메뉴 건너뛰기




Volumn 13, Issue , 2004, Pages 217-222

How to sanitize data

Author keywords

[No Author keywords available]

Indexed keywords

CREDIT CARDS; DATA REPRESENTATION; DATA SANITIZATION; SANITIZATION ENGINES;

EID: 10444267476     PISSN: 15244547     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (18)

References (6)
  • 1
    • 0006025721 scopus 로고    scopus 로고
    • Identification of host audit data to detect attacks on low-level IP vulnerabilities
    • T. Daniels and E. Spafford, "Identification of Host Audit Data to Detect Attacks on Low-Level IP Vulnerabilities," Journal of Computer Security 7(1) pp. 3-35 (1999).
    • (1999) Journal of Computer Security , vol.7 , Issue.1 , pp. 3-35
    • Daniels, T.1    Spafford, E.2
  • 2
    • 1242310066 scopus 로고    scopus 로고
    • A high-level programming environment for packet trace anonymization and transformation
    • Aug.
    • R. Pang and V. Paxson, "A High-Level Programming Environment for Packet Trace Anonymization and Transformation", Proceedings of SIGCOMM 2003 pp. 339-351 (Aug. 2003)
    • (2003) Proceedings of SIGCOMM 2003 , pp. 339-351
    • Pang, R.1    Paxson, V.2
  • 5
    • 0034300797 scopus 로고    scopus 로고
    • Anomaly-based intrusion detection: Privacy concerns and other problems
    • Oct.
    • E. Lundin and E. Jonsson, "Anomaly-Based Intrusion Detection: Privacy Concerns and Other Problems," Computer Networks 34(4) pp. 623-640 (Oct. 2000).
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 623-640
    • Lundin, E.1    Jonsson, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.