009","unstructured":"Eagle, N., Pentland, A., Lazer, D.: Inferring social network structure using mobile phone data. Proceedings of the National Academy of Sciences (PNAS)\u00a0106(36), 15274\u201315278 (2009)","journal-title":"Proceedings of the National Academy of Sciences (PNAS)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Kolan, P., Dantu, R.: Socio-technical defense against voice spamming. ACM Transactions on Autonomous and Adaptive Systems, TAAS (2007)","DOI":"10.1145\/1216895.1216897"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Nassar, M., Dabbebi, O., Badonnel, R., Festor, O.: Risk management in voip infrastructure using support vector machines. In: International Conference on Network and Service Management (CNSM 2010), pp. 48\u201355 (2010)","DOI":"10.1109\/CNSM.2010.5691338"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Nassar, M., Martin, S., Leduc, G., Festor, O.: Using decision trees for generating adaptive spit signatures. In: Proc. of the 4th International Conference on Security of Information and Networks, SIN 2011 (2011)","DOI":"10.1145\/2070425.2070431"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-540-87403-4_17","volume-title":"Recent Advances in Intrusion Detection","author":"M. Nassar","year":"2008","unstructured":"Nassar, M., State, R., Festor, O.: Monitoring SIP Traffic Using Support Vector Machines. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 311\u2013330. Springer, Heidelberg (2008)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-13971-0_10","volume-title":"Networked Services and Applications - Engineering, Control and Management","author":"M. Nassar","year":"2010","unstructured":"Nassar, M., State, R., Festor, O.: Labeled VoIP Data-Set for Intrusion Detection Evaluation. In: Aagesen, F.A., Knapskog, S.J. (eds.) EUNICE 2010. LNCS, vol.\u00a06164, pp. 97\u2013106. Springer, Heidelberg (2010)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Quittek, J., Niccolini, S., Tartarelli, S., Stiemerling, M., Brunner, M., Ewald, T.: Detecting SPIT calls by checking human communication patterns. In: IEEE International Conference on Communications (ICC 2007) (June 2007)","DOI":"10.1109\/ICC.2007.329"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Schlegel, R., Niccolini, S., Tartarelli, S., Brunner, M.: SPIT prevention framework. In: IEEE GLOBECOM 2006, pp. 1\u20136 (2006)","DOI":"10.1109\/GLOCOM.2006.192"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MNET.2006.1705879","volume":"20","author":"D. Shin","year":"2006","unstructured":"Shin, D., Ahn, J., Shim, C.: Progressive multi gray-leveling: a voice spam protection algorithm. IEEE Network\u00a020, 18\u201324 (2006)","journal-title":"IEEE Network"},{"key":"10_CR11","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-01244-0_3","volume-title":"Emerging Challenges for Security, Privacy and Trust","author":"Y. Soupionis","year":"2009","unstructured":"Soupionis, Y., Tountas, G., Gritzalis, D.: Audio CAPTCHA for SIP-Based VoIP. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol.\u00a0297, pp. 25\u201338. Springer, Heidelberg (2009)"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1214\/aoms\/1177731118","volume":"16","author":"A. Wald","year":"1945","unstructured":"Wald, A.: Sequential tests of statistical hypotheses. Annals of Mathematical Statistics\u00a016, 117\u2013186 (1945)","journal-title":"Annals of Mathematical Statistics"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1214\/aoms\/1177730197","volume":"19","author":"A. Wald","year":"1948","unstructured":"Wald, A., Wolfowitz, J.: Optimum character of the sequential probability test. Annals of Mathematical Statistics\u00a019, 326\u2013339 (1948)","journal-title":"Annals of Mathematical Statistics"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Wu, Y.-S., Bagchi, S., Singh, N., Wita, R.: Spam detection in voice-over-ip calls through semi-supervised clustering. In: Proceedings of the 2009 Dependable Systems Networks, pp. 307\u2013316 (2009)","DOI":"10.1109\/DSN.2009.5270323"},{"key":"10_CR15","unstructured":"Yan, H., Sripanidkulchai, K., Zhang, H., Shae, Z.-Y., Saha, D.: Incorporating active fingerprinting into spit prevention systems. In: Third Annual Security Workshop, VSW 2006 (2006)"}],"container-title":["Lecture Notes in Computer Science","Dependable Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30633-4_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T01:27:19Z","timestamp":1743211639000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30633-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642306327","9783642306334"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30633-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}