{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:35:05Z","timestamp":1725528905754},"publisher-location":"Wiesbaden","reference-count":14,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834806604"},{"type":"electronic","value":"9783834892836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9283-6_35","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T16:17:39Z","timestamp":1236356259000},"page":"329-340","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating Measures and Countermeasures for SPAM over Internet Telephony"],"prefix":"10.1007","author":[{"given":"Andreas U.","family":"Schmidt","sequence":"first","affiliation":[]},{"given":"Nicolai","family":"Kuntze","sequence":"additional","affiliation":[]},{"given":"Rachid El","family":"Khayari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"J. Rosenberg, C. Jennings, RFC 5039 \u2014 The Session Initiation Protocol (SIP) and Spam, IETF, 2008.","DOI":"10.17487\/rfc5039"},{"key":"35_CR2","unstructured":"M. Hansen, M. Hansen, J. M\u00fcller, T. Rohwer, C. Tolkmit and H. Waack, Developing a Legally Compliant Reachability Management System as a Countermeasure against SPIT, 2007."},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"S. Dritsas, J. Mallios, M. Theoharidou, G.F. Marias and D. Gritzalis, Threat Analysis of the Session Initiation Protocol Regarding Spam, IEEE, 2007.","DOI":"10.1109\/PCCC.2007.358923"},{"key":"35_CR4","unstructured":"H. Yany, K. Sripanidkulchaiz, H. Zhangy, Z. Shaez and D. Saha, Incorporating Active Fingerprinting into SPIT Prevention Systems, 2007."},{"key":"35_CR5","unstructured":"M. Stiemerling S. Niccolini, S. Tartarelli, Requirements and methods for SPIT identification using feedbacks in SIP. Internet-draft, 2008."},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"F. Wang, Y. Mo, B. Huang, P2P-AVS: P2P Based Cooperative VoIP Spam Filtering, 2007.","DOI":"10.1109\/WCNC.2007.650"},{"key":"35_CR7","unstructured":"C. Jennings, Computational Puzzles for SPAM Reduction in SIP. Internetdraft, 2008."},{"key":"35_CR8","unstructured":"H. Tschofenig, E. Leppanen, S. Niccolini, M. Arumaithurai, Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) based Robot Challenges for SIP. Internet-draft, 2008."},{"key":"35_CR9","unstructured":"S. Liske, K. Rebensburg, B. Schnor, SPIT-Erkennung, \u2014Bekanntgabe und-Abwehr in SIP-Netzwerken, 2007."},{"key":"35_CR10","unstructured":"M. Nassar, R. State, O. Festor, Intrusion detection mechanisms for VoIP applications, 2007."},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"M. Nassar, S. Niccolini, R. State, T. Ewald, Holistic VoIP Intrusion Detection and Prevention System, 2008.","DOI":"10.1145\/1326304.1326306"},{"key":"35_CR12","unstructured":"SIPp at Sourceforge, http:\/\/sipp.sourceforge.net\/index.html."},{"key":"35_CR13","unstructured":"Two attacks against VoIP, http:\/\/www.securityfocus.com\/infocus\/1862."},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Dellarocas, C., Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior, 2000","DOI":"10.1145\/352871.352889"}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T12:22:56Z","timestamp":1606134176000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834806604","9783834892836"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_35","relation":{},"subject":[]}}