-
2
-
-
85094322598
-
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection
-
Toulouse, France, Oct
-
Biskup, J., and Flegel, U., "Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection," Third International Workshop on the Recent Advances in Intrusion Detection (RAID 2000), Toulouse, France, Oct., 2000
-
(2000)
Third International Workshop on the Recent Advances in Intrusion Detection (RAID 2000)
-
-
Biskup, J.1
Flegel, U.2
-
3
-
-
0014814325
-
Space/Time Trade-offs in Hash Coding with Allowable Errors
-
Bloom, B. H., "Space/Time Trade-offs in Hash Coding with Allowable Errors," Communications of the ACM, Vol. 13, Num. 7, pp. 422-426, 1970
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B. H.1
-
4
-
-
33847036676
-
Pseudonymizing UNIX Log Files
-
Bristol, UK, Oct
-
Flegel, U., "Pseudonymizing UNIX Log Files," Infrastructure Security, International Conference (InfraSec 2002), Bristol, UK, Oct, 2002
-
(2002)
Infrastructure Security, International Conference (InfraSec 2002)
-
-
Flegel, U.1
-
5
-
-
85094322053
-
NSA Killed System that Sifted Phone Data Legally
-
The Baltimore Sun, May 17
-
Gorman, S., "NSA Killed System that Sifted Phone Data Legally," The Baltimore Sun, May 17, 2006
-
(2006)
-
-
Gorman, S.1
-
6
-
-
85094315224
-
-
IANA IPv4 Protocol Numbers Assignment, Mar
-
IANA IPv4 Protocol Numbers Assignment, http:// www.iana.org/assignments/protocol-numbers, Mar., 2006
-
(2006)
-
-
-
7
-
-
85094319155
-
Internet Attack is called Broad and Long Lasting
-
New York Times, Sec. A, Col. May 10
-
Markoff, J., and Bergman, L., "Internet Attack is called Broad and Long Lasting," New York Times, Sec. A, Col. 1, p. 1, May 10, 2005
-
(2005)
, vol.1
, pp. 1
-
-
Markoff, J.1
Bergman, L.2
-
8
-
-
85084159849
-
Privacy-Preserving Sharing and Correlation of Security Alerts
-
San Diego, CA, Aug
-
Lincoln, P., Porras, P., and Shmatikov, V., "Privacy-Preserving Sharing and Correlation of Security Alerts," 13th USENIX Security Symposium, San Diego, CA, Aug., 2004
-
(2004)
13th USENIX Security Symposium
-
-
Lincoln, P.1
Porras, P.2
Shmatikov, V.3
-
9
-
-
84882749048
-
Privacy vs Intrusion Detection Analysis
-
West Lafayette Sep
-
Lundin, E., and Jonsson, E., "Privacy vs Intrusion Detection Analysis," Second International Wo r k s h o p on the Recent Advances in Intrusion Detection (RAID ?99), West Lafayette, IN, Sep., 1999
-
(1999)
Second International Wo r k s h o p on the Recent Advances in Intrusion Detection (RAID ?99)
-
-
Lundin, E.1
Jonsson, E.2
-
10
-
-
10444260259
-
A High-Level Programming Environment for Packet Trace Anonymization and Transformation
-
Karlsruhe, Germany, Aug
-
Pang, R., and Paxson, V., "A High-Level Programming Environment for Packet Trace Anonymization and Transformation," ACM SIGCOMM Conference, Karlsruhe, Germany, Aug., 2003
-
(2003)
ACM SIGCOMM Conference
-
-
Pang, R.1
Paxson, V.2
-
11
-
-
33847256529
-
"The Devil and Packet Trace Anonymization
-
Jan
-
Pang, R., Allman, M., Paxson, V., and Lee, J., "The Devil and Packet Trace Anonymization," ACM SIGCOMM Computer Communications Review, Vol. 36, Num. 1, pp. 29-38, Jan., 2006
-
(2006)
ACM SIGCOMM Computer Communications Review
, vol.36
, Issue.1
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
12
-
-
33745788676
-
California Reports Massive Data Breach
-
SecurityFocus News, October 19
-
Poulsen, K., "California Reports Massive Data Breach," SecurityFocus News, http://www. securityfocus.com/, October 19, 2004
-
(2004)
-
-
Poulsen, K.1
-
13
-
-
33748528661
-
The Internet Measurement Data Catalog
-
Oct
-
Shannon, C., Moore, D., and Keys, K., "The Internet Measurement Data Catalog," ACM SIGCOMM Computer Communications Review, Vol. 35, Num. 5, pp. 97-100, Oct., 2005
-
(2005)
ACM SIGCOMM Computer Communications Review
, vol.35
, Issue.5
, pp. 97-100
-
-
Shannon, C.1
Moore, D.2
Keys, K.3
-
14
-
-
84923237639
-
Network Log Anonymization: Application of Crypto-PAn to Cisco NetFlows
-
Wo r k s h o p on Secure Knowledge Management, Buffalo, NY, Sep
-
Slagell, A., Wang, J., and Yurcik, W., "Network Log Anonymization: Application of Crypto-PAn to Cisco NetFlows," Wo r k s h o p on Secure Knowledge Management, Buffalo, NY, Sep., 2004
-
(2004)
-
-
Slagell, A.1
Wang, J.2
Yurcik, W.3
-
15
-
-
77954751856
-
Sharing Compuer and Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization
-
Technical Report cs.CR/0409005; Sep
-
Slagell, A., and Yurcik, W., "Sharing Compuer and Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization," ACM Computing research Repository (CoRR), Technical Report cs.CR/0409005; Sep., 2004
-
(2004)
ACM Computing research Repository (CoRR)
-
-
Slagell, A.1
Yurcik, W.2
-
16
-
-
33847027721
-
Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization
-
Athens, Greece, Sep
-
Slagell, A., and Yurcik, W., "Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization," SECOVAL: The Workshop on the Value of Security through Collaboration, Athens, Greece, Sep., 2005
-
(2005)
SECOVAL: The Workshop on the Value of Security through Collaboration
-
-
Slagell, A.1
Yurcik, W.2
-
17
-
-
42549085775
-
Sharing Network Logs for Computer Forensics: A New tool for the Anonymization of NetFlow Records
-
Athens, Greece, Sep
-
Slagell, A., Li, Y., and Luo, K., "Sharing Network Logs for Computer Forensics: A New tool for the Anonymization of NetFlow Records," Computer Network Forensics Research Workshop, Athens, Greece, Sep., 2005
-
(2005)
Computer Network Forensics Research Workshop
-
-
Slagell, A.1
Li, Y.2
Luo, K.3
-
18
-
-
0343472295
-
Pseudonymous Audit for Privacy Enhanced Intrusion Detection
-
Copenhagen, Denmark, May
-
Sobirey, M., Fischer-Hubner, S., and Rannenburg, K., "Pseudonymous Audit for Privacy Enhanced Intrusion Detection," IFIP TC11 13th International Conference on Information Security, Copenhagen, Denmark, May, 1997
-
(1997)
IFIP TC11 13th International Conference on Information Security
-
-
Sobirey, M.1
Fischer-Hubner, S.2
Rannenburg, K.3
-
19
-
-
84885575254
-
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm
-
Brighton, UK, Oct
-
Vrable, M., Ma, J., Chen, J., Moore, D., Vandekieft, E., Snoeren, A., Voelker, G., and Savage, S., "Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm," 20th ACM Symposium on Operating Systems Principles (SOSP 2005), Brighton, UK, Oct., 2005
-
(2005)
20th ACM Symposium on Operating Systems Principles (SOSP 2005)
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.6
Voelker, G.7
Savage, S.8
-
20
-
-
1242308060
-
On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization
-
San Francisco, CA, Nov
-
Xu, J., Fan, J., Ammar, M. H., and Moon, S. B., "On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization," ACM SIGCOMM Internet Measurement Workshop, San Francisco, CA, Nov., 2001
-
(2001)
ACM SIGCOMM Internet Measurement Workshop
-
-
Xu, J.1
Fan, J.2
Ammar, M. H.3
Moon, S. B.4
-
21
-
-
24344436696
-
Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme,"
-
Paris, France, Nov
-
Xu, J., Fan, J., Ammar, M. H., and Moon, S. B., "Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme," 10th IEEE International Conference on Network Protocols, Paris, France, Nov., 2002
-
(2002)
10th IEEE International Conference on Network Protocols
-
-
Xu, J.1
Fan, J.2
Ammar, M. H.3
Moon, S. B.4
-
22
-
-
84899508937
-
The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness
-
College Park, MD, Mar
-
Yin, X., Yurcik, W., and Slagell, A., "The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness," First International Workshop on Information Assurance (IWIA), College Park, MD, Mar., 2005
-
(2005)
First International Workshop on Information Assurance (IWIA)
-
-
Yin, X.1
Yurcik, W.2
Slagell, A.3
|