{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:36Z","timestamp":1750309536749,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,6]]},"DOI":"10.1145\/3711618.3711628","type":"proceedings-article","created":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:22:41Z","timestamp":1740223361000},"page":"64-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Effect Evaluation Method of IPv6 Address Prediction Based on AHP-CRITIC Combination Weighting"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6902-2162","authenticated-orcid":false,"given":"Mingyue","family":"Ren","sequence":"first","affiliation":[{"name":"Information Engineering University, Zhengzhou, Henan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2064-1167","authenticated-orcid":false,"given":"Liancheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, Henan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5624-1469","authenticated-orcid":false,"given":"Lanxin","family":"Cheng","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, Henan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9815-2434","authenticated-orcid":false,"given":"Yi","family":"Guo","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, Henan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8125-5571","authenticated-orcid":false,"given":"Hongtao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhengzhou University, Zhengzhou, Henan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8310-6560","authenticated-orcid":false,"given":"Haojie","family":"Zhu","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, Henan, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"volume-title":"IPv6 adoption statistics","year":"2024","key":"e_1_3_3_1_1_2","unstructured":"Google, \u201cIPv6 adoption statistics,\u201d https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html, 2024."},{"key":"e_1_3_3_1_2_2","volume-title":"National IPv6 development and monitoring platform","author":"China Academy of Information and Communications Technology","year":"2024","unstructured":"China Academy of Information and Communications Technology, \u201cNational IPv6 development and monitoring platform,\u201d https:\/\/www.china-ipv6.cn, 2024."},{"key":"e_1_3_3_1_3_2","first-page":"620","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Durumeric Z.","year":"2013","unstructured":"Z. Durumeric, E. Wustrow, and J. A. Halderman, \u201cZMap: Fast Internet-wide scanning and its security applications,\u201d in 22nd USENIX Security Symposium (USENIX Security 13), pp. 605\u2013620, USENIX Association, 2013."},{"issue":"9","key":"e_1_3_3_1_4_2","first-page":"2307","article-title":"Survey on target-generated IPv6 network address scanning","volume":"61","author":"Hou B.","year":"2024","unstructured":"B. Hou, N. Liu, X. Li, T. Zhou, Y. Chen, Z. Cai, and K. Lu, \u201cSurvey on target-generated IPv6 network address scanning,\u201d Journal of Computer Research and Development, vol. 61, no. 9, pp. 2307\u20132320, 2024.","journal-title":"Journal of Computer Research and Development"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.03.010"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3145040"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488794"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108666"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796925"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3233953"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229089"},{"issue":"1","key":"e_1_3_3_1_12_2","first-page":"113","article-title":"Evaluation of water inrush hazard in coal seam roof based on the AHP-CRITIC composite weighted method","volume":"16","author":"Xiao L.","year":"2023","unstructured":"L. Xiao, F. Li, C. Niu, G. Dai, Q. Qiao, and C. Lin, \u201cEvaluation of water inrush hazard in coal seam roof based on the AHP-CRITIC composite weighted method,\u201d Energies, vol. 16, no. 1, pp. 113\u2013134, 2023.","journal-title":"Energies"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12665-022-10508-4"},{"issue":"7","key":"e_1_3_3_1_14_2","first-page":"372","article-title":"Status assessment model based on AHP-EWM in multiple scenarios","volume":"50","author":"Huo J.","year":"2024","unstructured":"J. Huo, H. Wang, T. Jv, J. Hu, \u201cStatus assessment model based on AHP-EWM in multiple scenarios,\u201d Computer Engineering, vol. 50, no. 7, pp. 372\u2013380, 2024.","journal-title":"Computer Engineering"},{"volume-title":"Expert systems with applications","author":"Lee A. H.","key":"e_1_3_3_1_15_2","unstructured":"A. H. Lee, \u201cA fuzzy supplier selection model with the consideration of benefits, opportunities, costs and risks,\u201d Expert systems with applications, vol. 36, no. 2, pp. 2879\u20132893, 2009."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0548(94)00059-H"},{"volume-title":"The top sites on the Web","year":"2024","key":"e_1_3_3_1_17_2","unstructured":"Alexa, \u201cThe top sites on the Web,\u201d https:\/\/www.alexa.com\/topsites, 2024."},{"volume-title":"Website analytics and reviews","year":"2024","key":"e_1_3_3_1_18_2","unstructured":"Statvoo, \u201cWebsite analytics and reviews,\u201d https:\/\/statvoo.com, 2024."},{"volume-title":"Cisco Umbrella","year":"2024","key":"e_1_3_3_1_19_2","unstructured":"Cisco, \u201cCisco Umbrella,\u201d https:\/\/umbrella.cisco.com, 2024."},{"key":"e_1_3_3_1_20_2","volume-title":"Bitnodes API","author":"Addy Y.","year":"2024","unstructured":"Y. Addy, \u201cBitnodes API,\u201d https:\/\/bitnodes.earn.com, 2024."},{"key":"e_1_3_3_1_21_2","volume-title":"RIPE NCC Atlas","author":"RIPE","year":"2024","unstructured":"RIPE, \u201cRIPE NCC Atlas,\u201d https:\/\/atlas.ripe.net, 2024."},{"volume-title":"DNS records (ANY)","year":"2024","key":"e_1_3_3_1_22_2","unstructured":"Rapid7, \u201cDNS records (ANY),\u201d https:\/\/scans.io\/study\/sonar.fdns, 2024."},{"key":"e_1_3_3_1_23_2","volume-title":"IPv6 hitlist service","author":"Gasser O.","year":"2024","unstructured":"O. Gasser, \u201cIPv6 hitlist service,\u201d https:\/\/ipv6hitlist.github.io\/, 2024."},{"volume-title":"Geolite API","year":"2024","key":"e_1_3_3_1_24_2","unstructured":"MaxMind, \u201cGeolite API,\u201d http:\/\/dev.maxmind.com\/geoip\/legacy\/geolite\/, 2024."}],"event":{"name":"ICCNS 2024: 2024 14th International Conference on Communication and Network Security","acronym":"ICCNS 2024","location":"Xiamen Shanghai China"},"container-title":["Proceedings of the 2024 14th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711618.3711628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:29Z","timestamp":1750295909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":24,"alternative-id":["10.1145\/3711618.3711628","10.1145\/3711618"],"URL":"https:\/\/doi.org\/10.1145\/3711618.3711628","relation":{},"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"2025-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}