{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:23:05Z","timestamp":1772205785497,"version":"3.50.1"},"publisher-location":"Cham","reference-count":79,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031859595","type":"print"},{"value":"9783031859601","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-85960-1_3","type":"book-chapter","created":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T07:24:42Z","timestamp":1741245882000},"page":"44-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Understanding IPv6 Aliases and\u00a0Detection Methods"],"prefix":"10.1007","author":[{"given":"Mert","family":"Erdemir","sequence":"first","affiliation":[]},{"given":"Frank","family":"Li","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Pearce","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,7]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Albakour, T., Gasser, O., Smaragdakis, G.: Pushing alias resolution to the limit. In: ACM Internet Measurement Conference (IMC) (2023)","DOI":"10.1145\/3618257.3624840"},{"key":"3_CR2","unstructured":"Alexa: Alexa top 1 million (2021). http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip. Accessed 2021"},{"key":"3_CR3","unstructured":"Ark: Ark IPv6 Topology Dataset (2024). https:\/\/catalog.caida.org\/dataset\/ipv6_allpref_topology"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Bailey, M., Dittrich, D., Kenneally, E., Maughan, D.: The Menlo report. IEEE Secur. & Privacy (2012)","DOI":"10.1109\/MSP.2012.52"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Bano, S., et al.: Scanning the Internet for liveness. In: ACM SIGCOMM (2018)","DOI":"10.1145\/3213232.3213234"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Beverly, R., Brinkmeyer, W., Luckie, M., Rohrer, J.P.: IPv6 alias resolution via induced fragmentation. In: Passive and Active Measurement (PAM). Springer, Cham (2013)","DOI":"10.1007\/978-3-642-36516-4_16"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Beverly, R., Durairajan, R., Plonka, D., Rohrer, J.P.: In the IP of the beholder: strategies for active IPv6 topology discovery. In: ACM Internet Measurement Conference (IMC) (2018)","DOI":"10.1145\/3278532.3278559"},{"key":"3_CR8","unstructured":"The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research: The Belmont report - ethical principles and guidelines for the protection of human subjects of research (1979). https:\/\/www.hhs.gov\/ohrp\/regulations-and-policy\/belmont-report\/read-the-belmont-report\/index.html"},{"key":"3_CR9","unstructured":"Bloomquist, Z.: TLDR 2 - a continuously updated historical TLD records archive (2024). https:\/\/github.com\/flotwig\/TLDR-2"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Borgolte, K., Hao, S., Fiebig, T., Vigna, G.: Enumerating active IPv6 hosts for large-scale security scans via DNSSEC-signed reverse zones. In: IEEE Symposium on Security and Privacy (S &P). IEEE (2018)","DOI":"10.1109\/SP.2018.00027"},{"key":"3_CR11","unstructured":"CAIDA: Inferred as to organization mapping dataset (2024). https:\/\/www.caida.org\/catalog\/datasets\/as-organizations\/"},{"key":"3_CR12","unstructured":"CAIDA: The IPv6 DNS names dataset (2024). https:\/\/www.caida.org\/catalog\/datasets\/ipv6_dnsnames_dataset\/"},{"key":"3_CR13","unstructured":"Centre, R.N.C.: IPv6 address allocation and assignment policy (2020). https:\/\/www.ripe.net\/publications\/docs\/ripe-738"},{"key":"3_CR14","unstructured":"Centre, R.N.C.: Ripe atlas (2024). https:\/\/www.ripe.net\/analyse\/raw-data-sets"},{"key":"3_CR15","unstructured":"Cloudflare: Cloudflare radar (2024). https:\/\/radar.cloudflare.com\/domains"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-030-47426-3_47","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"T Cui","year":"2020","unstructured":"Cui, T., Gou, G., Xiong, G.: 6GCVAE: gated convolutional variational autoencoder for IPv6 target generation. In: Lauw, H.W., Wong, R.C.-W., Ntoulas, A., Lim, E.-P., Ng, S.-K., Pan, S.J. (eds.) PAKDD 2020. LNCS (LNAI), vol. 12084, pp. 609\u2013622. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-47426-3_47"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Cui, T., Gou, G., Xiong, G., Liu, C., Fu, P., Li, Z.: 6GAN: IPv6 multi-pattern target generation via generative adversarial nets with reinforcement learning. In: IEEE Conference on Computer Communications (INFOCOM). IEEE (2021)","DOI":"10.1109\/INFOCOM42981.2021.9488912"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Cui, T., Xiong, G., Gou, G., Shi, J., Xia, W.: 6vecLM: language modeling in vector space for IPv6 target generation. In: ECML PKDD 2020. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-67667-4_12"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Dhamdhere, A., Luckie, M., Huffaker, B., Claffy, K., Elmokashfi, A., Aben, E.: Measuring the deployment of IPv6: topology, routing and performance. In: ACM Internet Measurement Conference (IMC) (2012)","DOI":"10.1145\/2398776.2398832"},{"key":"3_CR20","unstructured":"van Dijk, P.: Finding v6 hosts by efficiently mapping IP6.arpa (2012). https:\/\/7bits.nl\/blog\/posts\/finding-v6-hosts-by-efficiently-mapping-ip6-arpa"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., Halderman, J.A.: A search engine backed by Internet-wide scanning. In: ACM SIGSAC Conference on Computer and Communications Security (CCS) (2015)","DOI":"10.1145\/2810103.2813703"},{"key":"3_CR22","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast Internet-wide scanning and its security applications. In: USENIX Security Symposium (2013)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Eddy, W.: TCP SYN Flooding Attacks and Common Mitigations. RFC 4987 (2007). https:\/\/www.rfc-editor.org\/info\/rfc4987","DOI":"10.17487\/rfc4987"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Elmokashfi, A., Dhamdhere, A.: Revisiting BGP churn growth. ACM SIGCOMM (2014)","DOI":"10.1145\/2567561.2567563"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Fiebig, T., Borgolte, K., Hao, S., Kruegel, C., Vigna, G.: Something from nothing (there): collecting global ipv6 datasets from DNS. In: Passive and Active Measurement (PAM). Springer, Cham (2017)","DOI":"10.1007\/978-3-319-54328-4_3"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Fiebig, T., Borgolte, K., Hao, S., Kruegel, C., Vigna, G., Feldmann, A.: In rDNS we trust: revisiting a common data-source\u2019s reliability. In: Passive and Active Measurement (PAM). Springer, Cham (2018)","DOI":"10.1007\/978-3-319-76481-8_10"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Foremski, P., Plonka, D., Berger, A.: Entropy\/IP: uncovering structure in IPv6 addresses. In: ACM Internet Measurement Conference (IMC) (2016)","DOI":"10.1145\/2987443.2987445"},{"key":"3_CR28","unstructured":"Gasser, O.: ZMapv6: Internet scanner with ipv6 capabilities (2024). https:\/\/github.com\/tumi8\/zmap"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Gasser, O., et al.: Clusters in the expanse: understanding and unbiasing ipv6 hitlists. In: ACM Internet Measurement Conference (IMC) (2018)","DOI":"10.1145\/3278532.3278564"},{"key":"3_CR30","unstructured":"Gasser, O., Scheitle, Q., Gebhard, S., Carle, G.: Scanning the IPv6 Internet: towards a comprehensive hitlist. In: International Workshop on Traffic Monitoring and Analysis (TMA) (2016)"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Gont, F., Chown, T.: Network Reconnaissance in IPv6 Networks. RFC 7707 (2016). https:\/\/www.rfc-editor.org\/info\/rfc7707","DOI":"10.17487\/RFC7707"},{"key":"3_CR32","unstructured":"Google: Google public DNS (2024). https:\/\/dns.google\/"},{"key":"3_CR33","unstructured":"Google: IPv6 statistics (2024). https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Guo, H., Heidemann, J.: Detecting ICMP rate limiting in the Internet. In: Passive and Active Measurement (PAM). Springer, Cham (2018)","DOI":"10.1007\/978-3-319-76481-8_1"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Holzbauer, F., Maier, M., Ullrich, J.: Destination reachable: what ICMPv6 error messages reveal about their sources. In: ACM Internet Measurement Conference (IMC) (2024)","DOI":"10.1145\/3646547.3688420"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Hou, B., Cai, Z., Wu, K., Su, J., Xiong, Y.: 6Hit: a reinforcement learning-based approach to target generation for Internet-wide IPv6 scanning. In: IEEE Conference on Computer Communications (INFOCOM). IEEE (2021)","DOI":"10.1109\/INFOCOM42981.2021.9488794"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Hou, B., Cai, Z., Wu, K., Yang, T., Zhou, T.: 6scan: a high-efficiency dynamic Internet-wide IPv6 scanner with regional encoding. IEEE\/ACM Trans. Netw. (2023)","DOI":"10.1109\/TNET.2023.3233953"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Hou, B., Cai, Z., Wu, K., Yang, T., Zhou, T.: Search in the expanse: towards active and global IPv6 hitlists. In: IEEE Conference on Computer Communications (INFOCOM) (2023)","DOI":"10.1109\/INFOCOM53939.2023.10229089"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Hsu, A., Li, F., Pearce, P.: Fiat lux: illuminating IPv6 apportionment with different datasets. In: ACM on Measurement and Analysis of Computing Systems (POMACS) (2023)","DOI":"10.1145\/3578338.3593542"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Hsu, A., Li, F., Pearce, P., Gasser, O.: A first look at nat64 deployment in-the-wild. In: Passive and Active Network Measurement (PAM) (2024)","DOI":"10.1007\/978-3-031-56249-5_5"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Izhikevich, L., et al.: ZDNS: a fast DNS toolkit for Internet measurement. In: ACM Internet Measurement Conference (IMC) (2022)","DOI":"10.1145\/3517745.3561434"},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Li, X., Liu, B., Zheng, X., Duan, H., Li, Q., Huang, Y.: Fast IPv6 network periphery discovery and security implications. In: IEEE\/IFIP Dependable Systems and Networks (DSN) (2021)","DOI":"10.1109\/DSN48987.2021.00025"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Liu, M., et al.: FBAR: an effective method for resolving large-scale IPv6 aliases. Int. J. Commun. Syst. 36(18) (2023)","DOI":"10.1002\/dac.5610"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Liu, Z., Xiong, Y., Liu, X., Xie, W., Zhu, P.: 6Tree: efficient dynamic discovery of active addresses in the IPv6 address space. Comput. Netw. (2019)","DOI":"10.1016\/j.comnet.2019.03.010"},{"key":"3_CR45","doi-asserted-by":"crossref","unstructured":"Luckie, M.: Scamper: a scalable and extensible packet prober for active measurement of the Internet. In: ACM SIGCOMM Internet Measurement Conference (IMC) (2010)","DOI":"10.1145\/1879141.1879171"},{"key":"3_CR46","doi-asserted-by":"crossref","unstructured":"Luckie, M., Beverly, R., Brinkmeyer, W., Claffy, K.: Speedtrap: Internet-scale IPv6 alias resolution. In: ACM Internet Measurement Conference (IMC) (2013)","DOI":"10.1145\/2504730.2504759"},{"key":"3_CR47","unstructured":"Majestic: Majestic million (2024). https:\/\/majestic.com\/reports\/majestic-million"},{"key":"3_CR48","unstructured":"Majkowski, M.: Abusing Linux\u2019s firewall: the hack that allowed us to build Spectrum (2018). https:\/\/blog.cloudflare.com\/how-we-built-spectrum\/"},{"key":"3_CR49","doi-asserted-by":"crossref","unstructured":"Marchetta, P., Persico, V., Pescap\u00e9, A.: Pythia: yet another active probing technique for alias resolution. In: ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT) (2013)","DOI":"10.1145\/2535372.2535413"},{"key":"3_CR50","doi-asserted-by":"crossref","unstructured":"Marder, A.: Apple: alias pruning by path length estimation. In: Passive and Active Measurement (PAM). Springer, Cham (2020)","DOI":"10.1007\/978-3-030-44081-7_15"},{"key":"3_CR51","doi-asserted-by":"crossref","unstructured":"Murdock, A., Li, F., Bramsen, P., Durumeric, Z., Paxson, V.: 6Gen - target generation for Internet-wide IPv6 scanning. In: ACM Internet Measurement Conference (IMC) (2017)","DOI":"10.1145\/3131365.3131405"},{"key":"3_CR52","unstructured":"NCC, R.: IPmap (2024). https:\/\/ipmap.ripe.net\/"},{"key":"3_CR53","unstructured":"NCC, R.: Routing information service (RIS) (2024). https:\/\/www.ripe.net\/analyse\/internet-measurements\/routing-information-service-ris\/"},{"key":"3_CR54","doi-asserted-by":"crossref","unstructured":"Padmanabhan, R., Li, Z., Levin, D., Spring, N.: UAV6: alias resolution in IPv6 using unused addresses. In: Passive and Active Measurement (PAM). Springer, Cham (2015)","DOI":"10.1007\/978-3-319-15509-8_11"},{"key":"3_CR55","unstructured":"Pochat, V.L., Van\u00a0Goethem, T., Tajalizadehkhoob, S., Korczy\u0144ski, M., Joosen, W.: Tranco: a research-oriented top sites ranking hardened against manipulation. In: Network and Distributed System Security Symposium (NDSS) (2018)"},{"key":"3_CR56","unstructured":"Popoviciu, C., Hahn, C., Bonness, O., de\u00a0Velde, G.V., Chown, T.: IPv6 Unicast Address Assignment Considerations. RFC 5375 (2008). https:\/\/www.rfc-editor.org\/info\/rfc5375"},{"key":"3_CR57","unstructured":"Rapid7: Project sonar (2013). https:\/\/www.rapid7.com\/research\/project-sonar\/"},{"key":"3_CR58","unstructured":"Rapid7: Rapid7 forward DNS (2023). https:\/\/opendata.rapid7.com\/sonar.fdns_v2\/"},{"key":"3_CR59","unstructured":"RIPE: Best current operational practice for operators: Ipv6 prefix assignment for end-users - persistent vs non-persistent, and what size to choose (2023). https:\/\/www.ripe.net\/publications\/docs\/ripe-690"},{"key":"3_CR60","unstructured":"Roberts, R., Huston, G., Narten, D.T.: IPv6 Address Assignment to End Sites. RFC 6177 (2011). https:\/\/www.rfc-editor.org\/info\/rfc6177"},{"key":"3_CR61","doi-asserted-by":"crossref","unstructured":"Rye, E., Levin, D.: IPv6 hitlists at scale: be careful what you wish for. In: ACM SIGCOMM (2023)","DOI":"10.1145\/3603269.3604829"},{"key":"3_CR62","unstructured":"Schindler, S., Schnor, B., Kiertscher, S., Scheffler, T., Zack, E.: Honeydv6: a low-interaction IPv6 honeypot. In: International Conference on Security and Cryptography (SECRYPT) (2013)"},{"key":"3_CR63","unstructured":"Service, I.H.: Understanding and unbiasing IPv6 hitlists (2024). https:\/\/ipv6hitlist.github.io\/"},{"key":"3_CR64","doi-asserted-by":"crossref","unstructured":"Song, G., et al.: Towards the construction of global IPv6 hitlist and efficient probing of IPv6 address space. In: IEEE\/ACM International Symposium on Quality of Service (IWQoS). IEEE (2020)","DOI":"10.1109\/IWQoS49365.2020.9212980"},{"key":"3_CR65","unstructured":"Song, G., et al.: AddrMiner: a comprehensive global active IPv6 address discovery system. In: USENIX Annual Technical Conference (USENIX ATC) (2022)"},{"key":"3_CR66","doi-asserted-by":"crossref","unstructured":"Song, G., et al.: DET: enabling efficient probing of IPv6 active addresses. IEEE\/ACM Trans. Netw. (2022)","DOI":"10.1109\/TNET.2022.3145040"},{"key":"3_CR67","unstructured":"Spamhaus: The spamhaus project (2024). https:\/\/www.spamhaus.org"},{"key":"3_CR68","unstructured":"Strowes, S.D.: Bootstrapping active IPv6 measurement with IPv4 and public DNS. arXiv preprint arXiv:1710.08536 (2017)"},{"key":"3_CR69","doi-asserted-by":"crossref","unstructured":"Tao, Y., Hu, G., Hou, B., Cai, Z., Xia, J., Fong, C.C.: An alias resolution method based on delay sequence analysis. Comput. Mater. Continua 63(3) (2020)","DOI":"10.32604\/cmc.2020.09850"},{"key":"3_CR70","doi-asserted-by":"crossref","unstructured":"Ullrich, J., Kieseberg, P., Krombholz, K., Weippl, E.: On Reconnaissance with IPv6: a pattern-based scanning approach. In: International Conference on Availability, Reliability and Security. IEEE (2015)","DOI":"10.1109\/ARES.2015.48"},{"key":"3_CR71","unstructured":"Cisco umbrella popularity list (2024). http:\/\/s3-us-west-1.amazonaws.com\/umbrella-static\/index.html"},{"key":"3_CR72","doi-asserted-by":"crossref","unstructured":"Vermeulen, K., et al.: Alias resolution based on ICMP rate limiting. In: Passive and Active Measurement (PAM). Springer, Cham (2020)","DOI":"10.1007\/978-3-030-44081-7_14"},{"key":"3_CR73","doi-asserted-by":"crossref","unstructured":"Vyncke, E.: IPv6 over Social Networks. RFC 5514 (2009). https:\/\/www.rfc-editor.org\/info\/rfc5514","DOI":"10.17487\/rfc5514"},{"key":"3_CR74","unstructured":"Williams, G., et al.: 6sense: Internet-wide ipv6 scanning and its security applications. In: USENIX Security Symposium (USENIX Security) (2024)"},{"key":"3_CR75","unstructured":"Xie, Q., et al.: Building an open, robust, and stable Voting-Based domain top list. In: USENIX Security Symposium (USENIX Security). USENIX Association (2022)"},{"key":"3_CR76","doi-asserted-by":"crossref","unstructured":"Yang, T., Cai, Z., Hou, B., Zhou, T.: 6forest: an ensemble learning-based approach to target generation for internet-wide ipv6 scanning. In: IEEE Conference on Computer Communications (INFOCOMM) (2022)","DOI":"10.1109\/INFOCOM48880.2022.9796925"},{"key":"3_CR77","doi-asserted-by":"crossref","unstructured":"Yang, T., Hou, B., Cai, Z., Wu, K., Zhou, T., Wang, C.: 6graph: a graph-theoretic approach to address pattern mining for internet-wide ipv6 scanning. Comput. Netw. (2022)","DOI":"10.1016\/j.comnet.2021.108666"},{"key":"3_CR78","unstructured":"Yeow, A.: Bitnodes API (2024). https:\/\/bitnodes.io\/api\/"},{"key":"3_CR79","doi-asserted-by":"crossref","unstructured":"Zirngibl, J., Steger, L., Sattler, P., Gasser, O., Carle, G.: Rusty clusters? Dusting an IPv6 research foundation. In: ACM Internet Measurement Conference (IMC) (2022)","DOI":"10.1145\/3517745.3561440"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-85960-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:08:03Z","timestamp":1753884483000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-85960-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031859595","9783031859601"],"references-count":79,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-85960-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 March 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 March 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/udesa.edu.ar\/pam25","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}