메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1-7

Differential privacy for collaborative security

Author keywords

Botnets; Collaborative security; Differential privacy

Indexed keywords

BOTNETS; COLLABORATIVE APPROACH; GLOBAL SECURITY; INDIVIDUAL CUSTOMERS; NETWORK OPERATOR; QUERY MECHANISMS; SECURITY APPROACH; TYPE SYSTEMS;

EID: 77952356233     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1752046.1752047     Document Type: Conference Paper
Times cited : (21)

References (31)
  • 6
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against DoS attacks
    • C.-M. Cheng, H. T. Kung, and K.-S. Tan. Use of spectral analysis in defense against DoS attacks. In Proceedings of IEEE GLOBECOM, volume 3, pages 2143-2148, 2002.
    • (2002) Proceedings of IEEE GLOBECOM , vol.3 , pp. 2143-2148
    • Cheng, C.-M.1    Kung, H.T.2    Tan, K.-S.3
  • 10
    • 70350645515 scopus 로고    scopus 로고
    • The differential privacy frontier (extended abstract) , chapter 29. Springer
    • C. Dwork. The differential privacy frontier (extended abstract). In Theory of Cryptography, Lecture Notes in Computer Science, chapter 29, pages 496-502. Springer, 2009.
    • (2009) Theory of Cryptography, Lecture Notes in Computer Science , pp. 496-502
    • Dwork, C.1
  • 14
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol- and structureindependent botnet detection
    • July
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol- and structureindependent botnet detection. In Proceedings of the 17th USENIX Security Symposium, July 2008.
    • (2008) Proceedings of the 17th USENIX Security Symposium
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.