{"id":"https://openalex.org/W1981078001","doi":"https://doi.org/10.1109/icnc.2011.6022200","title":"A defense method based on improved MTP3 message discrimination in SS7 network","display_name":"A defense method based on improved MTP3 message discrimination in SS7 network","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W1981078001","doi":"https://doi.org/10.1109/icnc.2011.6022200","mag":"1981078001"},"language":"en","primary_location":{"id":"doi:10.1109/icnc.2011.6022200","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc.2011.6022200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Seventh International Conference on Natural Computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075176427","display_name":"Xinyuan An","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xinyuan An","raw_affiliation_strings":["Unit 63891, Luoyang, China"],"affiliations":[{"raw_affiliation_string":"Unit 63891, Luoyang, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100765413","display_name":"Jun Chen","orcid":"https://orcid.org/0000-0003-3265-0318"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jun Chen","raw_affiliation_strings":["Unit 63891, Luoyang, China"],"affiliations":[{"raw_affiliation_string":"Unit 63891, Luoyang, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100330618","display_name":"Yi Liu","orcid":"https://orcid.org/0000-0003-1399-7420"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yi Liu","raw_affiliation_strings":["People's Liberation Army, Beijing, Beijing, CN","Unit 63891, Luoyang, China"],"affiliations":[{"raw_affiliation_string":"People's Liberation Army, Beijing, Beijing, CN","institution_ids":[]},{"raw_affiliation_string":"Unit 63891, Luoyang, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102662554","display_name":"Xun Wei","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xun Wei","raw_affiliation_strings":["Unit 63891, Luoyang, China"],"affiliations":[{"raw_affiliation_string":"Unit 63891, Luoyang, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089784152","display_name":"XU Tianye","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tianye Xu","raw_affiliation_strings":["Unit 63891, Luoyang, China"],"affiliations":[{"raw_affiliation_string":"Unit 63891, Luoyang, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5075176427"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.09817763,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"5","issue":null,"first_page":"711","last_page":"715"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/counterfeit","display_name":"Counterfeit","score":0.8732545375823975},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.788672685623169},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7014471292495728},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6261503100395203},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.527627170085907},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.418979674577713}],"concepts":[{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.8732545375823975},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.788672685623169},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7014471292495728},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6261503100395203},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.527627170085907},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.418979674577713},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnc.2011.6022200","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc.2011.6022200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Seventh International Conference on Natural Computation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2102106072","https://openalex.org/W2351100634","https://openalex.org/W2366561106"],"related_works":["https://openalex.org/W3191226418","https://openalex.org/W2357749344","https://openalex.org/W1539823648","https://openalex.org/W4323356230","https://openalex.org/W2362200800","https://openalex.org/W4290078996","https://openalex.org/W3113783116","https://openalex.org/W4372352523","https://openalex.org/W1579156572","https://openalex.org/W2360633292"],"abstract_inverted_index":{"Because":[0],"of":[1,9,23,29,34,94],"lacking":[2],"secure":[3],"strategy,":[4],"there":[5],"appear":[6],"a":[7,40,85],"lot":[8],"security":[10,14,24],"leaks":[11,25],"and":[12,32,67,76,98,110],"increasing":[13],"threats":[15],"in":[16,26,54],"SS7":[17,79],"network.":[18,80,101],"Based":[19],"on":[20],"the":[21,30,37,44,63,69,91,95,99],"analysis":[22],"message":[27,57,92],"handling":[28,93],"network":[31,47,87,97],"features":[33],"those":[35],"threats,":[36],"paper":[38],"proposes":[39],"defense":[41],"method":[42,60,107],"against":[43],"counterfeit":[45,64],"signaling":[46,86],"management":[48,65],"messages.":[49],"After":[50],"adding":[51],"service":[52],"discrimination":[53],"MTP3":[55],"layer":[56],"handling,":[58],"this":[59,106],"can":[61],"discriminate":[62],"messages":[66,70],"stop":[68],"form":[71],"passing":[72],"through":[73],"signal":[74],"nodes,":[75],"thus":[77],"protect":[78],"The":[81],"simulation":[82],"experiment":[83],"establishes":[84],"model":[88],"to":[89],"simulate":[90],"defenseless":[96],"defended":[100],"Experiment":[102],"results":[103],"demonstrate":[104],"that":[105],"is":[108],"valid":[109],"feasible.":[111]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
