{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:05:11Z","timestamp":1773119111333,"version":"3.50.1"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032182678","type":"print"},{"value":"9783032182685","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-18268-5_6","type":"book-chapter","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T16:53:18Z","timestamp":1773075198000},"page":"137-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["WikIPedia: Unearthing a\u00a020-Year History of\u00a0IPv6 Client Addressing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8151-8252","authenticated-orcid":false,"given":"Erik","family":"Rye","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4957-5131","authenticated-orcid":false,"given":"Dave","family":"Levin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,10]]},"reference":[{"key":"6_CR1","unstructured":"IEEE OUI database (2025). http:\/\/standards-oui.ieee.org\/oui.txt"},{"key":"6_CR2","unstructured":"IPInfo.io (2025). https:\/\/www.ipinfo.io"},{"key":"6_CR3","unstructured":"IPv6 Hitlist Service (2025). https:\/\/ipv6hitlist.github.io\/"},{"key":"6_CR4","unstructured":"Almeida, R.B., Mozafari, B., Cho, J.: On the Evolution of Wikipedia (2007)"},{"key":"6_CR5","unstructured":"Android: MAC randomization behavior (2025). https:\/\/source.android.com\/docs\/core\/connect\/wifi-mac-randomization-behavior"},{"key":"6_CR6","unstructured":"APNIC: IPv6 per-country deployment for AS55836: RELIANCEJIO-IN Reliance Jio Infocomm Limited, India (IN) (2025). https:\/\/stats.labs.apnic.net\/ipv6\/AS55836?c=IN&p=1&v=1&w=30&x=1"},{"key":"6_CR7","unstructured":"Apple: use private Wi-Fi addresses on Apple devices (2025). https:\/\/support.apple.com\/en-us\/102509"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Beverly, R., Durairajan, R., Plonka, D., Rohrer, J.P.: In the IP of the beholder: strategies for active IPv6 topology discovery. In: ACM Internet Measurement Conference (IMC) (2018)","DOI":"10.1145\/3278532.3278559"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-030-47426-3_47","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"T Cui","year":"2020","unstructured":"Cui, T., Gou, G., Xiong, G.: 6GCVAE: gated convolutional variational autoencoder for IPv6 target generation. In: Lauw, H.W., Wong, R.C.-W., Ntoulas, A., Lim, E.-P., Ng, S.-K., Pan, S.J. (eds.) PAKDD 2020. LNCS (LNAI), vol. 12084, pp. 609\u2013622. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-47426-3_47"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Cui, T., Xiong, G., Gou, G., Shi, J., Xia, W.: 6VecLM: language modeling in vector space for IPv6 target generation. In: European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD) (2020)","DOI":"10.1007\/978-3-030-67667-4_12"},{"key":"6_CR11","unstructured":"Erik M\u00f6ller: IPv6 initiative\/2012 IPv6 day announcement (2012). https:\/\/meta.wikimedia.org\/wiki\/IPv6_initiative\/2012_IPv6_Day_announcement"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Fenske, E., Brown, D., Martin, J., Mayberry, T., Ryan, P., Rye, E.C.: Three Years Later: a study of MAC address randomization in mobile devices and when it succeeds. In: Privacy Enhancing Technologies Symposium (PETS) (2021)","DOI":"10.2478\/popets-2021-0042"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Gasser, O., et al.: Clusters in the expanse: understanding and unbiasing IPv6 hitlists. In: ACM Internet Measurement Conference (IMC) (2018)","DOI":"10.1145\/3278532.3278564"},{"key":"6_CR14","unstructured":"Gasser, O., Scheitle, Q., Gebhard, S., Carle, G.: Scanning the IPv6 Internet: towards a comprehensive hitlist. CoRR abs\/1607.05179 (2016). http:\/\/arxiv.org\/abs\/1607.05179"},{"key":"6_CR15","volume-title":"6Scan: A High-Efficiency Dynamic Internet-Wide IPv6 Scanner With Regional Encoding","author":"B Hou","year":"2023","unstructured":"Hou, B., Cai, Z., Wu, K., Yang, T., Zhou, T.: 6Scan: A High-Efficiency Dynamic Internet-Wide IPv6 Scanner With Regional Encoding. Networking, IEEE\/ACM Transactions on (2023)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Kiesel, J., Potthast, M., Hagen, M., Stein, B.: Spatio-Temporal Analysis of Reverted Wikipedia Edits (2017)","DOI":"10.1609\/icwsm.v11i1.14900"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Martin, J., et al.: A study of MAC address randomization in mobile devices and when it fails (2017)","DOI":"10.1515\/popets-2017-0054"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Matte, C., Cunche, M., Rousseau, F., Vanhoef, M.: Defeating MAC address randomization through timing attacks. In: ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2016)","DOI":"10.1145\/2939918.2939930"},{"key":"6_CR19","unstructured":"Molay Ghosh: Reliance Jio boosts India past 20% IPv6 capability (2017). https:\/\/blog.apnic.net\/2017\/02\/07\/reliance-jio-boosts-india-past-20-ipv6-capability\/"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Murdock, A., Li, F., Bramsen, P., Durumeric, Z., Paxson, V.: Target generation for internet-wide IPv6 scanning. In: ACM Internet Measurement Conference (IMC) (2017)","DOI":"10.1145\/3131365.3131405"},{"key":"6_CR21","doi-asserted-by":"publisher","unstructured":"Narten, T., Draves, R., Krishnan, S.: Privacy Extensions for stateless address autoconfiguration in IPv6. RFC 4941 (Draft Standard) (2007). https:\/\/doi.org\/10.17487\/RFC4941, https:\/\/www.rfc-editor.org\/rfc\/rfc4941.txt","DOI":"10.17487\/RFC4941"},{"key":"6_CR22","unstructured":"RIPE: best current operational practice for operators: IPv6 prefix assignment for end-users - persistent vs non-persistent, and what size to choose (2017). https:\/\/www.ripe.net\/publications\/docs\/ripe-690"},{"key":"6_CR23","unstructured":"RIPE: Use of IPv6 for World (2025). https:\/\/stats.labs.apnic.net\/ipv6\/XA"},{"key":"6_CR24","unstructured":"Routeviews: university of Oregon route views project (2025). https:\/\/www.routeviews.org\/routeviews\/"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Rye, E., Beverly, R., claffy, k.: Follow the scent: defeating IPv6 prefix rotation privacy. In: ACM Internet Measurement Conference (IMC) (2021)","DOI":"10.1145\/3487552.3487829"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Rye, E., Levin, D.: IPv6 hitlists at scale: be careful what you wish For. In: ACM SIGCOMM (2023)","DOI":"10.1145\/3603269.3604829"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Saidi, S.J., Gasser, O., Smaragdakis, G.: One bad apple can spoil your IPv6 privacy (2022)","DOI":"10.1145\/3544912.3544915"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Shen, Z., Chen, P., Xie, Y., Chen, C., Zhang, Y., Yang, G.: 6Trace: an effective method for active IPv6 topology discovery. MDPI Electr. (2025)","DOI":"10.3390\/electronics14020343"},{"key":"6_CR29","volume-title":"DET: Enabling Efficient Probing of IPv6 Active Addresses","author":"G Song","year":"2022","unstructured":"Song, G., et al.: DET: Enabling Efficient Probing of IPv6 Active Addresses. Networking, IEEE\/ACM Transactions on (2022)"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Steger, L., Kuang, L., Zirngibl, J., Carle, G., Gasser, O.: Target Acquired? Evaluating target generation algorithms for IPv6 (2023)","DOI":"10.23919\/TMA58422.2023.10199073"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Sun, X., Dang, F., Yang, Z., Jin, X., Li, J., Liu, Y.: 6Loda: pattern filtering and ensemble learning for IPv6 target generation and scanning. In: IEEE Conference on Computer Communications (INFOCOM) (2025)","DOI":"10.1109\/INFOCOM55648.2025.11044482"},{"key":"6_CR32","unstructured":"The Wikimedia Foundation: Wikimedia (2025). https:\/\/www.wikimedia.org\/"},{"key":"6_CR33","unstructured":"The Wikimedia Foundation: Wikimedia Downloads (2025). https:\/\/dumps.wikimedia.org\/"},{"key":"6_CR34","volume-title":"Are Anonymity-Seekers Just Like Everybody Else?","author":"C Tran","year":"2020","unstructured":"Tran, C., Champion, K., Forte, A., Hill, B.M., Greenstadt, R.: Are Anonymity-Seekers Just Like Everybody Else? IEEE Symposium on Security and Privacy, An analysis of contributions to Wikipedia from Tor. In (2020)"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Uras, M., Ferrara, E., Cossu, R., Liotta, A., Atzori, L.: MAC address de-randomization for WIFI device counting: combining temporal-and content-based fingerprints. Comput. Netw. (2022)","DOI":"10.1016\/j.comnet.2022.109393"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Vanhoef, M., Matte, C., Cunche, M., Cardoso, L.S., Piessens, F.: Why MAC Address Randomization is not Enough: an Analysis of Wi-Fi Network Discovery Mechanisms (2016)","DOI":"10.1145\/2897845.2897883"},{"key":"6_CR37","unstructured":"Voss, J.: Measuring Wikipedia. In: International Conference of the International Society for Scientometrics and Informetrics (ISSI) (2005)"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"West, A.G., Kannan, S., Lee, I.: Detecting Wikipedia vandalism via Spatio-temporal analysis of revision metadata? In: European Workshop on Systems Security (2010)","DOI":"10.21236\/ADA514680"},{"key":"6_CR39","unstructured":"Wikipedia: trust and safety product\/temporary accounts (2025). https:\/\/www.mediawiki.org\/wiki\/Trust_and_Safety_Product\/Temporary_Accounts"},{"key":"6_CR40","unstructured":"Wikipedia: Username policy (2025). https:\/\/en.wikipedia.org\/wiki\/Wikipedia:Username_policy"},{"key":"6_CR41","unstructured":"Wikipedia: The Free Encyclopedia: Wikipedia:Wikipedians (2025). https:\/\/en.wikipedia.org\/wiki\/Wikipedia:Wikipedians"},{"key":"6_CR42","unstructured":"Williams, G., et al.: 6Sense: Internet-wide Ipv6 scanning and its security applications. In: USENIX Security Symposium (2024)"},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"Williams, G., Pearce, P.: Seeds of Scanning: exploring the effects of datasets, methods, and metrics on Ipv6 internet scanning. In: ACM Internet Measurement Conference (IMC) (2024)","DOI":"10.1145\/3646547.3688449"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Zander, S., Andrew, L.L., Armitage, G.: Capturing ghosts: predicting the used IPv4 space by inferring unobserved addresses. In: ACM Internet Measurement Conference (IMC) (2014)","DOI":"10.1145\/2663716.2663718"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-18268-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T16:53:25Z","timestamp":1773075205000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-18268-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032182678","9783032182685"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-18268-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"10 March 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 March 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pam2026.at","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}