{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:29:45Z","timestamp":1749270585649,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/fskd.2017.8393224","type":"proceedings-article","created":{"date-parts":[[2018,7,30]],"date-time":"2018-07-30T18:33:27Z","timestamp":1532975607000},"page":"2799-2804","source":"Crossref","is-referenced-by-count":3,"title":["Comparative studies of IPv6 tunnel security"],"prefix":"10.1109","author":[{"given":"Kejun","family":"Gu","sequence":"first","affiliation":[]},{"given":"Liancheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhenxing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yazhou","family":"Kong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"RFC 5991 Teredo security updates","year":"2010","author":"thaler","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7721"},{"key":"ref12","first-page":"126","article-title":"Protecting Teredo clients from source routing exploits","author":"ai-tamimi","year":"2008","journal-title":"International Conference on Distributed Framework and Applications"},{"key":"ref13","first-page":"1","article-title":"An approach to secure Teredo tunneling technology","volume":"3","author":"shanmugaraja","year":"2013","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"key":"ref14","first-page":"514","article-title":"IPv6 security: attacks and countermeasures in a nutshell","author":"ullrich","year":"2014","journal-title":"Proceedings of the 8th USENIX conference on Offensive Technologies"},{"key":"ref15","first-page":"1","article-title":"Routing loop attacks using IPv6 tunnels","author":"nakibly","year":"2009","journal-title":"3rd USENIX Conf Offensive Technol"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSSR.2010.5773699"},{"key":"ref17","first-page":"218","article-title":"Eliminate spoofing threat in IPv6 tunnel","volume":"1","author":"ahmed","year":"2012","journal-title":"Proceedings of 8th International Conference on Information Science and Digital Content Technology"},{"journal-title":"RFC 5569 IPv6 rapid deployment on IPv4 infrastructures (6rd)","year":"2010","author":"despres","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICCT.2014.6993065"},{"journal-title":"Security Considerations for 6to4 RFC 3964","year":"2004","author":"savola","key":"ref6"},{"key":"ref5","first-page":"583","article-title":"A study of the challenges and security aspects of migration from IPv4 to IPv6","volume":"4","author":"wani","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115573"},{"key":"ref7","first-page":"450","author":"hogg","year":"2009","journal-title":"IPv6 security San Jose Cisco System"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2003.1191589"},{"key":"ref1","first-page":"217","article-title":"Performance analysis of three transition mechanisms between IPv6 network and IPv4 network: dual stack, tunneling and translation","volume":"20","author":"hossain","year":"2016","journal-title":"International Journal of Computer"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAT.2013.67"}],"event":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","start":{"date-parts":[[2017,7,29]]},"location":"Guilin","end":{"date-parts":[[2017,7,31]]}},"container-title":["2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8384043\/8392854\/08393224.pdf?arnumber=8393224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:55:14Z","timestamp":1598223314000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8393224\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/fskd.2017.8393224","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}