{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T07:25:36Z","timestamp":1774077936197,"version":"3.50.1"},"reference-count":73,"publisher":"Association for Computing Machinery (ACM)","issue":"CoNEXT3","license":[{"start":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T00:00:00Z","timestamp":1756944000000},"content-version":"vor","delay-in-days":1,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["OAC-2131987, OAC-2319959, OAC-2450552"],"award-info":[{"award-number":["OAC-2131987, OAC-2319959, OAC-2450552"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Netw."],"published-print":{"date-parts":[[2025,9,3]]},"abstract":"<jats:p>We introduce new tools and vantage points to develop and integrate proactive techniques to attract IPv6 scan traffic, thus enabling its analysis. By deploying the largest-ever IPv6 proactive telescope in a production ISP network, we collected over 600M packets of unsolicited traffic from 1.9k Autonomous Systems in 10 months. We characterized the sources of unsolicited traffic, evaluated the effectiveness of five major features across the network stack, and inferred scanners' sources of target addresses and their strategies.<\/jats:p>","DOI":"10.1145\/3749221","type":"journal-article","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:42:01Z","timestamp":1756993321000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Unveiling IPv6 Scanning Dynamics: A Longitudinal Study Using Large Scale Proactive and Passive IPv6 Telescopes"],"prefix":"10.1145","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1724-8696","authenticated-orcid":false,"given":"Hammas Bin","family":"Tanveer","sequence":"first","affiliation":[{"name":"The University of Iowa, Iowa city, IA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6953-500X","authenticated-orcid":false,"given":"Echo","family":"Chan","sequence":"additional","affiliation":[{"name":"Akamai Technologies, Cambridge, MA, USA and Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3300-9514","authenticated-orcid":false,"given":"Ricky K. P.","family":"Mok","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5948-5172","authenticated-orcid":false,"given":"Sebastian","family":"Kappes","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Saarlan, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9498-2823","authenticated-orcid":false,"given":"Philipp","family":"Richter","sequence":"additional","affiliation":[{"name":"Akamai Technologies, Cambridge, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3425-9331","authenticated-orcid":false,"given":"Oliver","family":"Gasser","sequence":"additional","affiliation":[{"name":"IPinfo, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0183-2517","authenticated-orcid":false,"given":"John","family":"Ronan","sequence":"additional","affiliation":[{"name":"Waterford Institute of Technology, Waterford, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0387-4734","authenticated-orcid":false,"given":"Arthur","family":"Berger","sequence":"additional","affiliation":[{"name":"Akamai Technologies, Cambridge, MA, USA and Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4824-3493","authenticated-orcid":false,"given":"kc","family":"Claffy","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,9,4]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"AbuseIPDB. https:\/\/www.abuseipdb.com. Accessed: 2024-05-16."},{"key":"e_1_2_1_2_1","unstructured":"Certificate transparency. https:\/\/certificate.transparency.dev."},{"key":"e_1_2_1_3_1","unstructured":"Crowdsec's new cybersecurity majority report highlights the rise of ipv6 in cybercriminal activities | cybersecurity dive. https:\/\/www.cybersecuritydive.com\/press-release\/20230727-crowdsecs-new-cybersecurity-majority-report-highlights-the-rise-of-ipv6-in-2\/. (Accessed on 05\/16\/2024)."},{"key":"e_1_2_1_4_1","unstructured":"GoDaddy. https:\/\/www.godaddy.com."},{"key":"e_1_2_1_5_1","unstructured":"internet-measurement.com. https:\/\/internet-measurement.com\/. (Accessed on 05\/16\/2024)."},{"key":"e_1_2_1_6_1","unstructured":"Ipv6 threats are on the rise as adoption grows - sdxcentral. https:\/\/www.sdxcentral.com\/articles\/analysis\/ipv6-threats-are-on-the-rise-as-adoption-grows\/2023\/08\/. (Accessed on 05\/16\/2024)."},{"key":"e_1_2_1_7_1","unstructured":"The no-compromise solution for attack surface management. [Online; accessed 2025-05-27]."},{"key":"e_1_2_1_8_1","volume-title":"World-leader in ipv6 network intelligence for cyber-security, reconnaissance, and forensics. [Online","author":"Sixint","year":"2025","unstructured":"Sixint: World-leader in ipv6 network intelligence for cyber-security, reconnaissance, and forensics. [Online; accessed 2025-05-27]."},{"key":"e_1_2_1_9_1","volume-title":"https:\/\/zmap.io\/","author":"Map Project The","year":"2024","unstructured":"The ZMap Project. https:\/\/zmap.io\/, 2024. Accessed 2024-05-15."},{"key":"e_1_2_1_10_1","volume-title":"https:\/\/github.com\/assetnote\/commonspeak2-wordlists\/","year":"2018","unstructured":"Assetnote. Commonspeak2. https:\/\/github.com\/assetnote\/commonspeak2-wordlists\/, 2018."},{"key":"e_1_2_1_11_1","unstructured":"Anonymized author(s). Anonymized publication."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213232.3213234"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278559"},{"key":"e_1_2_1_14_1","volume-title":"https:\/\/github.com\/bitquark\/dnspop","year":"2016","unstructured":"bitquark. DNSpop. https:\/\/github.com\/bitquark\/dnspop, 2016."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1214\/14-AOAS788"},{"key":"e_1_2_1_16_1","unstructured":"CAIDA. RouteViews Prefix to AS mappings. https:\/\/catalog.caida.org\/dataset\/routeviews_prefix2as."},{"key":"e_1_2_1_17_1","volume-title":"Github - christoskon\/honeyd-ipv6: Git repo for honeyd ipv6. official folder: https:\/\/redmine.cs.uni-potsdam.de\/projects\/honeydv6\/files. [Online","year":"2025","unstructured":"ChristosKon. Github - christoskon\/honeyd-ipv6: Git repo for honeyd ipv6. official folder: https:\/\/redmine.cs.uni-potsdam.de\/projects\/honeydv6\/files. [Online; accessed 2025-04-27]."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488912"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504732"},{"key":"e_1_2_1_20_1","first-page":"605","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Durumeric Zakir","year":"2013","unstructured":"Zakir Durumeric, Eric Wustrow, and J Alex Halderman. {ZMap}: Fast internet-wide scanning and its security applications. In 22nd USENIX Security Symposium (USENIX Security 13), pages 605-620, 2013."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3749215"},{"key":"e_1_2_1_22_1","volume-title":"All cybercrime IP feeds. https:\/\/iplists.firehol.org","author":"HOL.","year":"2025","unstructured":"FireHOL. All cybercrime IP feeds. https:\/\/iplists.firehol.org, 2025."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISP.2006.14"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278553"},{"key":"e_1_2_1_25_1","unstructured":"Oliver Gasser Randy Bush Massimo Candela and Russ Housley. Publishing End-Site Prefix Lengths. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-opsawg-prefix-lengths\/03\/. Active Internet-Draft."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"e_1_2_1_27_1","unstructured":"Fernando Gont and Guillermo Gont. Implications of IPv6 Addressing on Security Operations. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-opsec-ipv6-addressing\/00\/. Expired Internet-Draft."},{"key":"e_1_2_1_28_1","volume-title":"pcapgo. https:\/\/pkg.go.dev\/github.com\/google\/gopacket\/pcapgo","year":"2020","unstructured":"Google. pcapgo. https:\/\/pkg.go.dev\/github.com\/google\/gopacket\/pcapgo, 2020."},{"key":"e_1_2_1_29_1","volume-title":"https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html","year":"2024","unstructured":"Google. IPv6 Adoption. https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html, 2024. Accessed 2024-05-15."},{"key":"e_1_2_1_30_1","first-page":"2","volume-title":"Proceedings of USENIX Security Symposium, 2022","author":"Hiesgen Raphael","year":"2023","unstructured":"Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, and Matthias W\u00e4hlisch. Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope. In Proceedings of USENIX Security Symposium, 2022. Accessed: 2023-2-14."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488794"},{"key":"e_1_2_1_32_1","volume-title":"APNIC","author":"Huston Geoff","year":"2010","unstructured":"Geoff Huston and Mirjam Kuhne. Background radiation in ipv6. The ISP Column, APNIC, 2010."},{"key":"e_1_2_1_33_1","volume-title":"About zone file access. https:\/\/www.icann.org\/resources\/pages\/zfa-2013-06-28-en","author":"ICANN.","year":"2013","unstructured":"ICANN. About zone file access. https:\/\/www.icann.org\/resources\/pages\/zfa-2013-06-28-en, 2013."},{"key":"e_1_2_1_34_1","volume-title":"IPinfo Geolocation Database. https:\/\/ipinfo.io\/products\/ip-geolocation-database","year":"2024","unstructured":"IPinfo. IPinfo Geolocation Database. https:\/\/ipinfo.io\/products\/ip-geolocation-database, 2024."},{"key":"e_1_2_1_35_1","first-page":"53","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Kondracki Brian","year":"2022","unstructured":"Brian Kondracki, Johnny So, and Nick Nikiforakis. Uninvited guests: Analyzing the identity and behavior of certificate transparency bots. In 31st USENIX Security Symposium (USENIX Security 22), pages 53-70, Boston, MA, August 2022. USENIX Association."},{"key":"e_1_2_1_36_1","volume-title":"Christian Rossow. AmpPot: Monitoring and Defending Amplification DDoS Attacks. In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses","author":"Kramer Lukas","year":"2015","unstructured":"Lukas Kramer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, and Christian Rossow. AmpPot: Monitoring and Defending Amplification DDoS Attacks. In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, 2015."},{"key":"e_1_2_1_37_1","volume-title":"October","author":"Encrypt Let's","year":"2021","unstructured":"Let's Encrypt. Rate limits. https:\/\/letsencrypt.org\/docs\/rate-limits\/, October 2021."},{"key":"e_1_2_1_38_1","volume-title":"February","author":"Encrypt Let's","year":"2023","unstructured":"Let's Encrypt. Challenge types. https:\/\/letsencrypt.org\/docs\/challenge-types\/, February 2023."},{"key":"e_1_2_1_39_1","series-title":"Lecture Notes in Computer Science","first-page":"231","volume-title":"Artificial Intelligence and Security - 7th International Conference, ICAIS","author":"Liu Chenhuan","year":"2021","unstructured":"Chenhuan Liu, Qiankun Liu, Shanshan Hao, CongXiao Bao, and Xing Li. IPv6-Darknet Network Traffic Detection. In Xingming Sun, Xiaorui Zhang, Zhihua Xia, and Elisa Bertino, editors, Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II, volume 12737 of Lecture Notes in Computer Science, pages 231-241. Springer, 2021."},{"key":"e_1_2_1_40_1","volume-title":"6Tree: Efficient dynamic discovery of active addresses in the IPv6 address space. Comput. Netw., 155(C):31-46, may","author":"Liu Zhizhu","year":"2019","unstructured":"Zhizhu Liu, Yinqiao Xiong, Xin Liu, Wei Xie, and Peidong Zhu. 6Tree: Efficient dynamic discovery of active addresses in the IPv6 address space. Comput. Netw., 155(C):31-46, may 2019."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340779"},{"key":"e_1_2_1_42_1","volume-title":"Combined subdomains. https:\/\/github.com\/danielmiessler\/SecLists\/tree\/master\/Discovery\/DNS","author":"Miessler Daniel","year":"2023","unstructured":"Daniel Miessler. Combined subdomains. https:\/\/github.com\/danielmiessler\/SecLists\/tree\/master\/Discovery\/DNS, 2023."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131405"},{"key":"e_1_2_1_44_1","volume-title":"Github - mzweilin\/ipv6-attack-detector: Google summer of code 2012 project, supported by the honeynet project organization. [Online","year":"2025","unstructured":"mzweilin. Github - mzweilin\/ipv6-attack-detector: Google summer of code 2012 project, supported by the honeynet project organization. [Online; accessed 2025-04-27]."},{"key":"e_1_2_1_45_1","volume-title":"March","author":"Narten T.","year":"2011","unstructured":"T. Narten, G. Huston, and L. Roberts. IPv6 address assignment to end sites, March 2011."},{"key":"e_1_2_1_46_1","volume-title":"Implications of ipv6 addressing on security operations, 2","author":"Networks F. Gont","year":"2023","unstructured":"F. Gont SI6 Networks. Implications of ipv6 addressing on security operations, 2 2023. [Online; accessed 2025-04-10]."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431314"},{"key":"e_1_2_1_48_1","first-page":"5989","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Pauley Eric","year":"2023","unstructured":"Eric Pauley, Paul Barford, and Patrick McDaniel. {DScope}: A {Cloud-Native} internet telescope. In 32nd USENIX Security Symposium (USENIX Security 23), pages 5989-6006, 2023."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00053"},{"key":"e_1_2_1_50_1","volume-title":"dnscan. https:\/\/github.com\/rbsec\/dnscan","year":"2022","unstructured":"rbsec. dnscan. https:\/\/github.com\/rbsec\/dnscan, 2022."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355595"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561452"},{"key":"e_1_2_1_53_1","unstructured":"RIPE Network Coordination Centre. Routing information service (RIS). http:\/\/ris.ripe.net\/."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC59246.2023.10162033"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487829"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604829"},{"key":"e_1_2_1_57_1","first-page":"343","volume-title":"Matthias W\u00e4hlisch. The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. In Proceedings of the Internet Measurement Conference 2018, IMC '18","author":"Scheitle Quirin","year":"2018","unstructured":"Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, and Matthias W\u00e4hlisch. The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. In Proceedings of the Internet Measurement Conference 2018, IMC '18, page 343-349, New York, NY, USA, 2018. Association for Computing Machinery."},{"key":"e_1_2_1_58_1","article-title":"Gotta Enjoy the Little Things","volume":"52","author":"Sediqi Khwaja Zubair","year":"2022","unstructured":"Khwaja Zubair Sediqi, Lars Prehn, and Oliver Gasser. Hyper-Specific Prefixes: Gotta Enjoy the Little Things in Interdomain Routing. ACM SIGCOMM Computer Communication Review, 52, June 2022.","journal-title":"Interdomain Routing. ACM SIGCOMM Computer Communication Review"},{"key":"e_1_2_1_59_1","first-page":"309","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Song Guanglei","year":"2022","unstructured":"Guanglei Song, Jiahai Yang, Lin He, Zhiliang Wang, Guo Li, Chenxin Duan, Yaozhong Liu, and Zhongxiang Sun. AddrMiner: A comprehensive global active IPv6 address discovery system. In 2022 USENIX Annual Technical Conference (USENIX ATC 22), pages 309-326, Carlsbad, CA, July 2022. USENIX Association."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3145040"},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the Network Traffic Measurement and Analysis Conference (TMA)","author":"Steger Lion","year":"2023","unstructured":"Lion Steger, Liming Kuang, Johannes Zirngibl, Georg Carle, and Oliver Gasser. Target Acquired? Evaluating Target Generation Algorithms for IPv6. In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA), June 2023."},{"key":"e_1_2_1_62_1","first-page":"6221","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Tanveer Hammas Bin","year":"2023","unstructured":"Hammas Bin Tanveer, Rachee Singh, Paul Pearce, and Rishab Nithyanand. Glowing in the dark: Uncovering {IPv6} address discovery and scanning strategies in the wild. In 32nd USENIX Security Symposium (USENIX Security 23), pages 6221-6237, 2023."},{"key":"e_1_2_1_63_1","unstructured":"Deutsche Telekom Security GmbH. T-Pot - The all in one multi honeypot platform. https:\/\/github.com\/telekom-security\/tpotce."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.48"},{"key":"e_1_2_1_65_1","unstructured":"University of Oregon. RouteViews project. http:\/\/www.routeviews.org\/."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3424214"},{"key":"e_1_2_1_67_1","volume-title":"33rd USENIX Security Symposium, USENIX Security 2024","author":"Williams Grant","year":"2024","unstructured":"Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, and Paul Pearce. 6Sense: Internet-Wide IPv6 Scanning and its Security Applications. In Davide Balzarotti and Wenyuan Xu, editors, 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024. USENIX Association, 2024."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3646547.3688449"},{"key":"e_1_2_1_69_1","volume-title":"6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning. Comput. Netw., 203(C), feb","author":"Yang Tao","year":"2022","unstructured":"Tao Yang, Bingnan Hou, Zhiping Cai, Kui Wu, Tongqing Zhou, and Chengyu Wang. 6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning. Comput. Netw., 203(C), feb 2022."},{"key":"e_1_2_1_70_1","volume-title":"An open source network security monitoring tool. https:\/\/zeek.org","year":"2024","unstructured":"Zeek. An open source network security monitoring tool. https:\/\/zeek.org, 2024."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56249-5_4"},{"key":"e_1_2_1_72_1","volume-title":"Research Foundation. In Proceedings of the 2022 Internet Measurement Conference","author":"Zirngibl Johannes","year":"2022","unstructured":"Johannes Zirngibl, Lion Steger, Patrick Sattler, Oliver Gasser, and Georg Carle. Rusty Clusters? Dusting an IPv6 Research Foundation. In Proceedings of the 2022 Internet Measurement Conference, New York, NY, USA, 2022. ACM."},{"key":"e_1_2_1_73_1","volume-title":"Proc. ACM IMC","author":"Ziv Maya","year":"2021","unstructured":"Maya Ziv, Liz Izhikevich, Kimberly Ruth, Katherine Izhikevich, and Zakir Durumeric. ASdb: a system for classifying owners of autonomous systems. In Proc. ACM IMC, 2021."}],"container-title":["Proceedings of the ACM on Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3749221","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3749221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T04:09:11Z","timestamp":1774066151000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3749221"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,3]]},"references-count":73,"journal-issue":{"issue":"CoNEXT3","published-print":{"date-parts":[[2025,9,3]]}},"alternative-id":["10.1145\/3749221"],"URL":"https:\/\/doi.org\/10.1145\/3749221","relation":{},"ISSN":["2834-5509"],"issn-type":[{"value":"2834-5509","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,3]]},"assertion":[{"value":"2025-09-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}