{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T11:16:16Z","timestamp":1649070976407},"reference-count":37,"publisher":"Elsevier","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1016\/b978-0-12-385514-5.00001-x","type":"book-chapter","created":{"date-parts":[[2011,3,4]],"date-time":"2011-03-04T09:32:37Z","timestamp":1299231157000},"page":"1-49","source":"Crossref","is-referenced-by-count":0,"title":["VoIP Security"],"prefix":"10.1016","author":[{"given":"Xinyuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ruishan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0005","unstructured":"P. Barnard, ABI Study Predicts 267 Million Residential VoIP Subscribers Worldwide by 2012. http:\/\/www.tmcnet.com\/voip\/ip-communications\/articles\/4824-abi-study-predicts-267-million-residential-voip-subscribers.htm"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0010","series-title":"SIP: Session Initiation Protocol","author":"Rosenberg","year":"2002"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0015","series-title":"Media Gateway Control Protocol (MGCP)","author":"Andreasen","year":"2003"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0020","series-title":"SDP: Session Description Protocol","author":"Handley","year":"1998"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0025","series-title":"RTP: A Transport Protocol for Real-Time Applications","author":"Schulzrinne","year":"1996"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0030","series-title":"RTP: A Transport Protocol for Real-Time Applications","author":"Schulzrinne","year":"2003"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0035","unstructured":"J. Hollingworth, Top 10 Concerns of Buying a VoIP Business Phone System. http:\/\/whitepapers.zdnet.com\/abstract.aspx?docid=1734213"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0040","series-title":"HTTP Authentication: Basic and Digest Access Authentication","author":"Franks","year":"1999"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0045","series-title":"The Transport Layer Security (TLS) Protocol Version 1.2","author":"Dierks","year":"2008"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0050","series-title":"Security Architecture for the Internet Protocol","author":"Kent","year":"1998"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0055","series-title":"S\/MIME Version 3 Message Specification","author":"Ramsdell","year":"1999"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0060","series-title":"The Secure Real-time Transport Protocol (SRTP)","author":"Baugher","year":"2004"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0065","unstructured":"A. Lavallee, Email Scammers Try New Bait in Voice \u2018Phishing\u2019. http:\/\/www.post-gazette.com\/pg\/06198\/706477-96.stm"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0070","unstructured":"R. Naraine, Voice Phishers Dialing for PayPal Dollars. http:\/\/www.eweek.com\/article2\/0,1895,1985966,00.asp"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0075","unstructured":"Skype\u2014the Global Internet Telephony Company. http:\/\/www.skype.org"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0080","series-title":"Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype","author":"Nappa","year":"2010"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0085","unstructured":"Gizmo. http:\/\/www.gizmoproject.com\/"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0090","unstructured":"Vonage Is Still #1 In VoIP Market Share. http:\/\/www.voipnow.org\/2006\/07\/vonage_is_still.html"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0095","unstructured":"P.D. Kretkowski, VoIP: How Free Can It Be? http:\/\/www.voip-news.com\/feature\/voip-how-free-can-be-120307\/"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0100","series-title":"Security Mechanism Agreement for the Session Initiation Protocol (SIP)","author":"Arkko","year":"2003"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0105","series-title":"The TLS Protocol","author":"Dierks","year":"1999"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0110","series-title":"Secure IP Telephony Using Multi-layered Protection","author":"Reynolds","year":"2003"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0115","series-title":"SCIDIVE: A stateful and cross protocol intrusion detection architecture for voice-over-IP environments","first-page":"433","author":"Wu","year":"2004"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0120","series-title":"VoIP Intrusion detection through interacting protocol state machines","author":"Sengar","year":"2006"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0125","series-title":"Fast detection of denial of service attacks on IP Telephony","first-page":"199","author":"Sengar","year":"2006"},{"issue":"6","key":"10.1016\/B978-0-12-385514-5.00001-X_bb0130","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MNET.2002.1081764","article-title":"SIP security issues: The SIP authentication procedure and its processing load","volume":"16","author":"Salsano","year":"2002","journal-title":"IEEE Netw."},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0135","series-title":"An analysis of security threats and tools in SIP-based VoIP systems","author":"McGann","year":"2005"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0140","series-title":"SIP security mechanisms: a state-of-the-art review","first-page":"147","author":"Geneiatakis","year":"2005"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0145","series-title":"Billing attacks on SIP-based VoIP systems","author":"Zhang","year":"2007"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0150","series-title":"Exploiting open functionality in SMS-capable cellular networks","first-page":"393","author":"Enck","year":"2005"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0155","series-title":"Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery","first-page":"1","author":"Racic","year":"2006"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0160","unstructured":"UPnP Forum. http:\/\/www.UPnP.org"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0165","series-title":"Session Traversal Utilities for NAT (STUN)","author":"Rosenberg","year":"2008"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0170","series-title":"Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)","author":"Mahy","year":"2010"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0175","series-title":"Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer\/Answer Protocols","author":"Rosenberg","year":"2010"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0180","series-title":"Voice pharming attack and the trust of VoIP","author":"Wang","year":"2008"},{"key":"10.1016\/B978-0-12-385514-5.00001-X_bb0185","series-title":"On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers","first-page":"61","author":"Zhang","year":"2009"}],"container-title":["Advances in Computers"],"original-title":[],"deposited":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T12:21:27Z","timestamp":1543926087000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B978012385514500001X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-385514-5.00001-x","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[2011]]}}}