{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:01:59Z","timestamp":1730343719953,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.23919\/icact.2019.8702042","type":"proceedings-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T18:58:41Z","timestamp":1556823521000},"page":"419-424","source":"Crossref","is-referenced-by-count":1,"title":["A Learning Kit on IPv6 Deployment and its Security Challenges for Neophytes"],"prefix":"10.23919","author":[{"given":"Abidah Mat","family":"Taib","sequence":"first","affiliation":[]},{"given":"Nor Arzami","family":"Othman","sequence":"additional","affiliation":[]},{"given":"Ros Syamsul","family":"Hamid","sequence":"additional","affiliation":[]},{"given":"Iman Hazwam Abd","family":"Halim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISESEE.2011.5977081"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"6001","DOI":"10.1051\/matecconf\/201815006001","article-title":"I6-FPS: Automating the ICMPv6 Filtering Rules","volume":"150","author":"ali","year":"2018","journal-title":"MUCET2017 MATEC Web of Conferences"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSSR.2010.5773699"},{"key":"ref13","first-page":"927","article-title":"Conceptual framework and Threat Model for a Secure IPv6 Deployment","volume":"10","author":"taib","year":"2018","journal-title":"J Fundam Appl Sci"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.36"},{"key":"ref15","first-page":"72","article-title":"Mobile Application and Its Global Impact, International Journal of Engineering & Technology","volume":"10","author":"islam","year":"2010","journal-title":"IJET-IJENS"},{"key":"ref16","article-title":"Gamification Solutions to Enhance Software User Engagement &#x2013; A Systematic Review Gamification Solutions to Enhance Software User Engagement","author":"darejah","year":"2016","journal-title":"A Systematic Review"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3134302.3134305"},{"article-title":"5 Reasons Why Self-Paced Training Is Highly Effective","year":"2015","author":"patterson","key":"ref18"},{"key":"ref4","article-title":"IPv6 Transition\/Coexistence Security Considerations","author":"davies","year":"2007","journal-title":"RFC4942"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCOINS.2014.6868375"},{"key":"ref6","article-title":"Preparing Future Network Engineers for the Challenges of IPv6","author":"pickard","year":"2014","journal-title":"Proceedings of 2014 ASEE Southeast Section Conference American Society for Engineering Education"},{"journal-title":"IPv6 Security","year":"2009","author":"hogg","key":"ref5"},{"key":"ref8","article-title":"Enhanced Risk Assessment Equation for IPv6 Deployment","author":"rosli","year":"2015","journal-title":"Proceedings of the 5th International Conference on Computing and Informatic (ICOCI2015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4018\/jmcmc.2013040106"},{"key":"ref2","first-page":"21","article-title":"Sch&#x00F6;n: Design as a reflective practice","author":"visser","year":"2015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1980022.1980226"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SHUSER.2012.6269008"}],"event":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2019,2,17]]},"location":"PyeongChang Kwangwoon_Do, Korea (South)","end":{"date-parts":[[2019,2,20]]}},"container-title":["2019 21st International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8694794\/8701885\/08702042.pdf?arnumber=8702042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:06:52Z","timestamp":1558379212000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8702042\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/icact.2019.8702042","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}