{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:32:09Z","timestamp":1759091529761},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T00:00:00Z","timestamp":1317340800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11227-010-0545-5","type":"journal-article","created":{"date-parts":[[2011,9,29]],"date-time":"2011-09-29T15:22:47Z","timestamp":1317309767000},"page":"744-761","source":"Crossref","is-referenced-by-count":10,"title":["ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks"],"prefix":"10.1007","volume":"64","author":[{"given":"Fei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Fu Rong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Benxiong","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Laurence T.","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,9,30]]},"reference":[{"key":"545_CR1","volume-title":"2nd Conference on email and anti-spam Stanford University","author":"K Albrecht","year":"2005","unstructured":"Albrecht K, Burri N, Wattenhofer R (2005) Spamato: an extendable spam filter system. In: 2nd Conference on email and anti-spam Stanford University, Palo Alto, California, USA, Jul 2005"},{"key":"545_CR2","volume-title":"International conference on Internet and web applications and services\/advanced","author":"K Albrecht","year":"2006","unstructured":"Albrecht K, Wattenhofer R (2006) The TROOTH recommendation system. In: International conference on Internet and web applications and services\/advanced, Feb 2006"},{"issue":"4","key":"545_CR3","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MC.2005.132","volume":"38","author":"PO Boykin","year":"2005","unstructured":"Boykin PO, Roychowdhury VP (2005) Leveraging social networks to fight spam. Computer 38(4):61\u201368","journal-title":"Computer"},{"key":"545_CR4","volume-title":"Proc. 4th IEEE conf on P2P","author":"E Damiani","year":"2004","unstructured":"Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P (2004) P2P-based collaborative spam detection and filtering. In: Proc. 4th IEEE conf on P2P, August 2004"},{"key":"545_CR5","volume-title":"Proceedings of the 4th IEEE conf on P2P","author":"E Damiani","year":"2004","unstructured":"Damiani E, De Capitani di Vimercati S, Paraboschi S et al (2004) P2P-based collaborative spam detection and filtering. In: Proceedings of the 4th IEEE conf on P2P, Aug 2004"},{"key":"545_CR6","first-page":"31","volume-title":"USENIX. SRUTI \u201905 workshop","author":"R Dantu","year":"2005","unstructured":"Dantu R, Kolan P (2005) Detecting spam in VoIP networks. In: USENIX. SRUTI \u201905 workshop, Cambridge MA, Jul 2005, pp 31\u201337"},{"key":"545_CR7","unstructured":"FIPS 180-1 (1995) Secure Hash Standard. U.S. Department of Commerce\/NIST, National Technical Information Service, Springfield, USA, Apr 1995"},{"key":"545_CR8","unstructured":"(2006) General technical requirements for Softswitch equipment (in Chinese). YD\/T 1434-2006"},{"key":"545_CR9","unstructured":"(2003) http:\/\/www.forbes.com\/2003\/11\/11\/cz_kb_1111spam.html"},{"key":"545_CR10","unstructured":"(2007) http:\/\/www.telegeography.com\/products\/voip\/pdf\/USVoIP_Exec_Summ.pdf"},{"key":"545_CR11","unstructured":"(2007) http:\/\/www.telegeography.com\/products\/euro_voip\/samples\/Executive_Summary.pdf"},{"key":"545_CR12","unstructured":"(2007) http:\/\/www.telegeography.com\/products\/tg\/pdf\/tg08_exec_toc_lof.pdf"},{"key":"545_CR13","volume-title":"IEEE international conference on intelligent agent technology","author":"L Lazzari","year":"2005","unstructured":"Lazzari L, Mari M, Poggi A (2005) A collaborative and multi-agent approach to e-mail filtering. In: IEEE international conference on intelligent agent technology"},{"key":"545_CR14","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1109\/WETICE.2005.23","volume-title":"Proc. of the 14th IEEE international workshops on enabling technologies: infrastructure for collaborative enterprise","author":"L Lazzari","year":"2005","unstructured":"Lazzari L, Mari M, Poggi A (2005) CAFE-collaborative agents for filtering e-mails. In: Proc. of the 14th IEEE international workshops on enabling technologies: infrastructure for collaborative enterprise, Linkoping, Sweden, June 2005, pp 356\u2013361"},{"key":"545_CR15","first-page":"19","volume-title":"Secure network protocols, the 1st IEEE ICNP workshop","author":"Z Liu","year":"2005","unstructured":"Liu Z, Lin W, Li N, Lee D (2005) Detecting and filtering instant messaging spam\u2014a global and personalized approach. In: Secure network protocols, the 1st IEEE ICNP workshop, 2005, pp 19\u201324"},{"key":"545_CR16","first-page":"49","volume-title":"IEEE advances in wired and wireless communication","author":"R MacIntosh","year":"2005","unstructured":"MacIntosh R, Vinokurov D (2005) Detection and mitigation of spam in IP telephony networks using signaling protocol analysis. In: IEEE advances in wired and wireless communication, Apr 2005, pp 49\u201352"},{"key":"545_CR17","volume-title":"Proceedings of IPTPS02","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov P, Mazieres D (2002) Kademlia: A peer-to-peer information system based on the XOR metric. In: Proceedings of IPTPS02, Cambridge, USA, March 2002"},{"key":"545_CR18","unstructured":"Niccolini S (2006) Requirements and methods for SPIT identification using feedbacks in SIP. draft-niccolini-sipping-feedback-spit-00, IETF, February 2006"},{"key":"545_CR19","unstructured":"Niccolini S (2007) Signaling TO Prevent SPIT (SPITSTOP) reference scenario. draft-niccolini-sipping-spitstop-00, IETF, Jan 2007"},{"key":"545_CR20","first-page":"1979","volume-title":"IEEE proceedings of ICC","author":"J Quittek","year":"2007","unstructured":"Quittek J, Niccolini S, Tartarelli S et al (2007) Detecting SPIT calls by checking human communication patterns. In: IEEE proceedings of ICC, pp 1979\u20131984"},{"key":"545_CR21","volume-title":"IEEE proceeding of the 2nd workshop on securing voice over IP","author":"Y Rebahi","year":"2005","unstructured":"Rebahi Y, Sisalem D (2005) SIP service providers and the spam problem. In: IEEE proceeding of the 2nd workshop on securing voice over IP, June 2005"},{"key":"545_CR22","doi-asserted-by":"crossref","unstructured":"Rosenberg J (2002) SIP: Session Initiation Protocol. RFC3261, Jun 2002","DOI":"10.17487\/rfc3261"},{"key":"545_CR23","unstructured":"Rosenberg J (2006) The Session Initiation Protocol (SIP) and spam. draft-ietf-sipping-spam-03, IETF, Mar 2006"},{"key":"545_CR24","first-page":"55","volume-title":"Learning for text categorization\u2014papers from the AAAI workshop","author":"M Sahami","year":"1998","unstructured":"Sahami M, Dumais S, Horvitz E (1998) A Bayesian approach to filtering junk e-mail. In: Learning for text categorization\u2014papers from the AAAI workshop, pp 55\u201362"},{"key":"545_CR25","volume-title":"IEEE proceedings of GLOBECOM","author":"R Schlegel","year":"2006","unstructured":"Schlegel R, Niccolini S, Tartarelli S et al (2006) Spam over Internet Telephony (SPIT) prevention framework. In: IEEE proceedings of GLOBECOM"},{"key":"545_CR26","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/1065983.1065999","volume-title":"NOSSDAV\u201905","author":"K Singh","year":"2005","unstructured":"Singh K, Schulzrinne H (2005) Peer-to-Peer Internet Telephony using SIP. In: NOSSDAV\u201905, Washington, USA, Jun 2005. ACM Press, New York, pp 63\u201368"},{"key":"545_CR27","volume-title":"Proc. of the SIGCOMM 2001","author":"I Stoica","year":"2001","unstructured":"Stoica I, Morris R, Karger D, Kaashoek M, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for Internet applications. In: Proc. of the SIGCOMM 2001, San Diego, USA, August 2001"},{"key":"545_CR28","doi-asserted-by":"crossref","unstructured":"Turing A (1950) Computing machinery and intelligence. Originally published by Oxford University Press on behalf of MIND (J Mind Assoc) (236): 433\u2013460","DOI":"10.1093\/mind\/LIX.236.433"},{"key":"545_CR29","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/1105664.1105677","volume":"3","author":"V Ved Prakash","year":"2005","unstructured":"Ved Prakash V, O\u2019Donnell A (2005) Fighting spam with reputation systems. ACM Queue 3:36\u201341","journal-title":"ACM Queue"},{"key":"545_CR30","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1145\/544741.544809","volume-title":"Proceedings of the first international joint conference on autonomous agents and multi-agent systems","author":"B Yu","year":"2002","unstructured":"Yu B, Singh MP (2002) An evidential model of distributed reputation management. In: Proceedings of the first international joint conference on autonomous agents and multi-agent systems, Bologna, Italy, July 2002, pp 294\u2013301"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0545-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0545-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0545-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,10]],"date-time":"2023-06-10T04:45:11Z","timestamp":1686372311000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0545-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,30]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["545"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0545-5","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,9,30]]}}}