{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:14Z","timestamp":1750306274059,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,4,5]],"date-time":"2016-04-05T00:00:00Z","timestamp":1459814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,5]]},"DOI":"10.1145\/2897795.2897815","type":"proceedings-article","created":{"date-parts":[[2016,4,7]],"date-time":"2016-04-07T22:22:33Z","timestamp":1460067753000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Anti-Censorship Framework using Mobile IPv6 based Moving Target Defense"],"prefix":"10.1145","author":[{"given":"Vahid","family":"Heydari","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering Departments, University of Alabama in Huntsville"}]},{"given":"Sun-il","family":"Kim","sequence":"additional","affiliation":[{"name":"Computer Science Departments, University of Alabama in Huntsville"}]},{"given":"Seong-Moo","family":"Yoo","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Departments, University of Alabama in Huntsville"}]}],"member":"320","published-online":{"date-parts":[[2016,4,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"F-secure | switch on freedom. https:\/\/www.f-secure.com\/en_US\/welcome. Accessed: 2015-10-04.  F-secure | switch on freedom. https:\/\/www.f-secure.com\/en_US\/welcome. Accessed: 2015-10-04."},{"key":"e_1_3_2_1_2_1","unstructured":"Free VPN service | free VPN software - hotspot shield VPN. http:\/\/www.hotspotshield.com\/. Accessed: 2015-10-04.  Free VPN service | free VPN software - hotspot shield VPN. http:\/\/www.hotspotshield.com\/. Accessed: 2015-10-04."},{"key":"e_1_3_2_1_3_1","unstructured":"Psiphon | uncensored internet access for windows and mobile. https:\/\/psiphon3.com\/en\/index.html. Accessed: 2015-10-04.  Psiphon | uncensored internet access for windows and mobile. https:\/\/psiphon3.com\/en\/index.html. Accessed: 2015-10-04."},{"key":"e_1_3_2_1_4_1","volume-title":"RFC Editor","author":"Arkko J.","year":"2007","unstructured":"J. Arkko , C. Vogt , and W. Haddad . Enhanced route optimization for mobile ipv6. RFC 4866 , RFC Editor , May 2007 . http:\/\/www.rfc-editor.org\/rfc\/rfc4866.txt. J. Arkko, C. Vogt, and W. Haddad. Enhanced route optimization for mobile ipv6. RFC 4866, RFC Editor, May 2007. http:\/\/www.rfc-editor.org\/rfc\/rfc4866.txt."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"e_1_3_2_1_7_1","volume-title":"IETF Secretariat","author":"Ebalard A.","year":"2010","unstructured":"A. Ebalard . Mobile ipv6 ipsec route optimization (iro). Internet-Draft draft-ebalard-mext-ipsec-ro-02 , IETF Secretariat , July 2010 . http:\/\/www.ietf.org\/internet-drafts\/draft-ebalard-mext-ipsec-ro-02.txt. A. Ebalard. Mobile ipv6 ipsec route optimization (iro). Internet-Draft draft-ebalard-mext-ipsec-ro-02, IETF Secretariat, July 2010. http:\/\/www.ietf.org\/internet-drafts\/draft-ebalard-mext-ipsec-ro-02.txt."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046730"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.35"},{"key":"e_1_3_2_1_11_1","volume-title":"FOCI'11 - USENIX Workshop on Free and Open Communications on the Internet","author":"Karlin J.","year":"2011","unstructured":"J. Karlin , D. Ellard , A. W. Jackson , C. E. Jones , G. Lauer , D. P. Mankins , and W. T. Strayer . Decoy routing: Toward unblockable internet communication . In FOCI'11 - USENIX Workshop on Free and Open Communications on the Internet , 2011 . J. Karlin, D. Ellard, A. W. Jackson, C. E. Jones, G. Lauer, D. P. Mankins, and W. T. Strayer. Decoy routing: Toward unblockable internet communication. In FOCI'11 - USENIX Workshop on Free and Open Communications on the Internet, 2011."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1264666"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_1_14_1","author":"Morrell C.","year":"2014","unstructured":"C. Morrell , J. Ransbottom , R. Marchany , and J. Tront . Scaling ipv6 address bindings in support of a moving target defense. In Internet Technology and Secured Transactions (ICITST) , 2014 . C. Morrell, J. Ransbottom, R. Marchany, and J. Tront. Scaling ipv6 address bindings in support of a moving target defense. In Internet Technology and Secured Transactions (ICITST), 2014.","journal-title":"In Internet Technology and Secured Transactions (ICITST)"},{"key":"e_1_3_2_1_15_1","volume-title":"RFC Editor","author":"Perkins C.","year":"2006","unstructured":"C. Perkins . Securing mobile ipv6 route optimization using a static shared key. RFC 4449 , RFC Editor , June 2006 . http:\/\/www.rfc-editor.org\/rfc\/rfc4449.txt. C. Perkins. Securing mobile ipv6 route optimization using a static shared key. RFC 4449, RFC Editor, June 2006. http:\/\/www.rfc-editor.org\/rfc\/rfc4449.txt."},{"key":"e_1_3_2_1_16_1","volume-title":"RFC Editor","author":"Perkins C.","year":"2011","unstructured":"C. Perkins , D. Johnson , and J. Arkko . Mobility support in ipv6. RFC 6275 , RFC Editor , July 2011 . http:\/\/www.rfc-editor.org\/rfc\/rfc6275.txt. C. Perkins, D. Johnson, and J. Arkko. Mobility support in ipv6. RFC 6275, RFC Editor, July 2011. http:\/\/www.rfc-editor.org\/rfc\/rfc6275.txt."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382209"},{"key":"e_1_3_2_1_18_1","volume-title":"Move: an end-to-end solution to network denial of service","author":"Stavrou A.","year":"2005","unstructured":"A. Stavrou , A. D. Keromytis , J. Nieh , V. Misra , and D. Rubenstein . Move: an end-to-end solution to network denial of service , 2005 . A. Stavrou, A. D. Keromytis, J. Nieh, V. Misra, and D. Rubenstein. Move: an end-to-end solution to network denial of service, 2005."},{"key":"e_1_3_2_1_19_1","volume-title":"A moving target {DDoS} defense mechanism. Computer Communications, 46","author":"Wang H.","year":"2014","unstructured":"H. Wang , Q. Jia , D. Fleck , W. Powell , F. Li , and A. Stavrou . A moving target {DDoS} defense mechanism. Computer Communications, 46 , 2014 . H. Wang, Q. Jia, D. Fleck, W. Powell, F. Li, and A. Stavrou. A moving target {DDoS} defense mechanism. Computer Communications, 46, 2014."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382211"},{"key":"e_1_3_2_1_21_1","volume-title":"Presented as part of the 2nd USENIX Workshop on Free and Open Communications on the Internet","author":"Winter P.","year":"2012","unstructured":"P. Winter and S. Lindskog . How the great firewall of china is blocking tor . In Presented as part of the 2nd USENIX Workshop on Free and Open Communications on the Internet , Berkeley, CA , 2012 . USENIX. P. Winter and S. Lindskog. How the great firewall of china is blocking tor. In Presented as part of the 2nd USENIX Workshop on Free and Open Communications on the Internet, Berkeley, CA, 2012. USENIX."},{"volume-title":"USENIX Security Symposium.","author":"Wustrow E.","key":"e_1_3_2_1_22_1","unstructured":"E. Wustrow , C. M. Swanson , and J. A. Halderman . TapDance: End-to-middle anticensorship without flow blocking . In USENIX Security Symposium. E. Wustrow, C. M. Swanson, and J. A. Halderman. TapDance: End-to-middle anticensorship without flow blocking. In USENIX Security Symposium."},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Conference on Security","author":"Wustrow E.","year":"2011","unstructured":"E. Wustrow , S. Wolchok , I. Goldberg , and J. A. Halderman . Telex: Anticensorship in the network infrastructure . In USENIX Conference on Security , 2011 . E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In USENIX Conference on Security, 2011."}],"event":{"name":"CISRC '16: 11th Annual Cyber and Information Security Research","sponsor":["Oak Ridge National Laboratory"],"location":"Oak Ridge TN USA","acronym":"CISRC '16"},"container-title":["Proceedings of the 11th Annual Cyber and Information Security Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897815","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897795.2897815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:45Z","timestamp":1750221525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897815"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,5]]},"references-count":23,"alternative-id":["10.1145\/2897795.2897815","10.1145\/2897795"],"URL":"https:\/\/doi.org\/10.1145\/2897795.2897815","relation":{},"subject":[],"published":{"date-parts":[[2016,4,5]]},"assertion":[{"value":"2016-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}