{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:27:37Z","timestamp":1757626057229,"version":"3.44.0"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s11623-025-2130-3","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T12:04:05Z","timestamp":1755605045000},"page":"512-516","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Aufkl\u00e4rung von IPv6-Adressbereichen"],"prefix":"10.1007","volume":"49","author":[{"given":"Janek","family":"Zitzmann","sequence":"first","affiliation":[]},{"given":"Cornelius","family":"Moucha","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Simon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,19]]},"reference":[{"key":"2130_CR1","doi-asserted-by":"crossref","unstructured":"Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, and Georg Carle. Clusters in the expanse: Under-standing and unbiasing ipv6 hitlists. In Internet Measurement Conference (IMC \u201918). Association for Computing Machinery, 2018.","DOI":"10.1145\/3278532.3278564"},{"key":"2130_CR2","unstructured":"Gartner.\u00a0Magic Quadrant for IT Asset Management Software, 2023."},{"key":"2130_CR3","unstructured":"Forrester.\u00a0Forrester Wave\u2122: IT Asset Management, Q3 2022, Forrester Research, Inc."},{"key":"2130_CR4","unstructured":"IDC.\u00a0IDC MarketScape: Worldwide IT Asset Management Software 2021 Vendor Assessment, IDC, 2021."},{"key":"2130_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.comnet.2019.03.010","volume":"155","author":"Z Liu","year":"2019","unstructured":"Zhizhu Liu, Yinqiao Xiong, Xin Liu, Wei Xie, and Peidong Zhu. 6tree: Efficient dynamic discovery of active addresses in the ipv6 address space. Computer Networks, 155:31\u201346, 2019","journal-title":"Computer Networks"},{"key":"2130_CR6","doi-asserted-by":"crossref","unstructured":"Bingnan Hou, Zhiping Cai, Kui Wu, Jinshu Su, and Yinqiao Xiong. 6hit: A reinforcement learning-based approach to target generation for internet-wide ipv6 scanning. In IEEE INFOCOM 2021 \u2013 IEEE Conference on Computer Communications, pages 1\u201310, 2021.","DOI":"10.1109\/INFOCOM42981.2021.9488794"},{"issue":"4","key":"2130_CR7","doi-asserted-by":"publisher","first-page":"1870","DOI":"10.1109\/TNET.2023.3233953","volume":"31","author":"B Hou","year":"2023","unstructured":"Bingnan Hou, Zhiping Cai, Kui Wu, Tao Yang, and Tongqing Zhou. 6scan: A high-efficiency dynamic internet-wide ipv6 scanner with regional encoding. IEEE\/ACM Transactions on Networking, 31(4):1870\u20131885, 2023.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"2130_CR8","unstructured":"J\u00fcrgen Ebner. Einstieg in Kali Linux \u2013 Pentration Testing und Ethical Hacking mit Linux. mitp Verlags GmbH Co. KG, 2020."},{"key":"2130_CR9","doi-asserted-by":"crossref","unstructured":"Ruiguang Li, Meng Shen, Hao Yu, Chao Li, Pengyu Duan, and Lihuang Zhu. A Survey on Cyberspace Search Engines, pages 206\u2013214, 2020.","DOI":"10.1007\/978-981-33-4922-3_15"},{"key":"2130_CR10","doi-asserted-by":"crossref","unstructured":"Lion Steger et al. Target acquired? evaluating target generation algorithms for ipv6. In TMA 2023 \u2013 Proceedings of the 7th Network Traffic Measurement and Analysis Conference, TMA 2023 \u2013 Proceedings of the 7th Network Traffic Measurement and Analysis Conference. Institute of Electrical and Electronics Engineers Inc., 2023.","DOI":"10.23919\/TMA58422.2023.10199073"},{"key":"2130_CR11","unstructured":"Janek Zitzmann, Verwundbarkeitspr\u00fcfungen von IPv6-Netzwerken, Hochschule Kaiserslautern, September 2024."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2130-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-025-2130-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2130-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T20:38:22Z","timestamp":1757450302000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-025-2130-3"}},"subtitle":["Basis f\u00fcr proaktive Schwachstellenerkennung"],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":11,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["2130"],"URL":"https:\/\/doi.org\/10.1007\/s11623-025-2130-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2025,8]]},"assertion":[{"value":"19 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}