{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T06:03:32Z","timestamp":1751522612155,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/lanman.2005.1541543","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T15:41:15Z","timestamp":1160581275000},"page":"1-5","source":"Crossref","is-referenced-by-count":16,"title":["A Framework for Detecting Malformed Messages in SIP Networks"],"prefix":"10.1109","author":[{"given":"D.","family":"Geneiatakis","sequence":"first","affiliation":[]},{"given":"G.","family":"Kambourakis","sequence":"additional","affiliation":[]},{"given":"T.","family":"Dagiuklas","sequence":"additional","affiliation":[]},{"given":"C.","family":"Lambrinoudakis","sequence":"additional","affiliation":[]},{"given":"S.","family":"Gritzalis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CONECT.2003.1231477"},{"key":"14","article-title":"Middlebox communication architecture and Framework","volume":"3303","author":"srisuresh","year":"2002","journal-title":"RFC"},{"key":"11","article-title":"The Session Initiation Protocol (SIP) refer method","volume":"3515","author":"spark","year":"2003","journal-title":"RFC"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511498"},{"journal-title":"Exchange Server 5 5 Bug Could Be Exploited for Attacks","year":"2000","author":"fontana","key":"3"},{"journal-title":"Buffer Overrun in RFC Interface Could Allow Code Execution and Denial of Service","year":"2003","key":"2"},{"key":"1","article-title":"Known TCP implementation problems","volume":"2525","author":"paxson","year":"1999","journal-title":"RFC"},{"key":"10","article-title":"The Session Initiation Protocol (SIP) update method","volume":"3311","author":"rosenberg","year":"2002","journal-title":"RFC"},{"journal-title":"Security Testing of SIP Implementations","year":"2003","author":"wieser","key":"7"},{"journal-title":"Multiple Vulnerabilities in Implementations of the Session Initiation Protocol (SIP)","year":"2003","key":"6"},{"journal-title":"Multiple H 323 Message Vulnerabilities","year":"2004","key":"5"},{"journal-title":"Asterisk SIP Implementation Issue","year":"2003","key":"4"},{"key":"9","article-title":"The SIP INFO method","volume":"2976","author":"donovan","year":"2000","journal-title":"RFC"},{"key":"8","article-title":"Session initiation protocol","volume":"3261","author":"rosenberg","year":"2002","journal-title":"RFC"}],"event":{"name":"2005 14th IEEE Workshop on Local &amp; Metropolitan Area Networks","location":"Chania, Crete, Greece"},"container-title":["2005 14th IEEE Workshop on Local &amp;amp; Metropolitan Area Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10349\/32915\/01541543.pdf?arnumber=1541543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T21:59:57Z","timestamp":1489615197000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1541543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/lanman.2005.1541543","relation":{},"subject":[]}}