-
1
-
-
0002221136
-
Fast algorithms for mining association rules
-
R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In VLDB, 1994.
-
(1994)
VLDB
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
84871595315
-
-
Retrieved 2010-16-01
-
AOL search data scandal. http://en.wikipedia.org/wiki/AOL-search-data- scandal. Retrieved 2010-16-01.
-
AOL Search Data Scandal
-
-
-
3
-
-
0000481188
-
An empirical distribution function for sampling with incomplete information
-
M. Ayer, H. Brunk, G. Ewing, W. Reid, and E. Silverman. An empirical distribution function for sampling with incomplete information. The Annals of Mathematical Statistics, 26(4), 1955.
-
(1955)
The Annals of Mathematical Statistics
, vol.26
, Issue.4
-
-
Ayer, M.1
Brunk, H.2
Ewing, G.3
Reid, W.4
Silverman, E.5
-
5
-
-
77955220391
-
Playing devilćs advocate: Inferring sensitive information from anonymized network traces
-
S. E. Coull, C. V. Wright, F. Monrose, M. P. Collins, and M. K. Reiter. Playing devilćs advocate: Inferring sensitive information from anonymized network traces. In NDSS, 2007.
-
(2007)
NDSS
-
-
Coull, S.E.1
Wright, C.V.2
Monrose, F.3
Collins, M.P.4
Reiter, M.K.5
-
7
-
-
50249086141
-
Differential privacy
-
C. Dwork. Differential privacy. In ICALP, 2006.
-
(2006)
ICALP
-
-
Dwork, C.1
-
9
-
-
70349695788
-
Network discovery from passive measurements
-
B. Eriksson, P. Barford, and R. Nowak. Network discovery from passive measurements. In SIGCOMM, 2008.
-
(2008)
SIGCOMM
-
-
Eriksson, B.1
Barford, P.2
Nowak, R.3
-
10
-
-
0035278163
-
Algorithms for packet classification
-
P. Gupta and N. McKeown. Algorithms for packet classification. IEEE Network, 15(2), 2001.
-
(2001)
IEEE Network
, vol.15
, Issue.2
-
-
Gupta, P.1
McKeown, N.2
-
12
-
-
70849095357
-
What's going on? Learning communication rules in edge networks
-
S. Kandula, R. Chandra, and D. Katabi. What's going on? Learning communication rules in edge networks. In SIGCOMM, 2008.
-
(2008)
SIGCOMM
-
-
Kandula, S.1
Chandra, R.2
Katabi, D.3
-
14
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
F. McSherry. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. In SIGMOD, 2009.
-
(2009)
SIGMOD
-
-
McSherry, F.1
-
15
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the Netflix prize contenders
-
F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the Netflix prize contenders. In KDD, 2009.
-
(2009)
KDD
-
-
McSherry, F.1
Mironov, I.2
-
16
-
-
78149306801
-
-
G. Minshall. tcpdriv. http://ita.ee.lbl.gov/html/contrib/tcpdpriv.html.
-
tcpdriv
-
-
Minshall, G.1
-
18
-
-
78149315577
-
Securing mediated trace access using black-box permutation analysis
-
P. Mittal, V. Paxson, R. Summer, and M. Winterrowd. Securing mediated trace access using black-box permutation analysis. In HotNets, 2009.
-
(2009)
HotNets
-
-
Mittal, P.1
Paxson, V.2
Summer, R.3
Winterrowd, M.4
-
21
-
-
33847256529
-
The devil and packet trace anonymization
-
R. Pang, M. Allman, V. Paxson, and J. Lee. The devil and packet trace anonymization. SIGCOMM CCR, 36(1), 2006.
-
(2006)
SIGCOMM CCR
, vol.36
, Issue.1
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
22
-
-
10444260259
-
A high-level programming environment for packet trace anonymization and transformation
-
R. Pang and V. Paxson. A high-level programming environment for packet trace anonymization and transformation. In SIGCOMM, 2003.
-
(2003)
SIGCOMM
-
-
Pang, R.1
Paxson, V.2
-
24
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
V. Rastogi and S. Nath. Differentially private aggregation of distributed time-series with transformation and encryption. In SIGMOD, 2010.
-
(2010)
SIGMOD
-
-
Rastogi, V.1
Nath, S.2
-
25
-
-
77952356233
-
Differential privacy for collaborative security
-
J. Reed, A. J. Aviv, D. Wagner, A. Haeberlen, B. C. Pierce, and J. M. Smith. Differential privacy for collaborative security. In EuroSec, 2010.
-
(2010)
EuroSec
-
-
Reed, J.1
Aviv, A.J.2
Wagner, D.3
Haeberlen, A.4
Pierce, B.C.5
Smith, J.M.6
-
26
-
-
79952950892
-
Analyzing privacy in enterprise packet trace anonymization
-
B. Ribeiro, W. Chen, G. Miklau, and D. Towsley. Analyzing privacy in enterprise packet trace anonymization. In NDSS, 2008.
-
(2008)
NDSS
-
-
Ribeiro, B.1
Chen, W.2
Miklau, G.3
Towsley, D.4
-
30
-
-
67650145176
-
Swing: Realistic and responsive network traffic generation
-
K. V. Vishwanath and A. Vahdat. Swing: realistic and responsive network traffic generation. ToN, 17(3), 2009.
-
(2009)
ToN
, vol.17
, Issue.3
-
-
Vishwanath, K.V.1
Vahdat, A.2
-
31
-
-
24344436696
-
Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
J. Xu, J. Fan, M. Ammar, and S. Moon. Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. In ICNP, 2002.
-
(2002)
ICNP
-
-
Xu, J.1
Fan, J.2
Ammar, M.3
Moon, S.4
-
32
-
-
70350591395
-
DryadLINQ: A system for general-purpose distributed data-parallel computing using a high-level language
-
Y. Yu, M. Isard, D. Fetterly, M. Budiu, Úlfar Erlingsson, P. K. Gunda, and J. Currey. DryadLINQ: A system for general-purpose distributed data-parallel computing using a high-level language. In OSDI, 2008.
-
(2008)
OSDI
-
-
Yu, Y.1
Isard, M.2
Fetterly, D.3
Budiu, M.4
Erlingsson, Ú.5
Gunda, P.K.6
Currey, J.7
|