{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:13Z","timestamp":1750307893152,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,12]],"date-time":"2008-07-12T00:00:00Z","timestamp":1215820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,12]]},"DOI":"10.1145\/1388969.1389029","type":"proceedings-article","created":{"date-parts":[[2008,7,22]],"date-time":"2008-07-22T13:46:39Z","timestamp":1216734399000},"page":"2093-2098","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Attack analysis &amp; bio-inspired security framework for IPMultimedia subsystem"],"prefix":"10.1145","author":[{"given":"Aliya","family":"Awais","sequence":"first","affiliation":[{"name":"College of Electrical &amp; Mechanical Engineering, National University of Sciences &amp; Technology, Rawalpindi, Pakistan"}]},{"given":"Muddassar","family":"Farooq","sequence":"additional","affiliation":[{"name":"nexGINRC,NUCES-FAST, Islamabad, Pakistan"}]},{"given":"Muhammad Younus","family":"Javed","sequence":"additional","affiliation":[{"name":"College of Electrical &amp; Mechanical Engineering, National University of Sciences &amp; Technology, Islamabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2008,7,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Third Generation Partnership Project (3GPP) www.3gpp.org. 3GPP2 www.3gpp2.org.  Third Generation Partnership Project (3GPP) www.3gpp.org. 3GPP2 www.3gpp2.org."},{"key":"e_1_3_2_1_2_1","unstructured":"3GPP Technical Specification of Security: http:\/\/www.3gpp.org\/ftp\/Specs\/html-info  3GPP Technical Specification of Security: http:\/\/www.3gpp.org\/ftp\/Specs\/html-info"},{"key":"e_1_3_2_1_3_1","unstructured":"IMS Playground: www.fokus.fraunhofer.de\/ims  IMS Playground: www.fokus.fraunhofer.de\/ims"},{"key":"e_1_3_2_1_4_1","unstructured":"Open IMS Core Testbed http:\/\/www.openimscore.org  Open IMS Core Testbed http:\/\/www.openimscore.org"},{"volume-title":"Poikeselka, Mayer, Khartabil, Niemi, .The IMS IP Multimedia Concepts and Services","year":"2006","key":"e_1_3_2_1_5_1","unstructured":"Poikeselka, Mayer, Khartabil, Niemi, .The IMS IP Multimedia Concepts and Services , Second Edition, 2006 Jhon Wiley & amp; Sons, LTD. Poikeselka, Mayer, Khartabil, Niemi, .The IMS IP Multimedia Concepts and Services, Second Edition, 2006 Jhon Wiley &amp; Sons, LTD."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TRIDNT.2005.35"},{"key":"e_1_3_2_1_7_1","volume-title":"First International Conference on 23--25","author":"Tridentcom","year":"2005","unstructured":"Tridentcom 2005 . First International Conference on 23--25 Feb. 2005. Tridentcom 2005. First International Conference on 23--25 Feb. 2005."},{"key":"e_1_3_2_1_8_1","volume-title":"3rd International Workshop in Wireless Security Technologies","author":"Sher M.","year":"2005","unstructured":"M. Sher , T. Magedanz , . Secure Service Provisioning Framework (SSPF) for IP Multimedia System and Next Generation Mobile Networks , 3rd International Workshop in Wireless Security Technologies , London, U.K., IWWST'05 Proceeding (101--106 ), April 2005 . M.Sher, T.Magedanz, .Secure Service Provisioning Framework (SSPF) for IP Multimedia System and Next Generation Mobile Networks, 3rd International Workshop in Wireless Security Technologies, London, U.K., IWWST'05 Proceeding (101--106), April 2005."},{"key":"e_1_3_2_1_9_1","volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach.","author":"Leandro","year":"2002","unstructured":"Leandro N. de Castro and Jonathan Timmis , Artificial Immune Systems: A New Computational Intelligence Approach. , Springer , 2002 . Leandro N. de Castro and Jonathan Timmis, Artificial Immune Systems: A New Computational Intelligence Approach., Springer, 2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568257"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1276966"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776274.1776313"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11844297_63"},{"key":"e_1_3_2_1_14_1","unstructured":"Kotapati Liu Sun LaPorta .Taxonomy of Cyber Attacks on 3G networks The Pennsylvania State University Park.  Kotapati Liu Sun LaPorta .Taxonomy of Cyber Attacks on 3G networks The Pennsylvania State University Park."},{"key":"e_1_3_2_1_15_1","volume-title":"Inc","author":"Viega J.","year":"2002","unstructured":"J. Viega , Matt Massier , and Pravir Chandra , . Network Security with OpenSSL., O'Reilly &amp; Assoc ., Inc , 2002 . J. Viega, Matt Massier, and Pravir Chandra, .Network Security with OpenSSL., O'Reilly &amp; Assoc., Inc, 2002."},{"key":"e_1_3_2_1_16_1","unstructured":"Juels and Brainard .A Cryptographic Defense Against Connection Depletion Attacks RSA Laboratories.  Juels and Brainard .A Cryptographic Defense Against Connection Depletion Attacks RSA Laboratories."},{"key":"e_1_3_2_1_17_1","unstructured":"T. Fawcett .ROC Graphs: Notes and Practical Considerations for Researchers TR (HPL-2003-4) HP Labs USA.  T. Fawcett .ROC Graphs: Notes and Practical Considerations for Researchers TR (HPL-2003-4) HP Labs USA."}],"event":{"name":"GECCO08: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"],"location":"Atlanta GA USA","acronym":"GECCO08"},"container-title":["Proceedings of the 10th annual conference companion on Genetic and evolutionary computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1388969.1389029","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1388969.1389029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:22Z","timestamp":1750258042000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1388969.1389029"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,12]]},"references-count":17,"alternative-id":["10.1145\/1388969.1389029","10.1145\/1388969"],"URL":"https:\/\/doi.org\/10.1145\/1388969.1389029","relation":{},"subject":[],"published":{"date-parts":[[2008,7,12]]},"assertion":[{"value":"2008-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}