1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Technical methods for countering IP multimedia spam
6.1 Source analysis method
6.2 Characteristics analysis method
6.3 Content analysis method
7 Framework for countering IP multimedia spam
7.1 Spammer
7.2 SAS functions
7.3 RAS functions
7.4 CAS functions
7.5 SR functions
7.6 Reference points in the framework
Appendix I – Countering spam by imposing spamming difficulties
Appendix II – Security and practical considerations in using the framework
II.1 Security considerations
II.2 Practical considerations
Bibliography