{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:49:15Z","timestamp":1725846555242},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/temu.2014.6917727","type":"proceedings-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T22:05:07Z","timestamp":1413324307000},"page":"7-12","source":"Crossref","is-referenced-by-count":1,"title":["A DIAMETER based security framework for mobile networks"],"prefix":"10.1109","author":[{"family":"Tran Quang Thanh","sequence":"first","affiliation":[{"name":"Technical University Berlin, Germany"}]},{"given":"Yacine","family":"Rebahi","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute FOKUS, Berlin, Germany"}]},{"given":"Thomas","family":"Magedanz","sequence":"additional","affiliation":[{"name":"Technical University Berlin, Germany"}]}],"member":"263","reference":[{"journal-title":"\"the Heartbleed\" Bug","year":"0","key":"19"},{"year":"0","key":"17"},{"journal-title":"MME and SGSN Related Interfaces Based on Diameter Protocol","year":"0","key":"18"},{"year":"0","key":"15"},{"journal-title":"On the Use of Unsupervised Techniques for Fraud Detection in VoIP Networks","year":"2013","author":"rebahi","key":"16"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"year":"0","key":"11"},{"year":"0","key":"12"},{"year":"0","key":"21"},{"key":"20","article-title":"An open testbed for diameter networks","author":"quang thanh","year":"0","journal-title":"20th IEEE International Conference on Software Telecommunications and Computer Networks (SOFTCOM 2012)"},{"journal-title":"Diameter Overload Control Requirements","year":"0","key":"22"},{"journal-title":"Why Are Mobile Networks Dropping Like Flies ?","year":"0","key":"23"},{"key":"24","article-title":"Change-point detection for voice over IP denial of service attacks","author":"rebahi","year":"2007","journal-title":"Proceedings of Communications in distributed Systems (KiVS)"},{"journal-title":"Detection of Abrupt Changes Theory and Application","year":"1993","author":"basseville","key":"25"},{"journal-title":"Android Spam Botnet Discovered by Microsoft Researcher","year":"0","key":"3"},{"journal-title":"Frost & Sullivan's New Product Innovation Award Diameter Routing","year":"0","key":"2"},{"year":"0","key":"10"},{"journal-title":"Diameter Base Protocol","year":"0","key":"1"},{"journal-title":"LTE Roaming Guidelines","year":"0","key":"7"},{"journal-title":"Diameter Base Protocol","year":"0","key":"6"},{"journal-title":"No Stopping Johannesburg's Traffic Light Thieves","year":"0","author":"smith","key":"5"},{"year":"2013","key":"4"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2014 International Conference on Telecommunications and Multimedia (TEMU)","start":{"date-parts":[[2014,7,28]]},"location":"Heraklion, Greece","end":{"date-parts":[[2014,7,30]]}},"container-title":["2014 International Conference on Telecommunications and Multimedia (TEMU)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6909332\/6917722\/06917727.pdf?arnumber=6917727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T02:53:06Z","timestamp":1623120786000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6917727\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/temu.2014.6917727","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}