{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:50:18Z","timestamp":1730238618886,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/icdim.2008.4746763","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T10:29:46Z","timestamp":1232101786000},"page":"722-726","source":"Crossref","is-referenced-by-count":1,"title":["The softphone security"],"prefix":"10.1109","author":[{"given":"Dannan","family":"Lin","sequence":"first","affiliation":[]},{"given":"Charles A.","family":"Shoniregun","sequence":"additional","affiliation":[]},{"given":"Galyna A.","family":"Akmayeva","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2050780"},{"journal-title":"Hacking VoIP Exposed","year":"2007","author":"endler","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/AICT-ICIW.2006.147"},{"year":"0","key":"6"},{"journal-title":"Voice over IP Security A layered approach","year":"0","author":"mihai","key":"5"},{"key":"4","first-page":"6","article-title":"prepare for voip: assess your network's readiness, ability to handle voice traffic","volume":"26","author":"ortiz jr","year":"2004","journal-title":"Processor Editorial Article"},{"year":"0","key":"9"},{"key":"8","first-page":"217","author":"guo","year":"2006","journal-title":"Delving into internet streaming media delivery A quality and resource utilisation perspective"}],"event":{"name":"2008 Third International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2008,11,13]]},"location":"London, United Kingdom","end":{"date-parts":[[2008,11,16]]}},"container-title":["2008 Third International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733742\/4746691\/04746763.pdf?arnumber=4746763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T11:58:12Z","timestamp":1489751892000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4746763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icdim.2008.4746763","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}