{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:22Z","timestamp":1750307962142,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,6,12]],"date-time":"2007-06-12T00:00:00Z","timestamp":1181606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,12]]},"DOI":"10.1145\/1269880.1269891","type":"proceedings-article","created":{"date-parts":[[2007,9,25]],"date-time":"2007-09-25T19:21:05Z","timestamp":1190748065000},"page":"39-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["SIP-based VoIP traffic behavior profiling and its applications"],"prefix":"10.1145","author":[{"given":"Hun Jeong","family":"Kang","sequence":"first","affiliation":[{"name":"University of Minnesota"}]},{"given":"Zhi-Li","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]},{"given":"Supranamaya","family":"Ranjan","sequence":"additional","affiliation":[{"name":"Narus Inc."}]},{"given":"Antonio","family":"Nucci","sequence":"additional","affiliation":[{"name":"Narus Inc."}]}],"member":"320","published-online":{"date-parts":[[2007,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"J. Rosenberg H. Schulzrinne G. Camarillo P. J. Johnston A. R. Sparks M. Handley and E. Schooler. SIP: Session Initiation Protocol. RFC 3261 June 2002.   J. Rosenberg H. Schulzrinne G. Camarillo P. J. Johnston A. R. Sparks M. Handley and E. Schooler. SIP: Session Initiation Protocol. RFC 3261 June 2002.","DOI":"10.17487\/rfc3261"},{"key":"e_1_3_2_1_2_1","unstructured":"N. Wosnack. A Vonage VoIP 3-way call CID spooning vulnerability 2003. http:\/\/www.hackcanada.com\/canadian\/phreaking\/voip-vonage-vulnerability.html.  N. Wosnack. A Vonage VoIP 3-way call CID spooning vulnerability 2003. http:\/\/www.hackcanada.com\/canadian\/phreaking\/voip-vonage-vulnerability.html."},{"volume-title":"2nd Workshop on Securing Voice over IP","year":"2005","author":"McGann S.","key":"e_1_3_2_1_3_1"},{"volume-title":"Proc. of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP'06)","year":"2006","author":"Geneiatakis D.","key":"e_1_3_2_1_4_1"},{"volume-title":"Proc. IEEE of SoftCOM","year":"2005","author":"Geneiatakis D.","key":"e_1_3_2_1_5_1"},{"volume-title":"IEEE GlobeCom Workshop on VoIP Security: Challenges and Solutions","year":"2004","author":"Reynolds B.","key":"e_1_3_2_1_6_1"},{"volume-title":"Proc. of Network and Distributed System Security Symposium(NDSS'03)","year":"2003","author":"Reynolds B.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","first-page":"433","volume-title":"Proc. of the 2004 International Conference on Dependable Systems and Networks (DSN'04)","author":"Wu Y.-S.","year":"2004"},{"key":"e_1_3_2_1_9_1","first-page":"31","volume-title":"Proc. of USENIX, SRUTI Workshop","author":"Dantu R.","year":"2005"},{"volume-title":"NARUS","year":"2006","author":"Kang H. J.","key":"e_1_3_2_1_10_1"}],"event":{"name":"SIGMETRICS07: ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","ACM Association for Computing Machinery"],"location":"San Diego California USA","acronym":"SIGMETRICS07"},"container-title":["Proceedings of the 3rd annual ACM workshop on Mining network data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1269880.1269891","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1269880.1269891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:05Z","timestamp":1750258685000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1269880.1269891"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6,12]]},"references-count":10,"alternative-id":["10.1145\/1269880.1269891","10.1145\/1269880"],"URL":"https:\/\/doi.org\/10.1145\/1269880.1269891","relation":{},"subject":[],"published":{"date-parts":[[2007,6,12]]},"assertion":[{"value":"2007-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}