메뉴 건너뛰기




Volumn 14, Issue 4, 2011, Pages 1-30

Privacy-Preserving Distributed Network Troubleshooting—Bridging the Gap Between Theory and Practice

Author keywords

aggregation; Algorithms; anomaly detection; Applied cryptography; collaborative network security; Design; Experimentation; Measurement; network management; root cause analysis; secure multiparty computation; Security

Indexed keywords


EID: 84893345636     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/2043628.2043632     Document Type: Article
Times cited : (9)

References (55)
  • 13
    • 70349680977 scopus 로고    scopus 로고
    • Applying PCA for Traffic Anomaly Detection: Problems and Solutions
    • Brauckhoff, D., Salamatian, K., and May, M. 2009b. Applying PCA for Traffic Anomaly Detection: Problems and Solutions. In Proceedings of INFOCOM.
    • (2009) Proceedings of INFOCOM
    • Brauckhoff, D.1    Salamatian, K.2    May, M.3
  • 26
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Lecture Notes in Computer Science Springer Berlin
    • Freedman, M. J., Nissim, K., and Pinkas, B. 2004. Efficient private matching and set intersection. In Proceedings of the EUROCRYPT. Lecture Notes in Computer Science, vol. 3027, Springer Berlin, 1-19.
    • (2004) Proceedings of the EUROCRYPT. , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 35
    • 3142592508 scopus 로고    scopus 로고
    • Evaluating top-k queries over web-accessible databases
    • Marian, A., Bruno, N., and Gravano, L. 2004. Evaluating top-k queries over web-accessible databases. ACM Trans. Datab. Syst. 29, 2, 319-362.
    • (2004) ACM Trans. Datab. Syst. , vol.29 , pp. 319-362
    • Marian, A.1    Bruno, N.2    Gravano, L.3
  • 40
    • 84871156099 scopus 로고    scopus 로고
    • Privacy-preserving collaborative anomaly detection
    • Ph.D. thesis, Princeton University.
    • Ringberg, H. 2009. Privacy-preserving collaborative anomaly detection. Ph.D. thesis, Princeton University.
    • (2009)
    • Ringberg, H.1
  • 41
    • 58049106973 scopus 로고    scopus 로고
    • Understanding Skype signaling
    • Rossi, D., Mellia, M., and Meo, M. 2009. Understanding Skype signaling. Comput. Netw. 53, 2, 130-140.
    • (2009) Comput. Netw. , vol.53 , pp. 130-140
    • Rossi, D.1    Mellia, M.2    Meo, M.3
  • 43
    • 33847327063 scopus 로고    scopus 로고
    • Secure distributed data-mining and its application to large-scale network measurements
    • Roughan, M. and Zhang, Y. 2006b. Secure distributed data-mining and its application to large-scale network measurements. Comput. Comm. Rev. 36, 1, 7-14.
    • (2006) Comput. Comm. Rev. , vol.36 , pp. 7-14
    • Roughan, M.1    Zhang, Y.2
  • 45
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A. 1979. How to share a secret. Comm. ACM 22, 11, 612-613.
    • (1979) Comm. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 47
    • 3042683635 scopus 로고    scopus 로고
    • Worm and attack early warning
    • Stolfo, S. J. 2004. Worm and attack early warning. IEEE Secur. Priv. 2, 3, 73-75.
    • (2004) IEEE Secur. Priv. , vol.2 , pp. 73-75
    • Stolfo, S.J.1
  • 48
    • 84877623211 scopus 로고    scopus 로고
    • Switch. The Swiss education and research network
    • http://www.switch.ch.
    • Switch. The Swiss education and research network. http://www.switch.ch.
  • 50
  • 52
    • 69249241437 scopus 로고    scopus 로고
    • Privacy-preserving kth element score over vertically partitioned data
    • Vaidya, J. and Clifton, C. 2009. Privacy-preserving kth element score over vertically partitioned data. IEEE Trans. Knowl. Data 21, 2, 253-258.
    • (2009) IEEE Trans. Knowl. Data , vol.21 , pp. 253-258
    • Vaidya, J.1    Clifton, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.