-
1
-
-
51349100142
-
-
Anontool. http://dcs.ics. forth.gr/Activities/Projects /anontool.html
-
Anontool
-
-
-
3
-
-
79251645890
-
Anonymization of IP Traffic Monitoring Data - Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies
-
T. Brekne, A. Ames, and A. Oslebo, Anonymization of IP Traffic Monitoring Data - Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies, Workshop on Privacy Enhancing Technologies (PET), 2005.
-
(2005)
Workshop on Privacy Enhancing Technologies (PET)
-
-
Brekne, T.1
Ames, A.2
Oslebo, A.3
-
4
-
-
51349109469
-
-
CANINE: Converter and ANonymizer for Investigating NetFlow Events, http://security.ncsa.uiuc. edu/distribution/CanineDownLoad.html
-
CANINE: Converter and ANonymizer for Investigating NetFlow Events, http://security.ncsa.uiuc. edu/distribution/CanineDownLoad.html
-
-
-
-
5
-
-
66249083673
-
Inferring Sensitive Information from Anonymized Network Traces
-
S. E. Coull, C. V. Wright, F. Monrose, M. P. Collins, and M. K. Reiter, Inferring Sensitive Information from Anonymized Network Traces, Network and Distributed Systems Security (NDSS), 2007.
-
(2007)
Network and Distributed Systems Security (NDSS)
-
-
Coull, S.E.1
Wright, C.V.2
Monrose, F.3
Collins, M.P.4
Reiter, M.K.5
-
6
-
-
51349154039
-
-
Y. Li, A. J. Slagell, K. Luo, and W. Yurcik, CANINE: A Combined Converter and Anonymizer Tool for Processing NetFlows for Security, 13th Intl. Conf. on Telecom. Systems, 2005.
-
Y. Li, A. J. Slagell, K. Luo, and W. Yurcik, CANINE: A Combined Converter and Anonymizer Tool for Processing NetFlows for Security, 13th Intl. Conf. on Telecom. Systems, 2005.
-
-
-
-
7
-
-
51349124675
-
-
K. Luo, Y. Li, C. Ermopoulos, W. Yurcik, and A. J. Slagell, SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting, ACM Computing Research Repository (CoRR) Technical Report cs.CR/0601079, January 2006.
-
K. Luo, Y. Li, C. Ermopoulos, W. Yurcik, and A. J. Slagell, SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting, ACM Computing Research Repository (CoRR) Technical Report cs.CR/0601079, January 2006.
-
-
-
-
8
-
-
84885574219
-
-
G. Minshall, tcpdpriv. http://ita.ee.lbl.gov/html/contrib/ tcpdpriv.html
-
tcpdpriv
-
-
Minshall, G.1
-
9
-
-
14844302515
-
A High-Level Programming Environment for Packet Trace Anonymization and Transformation
-
R. Pang and V. Paxson, A High-Level Programming Environment for Packet Trace Anonymization and Transformation, ACM SIGCOMM, 2003.
-
(2003)
ACM SIGCOMM
-
-
Pang, R.1
Paxson, V.2
-
10
-
-
33847256529
-
The Devil and Packet Trace Anonymization
-
January
-
R. Pang, M. Altaian, V. Paxson, and J. Lee, The Devil and Packet Trace Anonymization, ACM Computer Communications Review, January 2006.
-
(2006)
ACM Computer Communications Review
-
-
Pang, R.1
Altaian, M.2
Paxson, V.3
Lee, J.4
-
11
-
-
1242263141
-
-
M. Peuhkuri, A Method to Compress and Anonymize Packet Traces, ACM SIGCOMM Internet Measurement Workshop, 2001.
-
M. Peuhkuri, A Method to Compress and Anonymize Packet Traces, ACM SIGCOMM Internet Measurement Workshop, 2001.
-
-
-
-
12
-
-
33845532990
-
Privacy-Enabled Global Threat Monitoring
-
November
-
P. A. Porras, Privacy-Enabled Global Threat Monitoring, IEEE Security and Privacy, November 2006.
-
(2006)
IEEE Security and Privacy
-
-
Porras, P.A.1
-
15
-
-
33847027721
-
Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization
-
A. J. Slagell and W. Yurcik, Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization, 1st IEEE SECOVAL Workshop, 2005.
-
(2005)
1st IEEE SECOVAL Workshop
-
-
Slagell, A.J.1
Yurcik, W.2
-
16
-
-
84886395955
-
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs
-
A. J. Slagell, K. Lakkaraju, and K. Luo, FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs, Usenix LISA, 2006.
-
(2006)
Usenix LISA
-
-
Slagell, A.J.1
Lakkaraju, K.2
Luo, K.3
-
19
-
-
2442586852
-
Selecting Log Data Sources to Correlate Attack Traces For Computer Network Security: Preliminary Results
-
X. Yin, K. Lakkaraju, Y. Li, and W. Yurcik, Selecting Log Data Sources to Correlate Attack Traces For Computer Network Security: Preliminary Results, 11th Intl. Conf. on Telecom. Systems, 2003.
-
(2003)
11th Intl. Conf. on Telecom. Systems
-
-
Yin, X.1
Lakkaraju, K.2
Li, Y.3
Yurcik, W.4
|