{"id":"https://openalex.org/W2084568989","doi":"https://doi.org/10.1109/isias.2011.6122837","title":"Examining CSCF entity attacks scenarios and vulnerabilities in IP Multimedia Subsystems","display_name":"Examining CSCF entity attacks scenarios and vulnerabilities in IP Multimedia Subsystems","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2084568989","doi":"https://doi.org/10.1109/isias.2011.6122837","mag":"2084568989"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2011.6122837","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2011.6122837","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 7th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090284434","display_name":"Elham Nosrati","orcid":null},"institutions":[{"id":"https://openalex.org/I136830121","display_name":"Islamic Azad University South Tehran Branch","ror":"https://ror.org/02xc21a77","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I136830121"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Elham Nosrati","raw_affiliation_strings":["Department of Electrical Engineering South Tehran Branch, Islamic Azad University\u00a0, Tehran, Iran","Department of Electrical Engineering, Azad University, South Tehran Branch, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering South Tehran Branch, Islamic Azad University\u00a0, Tehran, Iran","institution_ids":["https://openalex.org/I136830121"]},{"raw_affiliation_string":"Department of Electrical Engineering, Azad University, South Tehran Branch, Tehran, Iran","institution_ids":["https://openalex.org/I136830121"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054793833","display_name":"S. Navid Hashemi Tonekaboni","orcid":null},"institutions":[{"id":"https://openalex.org/I197220011","display_name":"Qazvin Islamic Azad University","ror":"https://ror.org/023kjn321","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I197220011"]},{"id":"https://openalex.org/I136830121","display_name":"Islamic Azad University South Tehran Branch","ror":"https://ror.org/02xc21a77","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I136830121"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"S. Navid Hashemi Tonekaboni","raw_affiliation_strings":["Faculty of Computer Engineering, Qazvin Islamic Azad University, Qazvin, Iran","South Tehran Branch Department of Computer Engineering, Islamic Azad University\u00a0, Tehran, Iran","Department of Computer Engineering , Azad University , South Tehran Branch, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Engineering, Qazvin Islamic Azad University, Qazvin, Iran","institution_ids":["https://openalex.org/I197220011"]},{"raw_affiliation_string":"South Tehran Branch Department of Computer Engineering, Islamic Azad University\u00a0, Tehran, Iran","institution_ids":["https://openalex.org/I136830121"]},{"raw_affiliation_string":"Department of Computer Engineering , Azad University , South Tehran Branch, Tehran, Iran","institution_ids":["https://openalex.org/I136830121"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068352045","display_name":"S. Majid Hashemi Tonekaboni","orcid":null},"institutions":[{"id":"https://openalex.org/I136830121","display_name":"Islamic Azad University South Tehran Branch","ror":"https://ror.org/02xc21a77","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I136830121"]},{"id":"https://openalex.org/I197220011","display_name":"Qazvin Islamic Azad University","ror":"https://ror.org/023kjn321","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I197220011"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"S. Majid Hashemi Tonekaboni","raw_affiliation_strings":["Faculty of Computer Engineering, Qazvin Islamic Azad University, Qazvin, Iran","South Tehran Branch Department of Computer Engineering, Islamic Azad University\u00a0, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Engineering, Qazvin Islamic Azad University, Qazvin, Iran","institution_ids":["https://openalex.org/I197220011"]},{"raw_affiliation_string":"South Tehran Branch Department of Computer Engineering, Islamic Azad University\u00a0, Tehran, Iran","institution_ids":["https://openalex.org/I136830121"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5090284434"],"corresponding_institution_ids":["https://openalex.org/I136830121"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.12761331,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"304","last_page":"307"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.7399468421936035},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7293680310249329},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6916853189468384},{"id":"https://openalex.org/keywords/ip-multimedia-subsystem","display_name":"IP Multimedia Subsystem","score":0.6561319231987},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5676087141036987},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.49184322357177734},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.4649658799171448},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33731609582901},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32292789220809937},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3090856373310089},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.06652963161468506}],"concepts":[{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.7399468421936035},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7293680310249329},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6916853189468384},{"id":"https://openalex.org/C26878273","wikidata":"https://www.wikidata.org/wiki/Q1140664","display_name":"IP Multimedia Subsystem","level":3,"score":0.6561319231987},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5676087141036987},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.49184322357177734},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.4649658799171448},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33731609582901},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32292789220809937},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3090856373310089},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.06652963161468506},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2011.6122837","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2011.6122837","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 7th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W141872991","https://openalex.org/W202400472","https://openalex.org/W1493616951","https://openalex.org/W1990560360","https://openalex.org/W2069986282","https://openalex.org/W2102126792","https://openalex.org/W2131610010","https://openalex.org/W2488292014","https://openalex.org/W2535878265","https://openalex.org/W2954168833"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2004781009","https://openalex.org/W4286284259","https://openalex.org/W1507118973"],"abstract_inverted_index":{"IP":[0],"Multimedia":[1],"Subsystems":[2],"(IMS)":[3],"were":[4],"first":[5],"innovated":[6],"in":[7],"3":[8],"<sup":[9],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[10],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">rd</sup>":[11],"Generation":[12],"Partnership":[13],"to":[14,38],"fill":[15],"the":[16,22,40,59,64],"gap":[17],"between":[18,66],"classical":[19],"communications":[20],"and":[21,51,58,69],"Internet.":[23],"IMS":[24],"has":[25],"some":[26,34,75],"security":[27,31,67],"vulnerabilities":[28,61],"despite":[29],"its":[30],"mechanisms,":[32],"which":[33,62],"attacks":[35,54,76],"abuse":[36],"them":[37],"threaten":[39],"network.":[41],"Here":[42],"we":[43],"focus":[44],"on":[45],"Call":[46],"Session":[47],"Control":[48],"Function":[49],"(CSCF)":[50],"examine":[52],"different":[53,81],"scenarios":[55],"against":[56],"it":[57],"relevant":[60],"indicated":[63],"relationship":[65],"weaknesses":[68],"attacks,":[70],"as":[71,73],"well":[72],"that":[74],"are":[77],"a":[78],"combination":[79],"of":[80],"attacks.":[82]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
