{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T01:55:50Z","timestamp":1761789350248},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/softcom.2016.7772119","type":"proceedings-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T21:40:15Z","timestamp":1482183615000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of the IP telephony security issues using automatic neural network classifier"],"prefix":"10.1109","author":[{"given":"Filip","family":"Rezac","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jan","family":"Rozhon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jakub","family":"Safarik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Miroslav","family":"Voznak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zuzana","family":"Bajakova","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Neural network classifier of attacks in IP telephony","author":"safarik","year":"2014","journal-title":"Proc SPIE 9118 Biosystems and Nanoengineering XII"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2307315"},{"journal-title":"Expert System Mentat","year":"0","author":"mach","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3261"},{"key":"ref4","first-page":"280","article-title":"Modelling the Impact of Network Features on Speech Quality in VoIP","author":"rozhon","year":"2015","journal-title":"International Conference on Telecommunication and Signal Processing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2013.31"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5426267"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2006.250469"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT.2014.6914042"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195475"},{"journal-title":"Juniper Research Tech Rep","article-title":"Mobile & Tablet Voice & Video Calling: Strategic Opportunities & Business Models","year":"2012","key":"ref2"},{"journal-title":"Juniper Research Tech Rep","article-title":"Mobile voice & video calling: strategic opportunities & bussiness models 2011&#x2013;2016","year":"2011","key":"ref1"},{"key":"ref9","first-page":"685","article-title":"Implementation of Brutlags algorithm in Anomaly Detection 3.0","author":"szmit","year":"2012","journal-title":"Computer Science and Information System"}],"event":{"name":"2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","start":{"date-parts":[[2016,9,22]]},"location":"Split, Croatia","end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7754733\/7772099\/07772119.pdf?arnumber=7772119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T13:16:22Z","timestamp":1483622182000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7772119\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/softcom.2016.7772119","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}