{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:00:32Z","timestamp":1725544832160},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642116292"},{"type":"electronic","value":"9783642116315"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11631-5_18","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T08:44:11Z","timestamp":1264841051000},"page":"189-198","source":"Crossref","is-referenced-by-count":0,"title":["An Ontology-Driven antiSPIT Architecture"],"prefix":"10.1007","author":[{"given":"Stelios","family":"Dritsas","sequence":"first","affiliation":[]},{"given":"Dimitris","family":"Gritzalis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"VOIPSA, VoIP Security and Privacy Threat Taxonomy (October 2005), http:\/\/www.voipsa.org\/Activities\/taxonomy.php"},{"key":"18_CR2","unstructured":"Rosenberg, J., Jennings, C.: The Session Initiation Protocol (SIP) and Spam, draft-ietf-sipping-SPAM-03 (October 2006)"},{"key":"18_CR3","first-page":"426","volume-title":"Proc. of the 3rdIEEE International Workshop on Information Assurance (WIA 2007)","author":"S. Dritsas","year":"2007","unstructured":"Dritsas, S., Mallios, J., Theoharidou, M., Marias, G., Gritzalis, D.: Threat analysis of the Session Initiation Protocol regarding spam. In: Proc. of the 3rdIEEE International Workshop on Information Assurance (WIA 2007), April 2007, pp. 426\u2013433. IEEE Press, USA (2007)"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1109\/ICCCN.2007.4317883","volume-title":"Proc. of the 16th IEEE International Conference on Computer Communications and Networks (ICCCN 2007)","author":"G. Marias","year":"2007","unstructured":"Marias, G., Dritsas, S., Theoharidou, M., Mallios, J., Gritzalis, D.: SIP vulnerabilities and anti-SPIT mechanisms assessment. In: Proc. of the 16th IEEE International Conference on Computer Communications and Networks (ICCCN 2007), August 2007, pp. 597\u2013604. IEEE Press, Los Alamitos (2007)"},{"issue":"5-6","key":"18_CR5","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.cose.2008.05.007","volume":"27","author":"D. Gritzalis","year":"2008","unstructured":"Gritzalis, D., Mallios, Y.: A SIP-based SPIT management framework. Computers & Security\u00a027(5-6), 136\u2013153 (2008)","journal-title":"Computers & Security"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., et al.: SIP: Session Initiation Protocol, RFC 3261 (June 2002)","DOI":"10.17487\/rfc3261"},{"key":"18_CR7","unstructured":"Johnston, A.: SIP: Understanding the Session Initiation Protocol. Artech House (2004)"},{"issue":"2","key":"18_CR8","first-page":"10","volume":"16","author":"M. Sloman","year":"2002","unstructured":"Sloman, M., Lupu, E.: Security and management policy specification. IEEE Network, Special Issue on Policy-Based Networking\u00a016(2), 10\u201319 (2002)","journal-title":"IEEE Network, Special Issue on Policy-Based Networking"},{"key":"18_CR9","first-page":"381","volume-title":"Proc. of the 23rd International Information Security Conference (SEC 2008)","author":"S. Dritsas","year":"2008","unstructured":"Dritsas, S., Soupionis, J., Theoharidou, M., Mallios, J., Gritzalis, D.: SPIT Identification Criteria Implementations: Effectiveness and Lessons Learned. In: Samarati, P., et al. (eds.) Proc. of the 23rd International Information Security Conference (SEC 2008), September 2008, pp. 381\u2013395. Springer, Milan (2008)"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89173-4_25","volume-title":"Critical Information Infrastructures Security","author":"J. Mallios","year":"2008","unstructured":"Mallios, J., Dritsas, S., Tsoumas, B., Gritzalis, D.: Attack modeling of SIP-oriented SPIT. In: Lopez, J., H\u00e4mmerli, B.M. (eds.) CRITIS 2007. LNCS, vol.\u00a05141. Springer, Heidelberg (2008)"},{"key":"18_CR11","volume-title":"Formal Ontology in Conceptual Analysis and Knowledge Representation","author":"T. Gruber","year":"1993","unstructured":"Gruber, T.: Toward principles for the design of ontologies used for knowledge sharing. In: Formal Ontology in Conceptual Analysis and Knowledge Representation, March 1993. Kluwer Academic Publishers, Dordrecht (1993)"},{"issue":"3\/4","key":"18_CR12","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1006\/ijhc.1996.0091","volume":"46","author":"N. Guarino","year":"1997","unstructured":"Guarino, N.: Understanding, Building, and Using Ontologies: A commentary to \u201cUsing explicit ontologies in KBS development. International Journal of Human and Computer Studies\u00a046(3\/4), 293\u2013310 (1997)","journal-title":"International Journal of Human and Computer Studies"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Dritsas, S., Dritsou, V., Tsoumas, B., Constantopoulos, P., Gritzalis, D.: OntoSPIT: SPIT management through ontologies. Computer Communications (April 2008) (in press)","DOI":"10.1016\/j.comcom.2008.10.004"},{"key":"18_CR14","first-page":"426","volume-title":"Proc. of the 3rd IEEE International Workshop on Information Assurance","author":"S. Dritsas","year":"2007","unstructured":"Dritsas, S., Mallios, J., Theoharidou, M., Marias, G., Gritzalis, D.: Threat analysis of the Session Initiation Protocol, regarding spam. In: Proc. of the 3rd IEEE International Workshop on Information Assurance, April 2007, pp. 426\u2013433. IEEE Press, New Orleans (2007)"},{"key":"18_CR15","unstructured":"W3C Recommendation, The Ontology Web Language"},{"key":"18_CR16","unstructured":"OWL. W3C Recommendation. The Ontology Web Language (2004)"},{"key":"18_CR17","unstructured":"W3C. W3C Recommendation (10-02-2004), OWL Guide (2004)"},{"key":"18_CR18","unstructured":"Horrocks, I., Patel-Schneider, P., Boley, H., Tabet, S., Grosof, B., Dean, M.: SWRL: A Semantic Web Rule Language Combining OWL and RuleML, The DARPA Agent Markup Language Homepage"},{"key":"18_CR19","unstructured":"SIP Express Router (SER), Iptel.org."},{"key":"18_CR20","unstructured":"Example SER deployments, http:\/\/mit.edu\/sip\/sip.edu\/deployments.shtml"},{"key":"18_CR21","unstructured":"Prot\u00e9g\u00e9, Ontology development environment (2005), http:\/\/protege.stanford.edu\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Next Generation Society. Technological and Legal Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11631-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T21:04:03Z","timestamp":1685394243000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11631-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642116292","9783642116315"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11631-5_18","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}