{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:31:38Z","timestamp":1730251898840,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/icnc.2011.6022200","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T16:25:13Z","timestamp":1318436713000},"page":"711-715","source":"Crossref","is-referenced-by-count":0,"title":["A defense method based on improved MTP3 message discrimination in SS7 network"],"prefix":"10.1109","author":[{"given":"Xinyuan","family":"An","sequence":"first","affiliation":[]},{"given":"Jun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Tianye","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Security in the Traditional Telecommunications Networks and in the Internet","year":"1999","author":"isomaki","key":"3"},{"key":"2","article-title":"The threat and security architecture of no. 7 signaling network","volume":"5","author":"chen","year":"2006","journal-title":"Modern Science & Technology of Telecommunications"},{"journal-title":"Signal and Systems","year":"1999","author":"gui","key":"10"},{"key":"1","article-title":"CCS#7 networks dependability studies: Phase 2 deliverable 4.[S.L]t","author":"oneglia","year":"1998","journal-title":"Technical Report Annex a - Protocol Analysis in Access Control"},{"key":"7","first-page":"48","article-title":"Attacking and protection in SS7 network","author":"fu","year":"2003","journal-title":"Netinfo Security"},{"key":"6","article-title":"Securing SS7 telecomnmunications networks","author":"lorenz","year":"2001","journal-title":"Proceedings of the 2001 IEEE Workshop on Information Assurance and Security"},{"key":"5","first-page":"32","article-title":"Source address spoofing and prevention technologies in telecommunication","author":"jiang","year":"2009","journal-title":"Computer Security"},{"key":"4","article-title":"MTPSec: Customizable secure network","author":"sengar","year":"2005","journal-title":"IPDPS'05"},{"journal-title":"Specifications of Signaling System No 7-message Transfer Part Signaling Network Functions and Messages","year":"1996","key":"9"},{"key":"8","first-page":"56","article-title":"Research on secure strategy based on MTP3 layer in SS7 network","volume":"25","author":"he","year":"2008","journal-title":"Microelectronics & Computer"}],"event":{"name":"2011 Seventh International Conference on Natural Computation (ICNC)","start":{"date-parts":[[2011,7,26]]},"location":"Shanghai, China","end":{"date-parts":[[2011,7,28]]}},"container-title":["2011 Seventh International Conference on Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6012803\/6022138\/06022200.pdf?arnumber=6022200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T00:09:21Z","timestamp":1490054961000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6022200\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icnc.2011.6022200","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}