{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T09:33:29Z","timestamp":1725442409964},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122837","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T17:01:11Z","timestamp":1326301271000},"page":"304-307","source":"Crossref","is-referenced-by-count":0,"title":["Examining CSCF entity attacks scenarios and vulnerabilities in IP Multimedia Subsystems"],"prefix":"10.1109","author":[{"given":"Elham","family":"Nosrati","sequence":"first","affiliation":[]},{"given":"S. Navid Hashemi","family":"Tonekaboni","sequence":"additional","affiliation":[]},{"given":"S. Majid Hashemi","family":"Tonekaboni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2008.4493627"},{"journal-title":"Introduction to IMS","year":"2007","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IMSAA.2008.4753937"},{"journal-title":"The 3G IP Multimedia Subsystem","year":"2006","author":"camarillo","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP.2008.4604370"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1376878.1376887"},{"journal-title":"ITU-T Y 2701 Security Requirements for NGN Release","year":"0","key":"5"},{"journal-title":"Network Security Essentials","year":"2003","author":"stallings","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.4.4.254-262"},{"journal-title":"Introduction to IMS","year":"0","author":"leih","key":"8"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122837.pdf?arnumber=6122837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T16:11:15Z","timestamp":1490112675000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122837\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122837","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}