{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T20:19:45Z","timestamp":1694636385803},"reference-count":20,"publisher":"Maria Curie-Sklodowska University","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,1,1]]},"DOI":"10.2478\/v10065-008-0018-0","type":"journal-article","created":{"date-parts":[[2009,8,22]],"date-time":"2009-08-22T01:19:14Z","timestamp":1250903954000},"source":"Crossref","is-referenced-by-count":5,"title":["SecMon: end-to-end quality and security monitoring system"],"prefix":"10.17951","volume":"8","author":[{"given":"Tomasz","family":"Ciszkowski","sequence":"first","affiliation":[]},{"given":"Charlott","family":"Eliasson","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Fiedler","sequence":"additional","affiliation":[]},{"given":"Zbigniew","family":"Kotulski","sequence":"additional","affiliation":[]},{"given":"Radu","family":"Lupu","sequence":"additional","affiliation":[]},{"given":"Wojciech","family":"Mazurczyk","sequence":"additional","affiliation":[]}],"member":"7349","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"Kuhn D. R., Walsh T. J., Fries S., <i>Security Considerations for Voice Over IP Systems<\/i>, Computer Security Division, Information Technology Laboratory, NIST SP800-58, January (2005).","DOI":"10.6028\/NIST.SP.800-58"},{"key":"2","article-title":"DNA, a P2P-Based Framework for Distributed Network Management","author":"A. Binzenh\u00f6fer","year":"2005"},{"key":"3","first-page":"255","article-title":"Measurement of Application-Perceived Throughput of an E2E VPN Connection Using a GPRS Network","author":"S. Chevul","year":"2005"},{"key":"4","unstructured":"Chevul S., <i>On Application-Perceived Quality of Service in Wireless Networks<\/i>. Licentiate Dissertation, (2006)."},{"key":"5","article-title":"Measurements and Analysis of Application-Perceived Throughput via Mobile Links","author":"M. Fiedler","year":"2005"},{"key":"6","first-page":"399","article-title":"Identification of Performance Degradation in IP Networks Using Throughput Statistics","author":"M. Fiedler","year":"2003"},{"key":"7","article-title":"The Throughput Utility Function: Assessing Network Impact on Mobile Services","author":"M. Fiedler","year":"2005"},{"key":"8","article-title":"Quantification of Quality of Experience for Edge-Based Application","author":"T. Hossfeld","year":"2007"},{"key":"9","first-page":"52","article-title":"Measurement and Analysis of Skype VoIP Traffic in 3G UMTS Systems","author":"T. Ho\u00dffeld","year":"2006"},{"key":"10","unstructured":"Isaksson L., <i>Seamless Communications: Seamless Handover Between Wireless and Cellular Networks with Focus on Always Best Connected<\/i>. Ph.D. Thesis 2007:06. Blekinge Institute of Technology, (2007)."},{"key":"11","author":"J. Nielsen","year":"1994","journal-title":"Usability Engineering"},{"key":"12","unstructured":"Fiedler M., ed. <i>EuroNGI Deliverable D. JRA.6.1.1: State-of-the art with regards to userperceived quality of service and quality feedback<\/i>. May 2004. Available at <a target=\"_blank\" href='http:\/\/www.eurongi.org'>http:\/\/www.eurongi.org<\/a>"},{"key":"13","first-page":"170","article-title":"New VoIP Traffic Security Scheme with Digital Watermarking","author":"W. Mazurczyk","year":"2006"},{"key":"14","first-page":"417","article-title":"New Security and Control Protocol for VoIP Based on Steganography and Digital Watermarking","volume":"5","author":"W. Mazurczyk","year":"2006","journal-title":"Annales UMCS Informatica AI"},{"key":"15","unstructured":"Wierzbicki A., <i>Concepts, Methods, and Problems in Trust Management Research<\/i>. PJIIT <a target=\"_blank\" href='http:\/\/sieci.pjwstk.edu.pl\/uTrust.php'>http:\/\/sieci.pjwstk.edu.pl\/uTrust.php<\/a>"},{"key":"16","first-page":"247","author":"S. Murdoch","year":"2005","journal-title":"Embedding Covert Channels into TCP\/IP"},{"key":"17","first-page":"42","article-title":"Information Hiding through Noisy Channels","author":"V. Korjik","year":"2001"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1109\/SECCOM.2007.4550357","article-title":"An Assessment of VoIP Covert Channel Threats","author":"T. Takahashi","year":"2007"},{"key":"19","first-page":"1028","article-title":"Distributed Reputation Management in Collaborative Environment of Anonymous MANETs","author":"T. Ciszkowski","year":"2007"},{"key":"20","first-page":"48","article-title":"Enhanced Reputation Mechanism for Mobile ad hoc Networks","author":"J. Liu","year":"2004"}],"container-title":["Annales UMCS, Informatica"],"original-title":[],"link":[{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/download\/3215\/2411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T15:47:20Z","timestamp":1653493640000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/view\/3215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,1]]},"references-count":20,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.2478\/v10065-008-0018-0","relation":{},"ISSN":["2083-3628","1732-1360"],"issn-type":[{"value":"2083-3628","type":"electronic"},{"value":"1732-1360","type":"print"}],"subject":[],"published":{"date-parts":[[2008,1,1]]}}}