{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:40Z","timestamp":1763468260924},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/tnet.2015.2404336","type":"journal-article","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T18:52:57Z","timestamp":1426272777000},"page":"1209-1222","source":"Crossref","is-referenced-by-count":5,"title":["Detecting Problematic Control-Plane Protocol Interactions in Mobile Networks"],"prefix":"10.1109","volume":"24","author":[{"given":"Guan-Hua","family":"Tu","sequence":"first","affiliation":[]},{"given":"Yuanjie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chunyi","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Chi-Yu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Songwu","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"tang","year":"2013","journal-title":"Modeling and analysis of mobile telephony protocols"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/990010.990013"},{"key":"ref33","article-title":"Libra: divide and conquer to verify forwarding tables in huge networks","author":"zeng","year":"2014","journal-title":"Proc NSDI"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018470"},{"key":"ref31","article-title":"A NICE way to test openflow applications","author":"canini","year":"2012","journal-title":"Proc NSDI"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080126"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/BF01211473"},{"key":"ref36","article-title":"Header space analysis: Static checking for networks","author":"kazemian","year":"2012","journal-title":"Proc NSDI"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2823400"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377766"},{"key":"ref10","author":"damnjanovic","year":"2004","journal-title":"The Cdma2000 System for Mobile Communications 3G Wireless Evolution"},{"key":"ref40","year":"2001","journal-title":"TR33 902 Formal Analysis of the 3G Authentication Protocol"},{"key":"ref11","year":"2012","journal-title":"TS24 008 Mobile Radio Interface Layer 3"},{"key":"ref12","year":"2006","journal-title":"TS25 331 Radio Resource Control (RRC)"},{"key":"ref13","year":"2013","journal-title":"TS24 301 Non-Access-Stratum (NAS) for EPS"},{"key":"ref14","year":"2012","journal-title":"TS36 331 Radio Resource Control (RRC)"},{"key":"ref15","year":"2014","journal-title":"TS34 108 Common Test Environments for User Equipment (UE) Conformance Testing"},{"key":"ref16","year":"0","journal-title":"Qxdm Professional? Qualcomm Extensible Diagnostic Monitor"},{"key":"ref17","first-page":"87","article-title":"How voice calls affect data in operational LTE networks","author":"tu","year":"2013","journal-title":"Proc ACM MobiCom"},{"key":"ref18","year":"0","journal-title":"AT&T 2015 will be the Year of Mass Market VoLTE"},{"key":"ref19","year":"2014","journal-title":"Verizon Details VoLTE Rollout Plans"},{"key":"ref28","article-title":"Model checking large network protocol implementations","author":"musuvathi","year":"2004","journal-title":"Proc NSDI"},{"key":"ref4","year":"0","journal-title":"Voice over LTE"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464439"},{"key":"ref3","year":"2006","journal-title":"TS23 060 GPRS Service Description Stage 2"},{"key":"ref6","year":"0","journal-title":"Authoritative Guide to Advanced LTE Testing"},{"key":"ref5","year":"2012","journal-title":"TS23 272 CSFB in EPS"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35079-0_8"},{"key":"ref8","author":"holzmann","year":"1991","journal-title":"Design and Validation of Computer Protocols"},{"key":"ref7","year":"2014","journal-title":"TS 36 521?1 Evolved Universal Terrestrial Radio Access (E-UTRA) User Equipment (UE) Conformance Specification Radio Transmission and Reception Part 1 Conformance Testing"},{"key":"ref2","year":"2011","journal-title":"TS23 401 GPRS Enhancements for E-UTRAN Access"},{"key":"ref9","volume":"26202649","author":"baier","year":"2008","journal-title":"Principles of Model Checking"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626302"},{"key":"ref20","year":"2011","journal-title":"TS 23 216 Single Radio Voice Call Continuity (SRVCC)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644927"},{"key":"ref21","year":"2013","journal-title":"TS 23 203 Policy and Charging Control Architecture"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486006"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/2094091.2094109","article-title":"Predicting handoffs in 3G networks","volume":"45","author":"javed","year":"2012","journal-title":"SIGOPS Oper Syst Rev"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382220"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348560"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/90\/7452693\/7060732-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/7452693\/07060732.pdf?arnumber=7060732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:49:16Z","timestamp":1649443756000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7060732\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":40,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2015.2404336","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}