{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:35:45Z","timestamp":1729672545597,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/infcom.2009.5062173","type":"proceedings-article","created":{"date-parts":[[2009,6,3]],"date-time":"2009-06-03T11:10:14Z","timestamp":1244027414000},"page":"2455-2463","source":"Crossref","is-referenced-by-count":17,"title":["A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses"],"prefix":"10.1109","author":[{"given":"B. Y.","family":"Zhao","sequence":"first","affiliation":[{"name":"Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"C.","family":"Chi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"W.","family":"Gao","sequence":"additional","affiliation":[{"name":"Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Zhu","sequence":"additional","affiliation":[{"name":"Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G.","family":"Cao","sequence":"additional","affiliation":[{"name":"Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","article-title":"session initiation protocol (sip)-specific event notification","author":"roach","year":"2002","journal-title":"IETF"},{"journal-title":"Exploring ims network security for next generation network (NGN) carriers","year":"2007","key":"17"},{"journal-title":"Solution-building E2E IMS network security","year":"2006","key":"18"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1109\/INFCOM.2009.5062064","article-title":"a social network based patching scheme for worm containment in cellular networks","author":"zhu","year":"2009","journal-title":"Proceedings of IEEE Infocom"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72990-7_9"},{"key":"12","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1145\/1161089.1161111","article-title":"mitigating attacks on open functionality in sms-capable cellular networks","author":"traynor","year":"2006","journal-title":"MobiCom '06 Proceedings of the 12th annual international conference on Mobile computing and networking"},{"key":"21","article-title":"a session initiation protocol (sip) event notification extension for resource lists","author":"roach","year":"2006","journal-title":"IETF"},{"key":"20","article-title":"a presence event package for the session initiation protocol (sip)","author":"rosenberg","year":"2004","journal-title":"IETF"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.880180"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.153"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301325"},{"year":"0","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287868"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863968"},{"key":"28","volume":"9","author":"savage","year":"2001","journal-title":"Network support for IP traceback"},{"article-title":"icmp traceback messages. ietf internet draft","year":"2003","author":"bellovin","key":"29"},{"key":"3","article-title":"sip: session initiation protocol","author":"rosenberg","year":"2002","journal-title":"IETF"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/0470031840"},{"key":"10","article-title":"session initiation protocol (sip) server overload control: design and evaluation","author":"shen","year":"2008","journal-title":"IPTComm'08 Proceedings of Principles Systems and Applications of IP Telecommunications 2008"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20127"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-8163-9"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.474"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729489"},{"year":"0","key":"4"},{"journal-title":"SIPp","year":"2008","author":"gayraud","key":"9"},{"year":"0","key":"8","article-title":"the open sip express router (openser)"}],"event":{"name":"2009 Proceedings IEEE INFOCOM","start":{"date-parts":[[2009,4,19]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2009,4,25]]}},"container-title":["IEEE INFOCOM 2009"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5061887\/5061888\/05062173.pdf?arnumber=5062173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T02:01:41Z","timestamp":1710381701000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5062173\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/infcom.2009.5062173","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]}}}