{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:52:40Z","timestamp":1729666360546,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/worldcis.2015.7359425","type":"proceedings-article","created":{"date-parts":[[2016,2,19]],"date-time":"2016-02-19T23:25:42Z","timestamp":1455924342000},"page":"113-118","source":"Crossref","is-referenced-by-count":1,"title":["Taming the Ipv6 address space with hyhoneydv6"],"prefix":"10.1109","author":[{"given":"Sven","family":"Schindler","sequence":"first","affiliation":[]},{"given":"Bettina","family":"Schnor","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Scheffler","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Gq: Realizing a system to catch worms in a quarter million places","author":"cui","year":"2006","journal-title":"Tech Rep"},{"key":"ref3","first-page":"41","article-title":"Qemu, a fast and portable dynamic translator","author":"bellard","year":"2005","journal-title":"Proceedings of the annual conference on USENIX Annual Technical Conference Ser ATEC '05"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217938"},{"key":"ref6","first-page":"97","article-title":"Anatomy of the libvirt virtualization library","author":"jones","year":"2010","journal-title":"IBM Developer Works"},{"journal-title":"Virtual Honeypots From Botnet Tracking to Intrusion Detection","year":"2008","author":"provos","key":"ref11"},{"key":"ref5","first-page":"65","article-title":"An internet-wide view of internet-wide scanning","author":"durumeric","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/978-3-662-45945-4_15","article-title":"IPv6 Network Attack Detection with HoneydV 6","volume":"456","author":"schindler","year":"2014","journal-title":"E-business and Telecommunications Ser Communications in Computer and Information Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.28"},{"key":"ref7","first-page":"82","article-title":"servload: Generating Representative Workloads for Web Server Benchmarking","volume":"44","author":"zinke","year":"2012","journal-title":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)"},{"key":"ref2","article-title":"A Hybrid Honeypot Architecture for Scalable Network Monitoring","author":"bailey","year":"2004","journal-title":"University of Michigan Ann Arbor Michigan USA Tech Rep CSE-TR-499&#x2013;04"},{"key":"ref9","article-title":"Privacy Extensions for Stateless Address Autoconfiguration in IPv 6","author":"narten","year":"2007","journal-title":"RFC 4941(Draft Standard) Internet Engineering Task Force"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314398"}],"event":{"name":"2015 World Congress on Internet Security (WorldCIS)","start":{"date-parts":[[2015,10,19]]},"location":"Dublin, Ireland","end":{"date-parts":[[2015,10,21]]}},"container-title":["2015 World Congress on Internet Security (WorldCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7349353\/7359393\/07359425.pdf?arnumber=7359425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T06:21:31Z","timestamp":1498285291000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7359425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/worldcis.2015.7359425","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}