{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:24Z","timestamp":1738777224970,"version":"3.37.0"},"reference-count":33,"publisher":"Academy Publisher","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.3.588-603","type":"journal-article","created":{"date-parts":[[2014,3,6]],"date-time":"2014-03-06T06:27:21Z","timestamp":1394087241000},"source":"Crossref","is-referenced-by-count":0,"title":["A Model-Based Resilience Analysis for IMS"],"prefix":"10.4304","volume":"9","author":[{"given":"Somia","family":"Natouri","sequence":"first","affiliation":[]},{"given":"Chidung","family":"Lac","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Serhrouchni","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,3,5]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1109\/ISSREW.2012.12","article-title":"A resilience design model for IMS-based services","volume-title":"23rd IEEE Int Symp on Software Reliability Engineering (ISSRE)","author":"Natouri","year":"2012","unstructured":"[4] S. Natouri and C.Lac, \"A resilience design model for IMS-based services\", 23rd IEEE Int. Symp. on Software Reliability Engineering (ISSRE), Dallas, TX, USA, November 2012."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0277-9536(96)00110-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s004420050090"},{"key":"ref4","first-page":"31","article-title":"Engineering resilience versus ecological resilience","volume-title":"Engineering within ecological constraints P","author":"Holling","year":"1996","unstructured":"[11] C. S. Holling, \"Engineering resilience versus ecological resilience\", in 'Engineering within ecological constraints', P.C. Schulze (Ed.), National Academy Press, Washington, D.C., USA. 1996, pp. 31-44."},{"key":"ref5","volume-title":"Designing for Resilience","author":"Madni","year":"2007","unstructured":"[12] A. M. Madni, Designing for Resilience, ISTI Lecture Notes on Advanced Topics in Systems Engineering, 2007."},{"key":"ref6","first-page":"1","article-title":"Defining and evaluating resilience: a performability perspective","volume-title":"9th Int Workshop on the Performability Modeling of Computer and Communication Systems","author":"Meyer","year":"2009","unstructured":"[15] J.F. Meyer, \"Defining and evaluating resilience: a performability perspective\", 9th Int. Workshop on the Performability Modeling of Computer and Communication Systems, Eger, Hungary, September 2009, pp. 1-3."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804331"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/IMSAA.2008.4753937","article-title":"A security evaluation of IMS deployments","volume-title":"2nd Int Conf on Internet Multimedia Services Architecture and Applications (IMSAA)","author":"Park","year":"2008","unstructured":"[19] F.S. Park et al., \"A security evaluation of IMS deployments\", 2nd Int. Conf. on Internet Multimedia Services Architecture and Applications (IMSAA), Bangalore, India, December 2008."},{"issue":"no. 3","key":"ref9","first-page":"385","article-title":"Securing IP Multimedia Subsystem with the appropriate security gateway and IPSec tunneling","volume":"8","author":"Slezak","year":"2011","unstructured":"[21] D. Slezak and Y. E. Gelogo, \"Securing IP Multimedia Subsystem with the appropriate security gateway and IPSec tunneling\", Journal of Security Engineering, vol. 8, no. 3, 2011, pp. 385-396.","journal-title":"Journal of Security Engineering"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1109\/ICMWCN.2007.4668180","article-title":"Mobile multimedia broadcasting vulnerability threats, attacks and security solutions","volume-title":"9th Int Conf on Mobile and Wireless Communications Networks","author":"Sher","year":"2007","unstructured":"[22] M. Sher and T. Magedanz, \"Mobile multimedia broadcasting vulnerability threats, attacks and security solutions\", 9th Int. Conf. on Mobile and Wireless Communications Networks, Cork, Ireland, September 2007."},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1145\/1376878.1376887","article-title":"Security issues with the IP Multimedia Subsystem (IMS","volume-title":"ACM Workshop on Middleware for Next Generation Converged Networks and Applications (MNCNA)","author":"Hunter","year":"2007","unstructured":"[23] M. T. Hunter, R. J. Clark and F. S. Park, \"Security issues with the IP Multimedia Subsystem (IMS)\", ACM Workshop on Middleware for Next Generation Converged Networks and Applications (MNCNA), Newport Beach, CA, USA, November 2007."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.4.4.254-262"},{"key":"ref13","first-page":"1","article-title":"Model-based security analysis for IMS network","volume-title":"Int Conf on Multimedia Computing and Systems (ICMCS)","author":"Maachaoui","year":"2011","unstructured":"[25] M. Maachaoui, A. Abou El Kalam and A. Ait Ouahman, \"Model-based security analysis for IMS network\", Int. Conf. on Multimedia Computing and Systems (ICMCS), Ouarzazate, Morocco, April 2011, pp. 1-6."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1145\/511446.511485","article-title":"Flash crowds and denial of service attacks: characterization and implications for CDNs and Web sites","volume-title":"11th ACM Int World Wide Web Conference","author":"Jung","year":"2002","unstructured":"[27] J. Jung, B. Krishnamurthy and M. Rabinovich, \"Flash crowds and denial of service attacks: characterization and implications for CDNs and Web sites\", 11th ACM Int. World Wide Web Conference\", Honolulu, HI, USA, May 2002, pp. 293\u2013304"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.382667"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041010.00064"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2007.4665302"},{"key":"ref18","first-page":"848","article-title":"Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks","volume-title":"7th ACS\/IEEE Int Conf on Computer Systems and Applications (AICCSA)","author":"Rebahi","year":"2008","unstructured":"[36] Y. Rebahi, M. Sher and T. Magedanz, \"Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks,\" 7th ACS\/IEEE Int. Conf. on Computer Systems and Applications (AICCSA), Doha, Qatar, March\/April 2008, pp. 848-851."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70786"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1109\/IMSAA.2008.4753934","article-title":"A Comparative Study of Anomaly Detection Algorithms for Detection of SIP Flooding in IMS","volume-title":"Int Conf on Internet Multimedia Services Architecture and Applications (IMSAA)","author":"Akbar","year":"2008","unstructured":"[38] M.A. Akbar, Z. Tariq, and M. Farooq, \"A Comparative Study of Anomaly Detection Algorithms for Detection of SIP Flooding in IMS\", Int. Conf. on Internet Multimedia Services Architecture and Applications (IMSAA), Bangalore, India, December 2008."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.04.007"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1145\/1569901.1570092","article-title":"Application of Evolutionary Algorithms in Detection of SIP based Flooding Attacks","volume-title":"Genetic and Evolutionary Computation Conference (GECCO)","author":"Akbar","year":"2009","unstructured":"[41] M. A. Akbar and M. Farooq, \"Application of Evolutionary Algorithms in Detection of SIP based Flooding Attacks,\" Genetic and Evolutionary Computation Conference (GECCO), Montr\u00e9al, Canada, July 2009."},{"key":"ref23","first-page":"1","article-title":"A white list approach to protect SIP servers from flooding attacks","volume-title":"IEEE Int Workshop Technical Committee on Communications Quality and Reliability (CQR)","author":"Chen","year":"2010","unstructured":"[42] E. Y. Chen and M. Itoh, \"A white list approach to protect SIP servers from flooding attacks,\" IEEE Int. Workshop Technical Committee on Communications Quality and Reliability (CQR), Vancouver, BC, Canada, June 2010, pp. 1-6."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.004"},{"key":"ref25","first-page":"433","article-title":"Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments","volume-title":"Int Conf on Dependable Systems and Networks (DSN)","author":"Wu","year":"2004","unstructured":"[44] Y. Wu et al., \"Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments\", Int. Conf. on Dependable Systems and Networks (DSN), Firenze, Italy, June\/July 2004, pp. 433\u2013442."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.73"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.014"},{"key":"ref28","first-page":"397","article-title":"Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models","volume-title":"Information Security Conference (SEC)","author":"Seo","year":"2008","unstructured":"[47] D. Seo, H. Lee and E. Nuwere, \"Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models\", 23rd IFIP TC11 Int. Information Security Conference (SEC), Milan, Italy, September 2008, pp. 397\u2013411."},{"key":"ref29","first-page":"700","article-title":"A rules-based intrusion detection and prevention framework against SIP malformed messages attacks","volume-title":"3rd IEEE Int Conf on Broadband Network and Multimedia Technology (IC-BNMT)","author":"Li","year":"2010","unstructured":"[48] H. Li et al. \"A rules-based intrusion detection and prevention framework against SIP malformed messages attacks\", 3rd IEEE Int. Conf. on Broadband Network and Multimedia Technology (IC-BNMT), Beijing, China, October 2010, pp. 700-705."},{"key":"ref30","first-page":"413","article-title":"Intrusion Detection System for IP Multimedia Subsystem using K-Nearest Neighbor Classifier","volume-title":"IEEE Int Multitopic Conference (INMIC)","author":"Farooqi","year":"2008","unstructured":"[49] A.H. Farooqi and A. Munir, \"Intrusion Detection System for IP Multimedia Subsystem using K-Nearest Neighbor Classifier\", IEEE Int. Multitopic Conference (INMIC), Karachi, Pakistan, December 2008, pp. 413-428."},{"key":"ref31","first-page":"37","article-title":"Caller identity privacy in SIP heterogeneous realms: A practical solution","volume-title":"IEEE Symp on Computers and Communications (ISCC)","author":"Karopoulos","year":"2008","unstructured":"[56] G. Karopoulos, G. Kambourakis, and S. Gritzalis, \"Caller identity privacy in SIP heterogeneous realms: A practical solution\", IEEE Symp. on Computers and Communications (ISCC), Marrakech, Morocco, July 2008, pp. 37\u201343."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.31"},{"key":"ref33","first-page":"1","article-title":"Rich communication suite","volume-title":"13th Int Conf on Intelligence in Next Generation Networks (ICIN)","author":"Henry","year":"2009","unstructured":"[64] K. Henry, L. Qunkai; S. Pasquereau, Rich communication suite, 13th Int. Conf. on Intelligence in Next Generation Networks (ICIN), Bordeaux, France, October 2009, pp. 1-6."}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:05:19Z","timestamp":1738775119000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,5]]},"references-count":33,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2014,3,5]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.3.588-603","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,3,5]]}}}