메뉴 건너뛰기




Volumn , Issue , 2007, Pages 339-352

On web browsing privacy in anonymized netflows

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMIZATION; COMPLEX STRUCTURE; NEW APPROACHES; PACKET LEVEL; REAL NETWORKS; REAL-WORLD NETWORKS; RESEARCH PURPOSE; STATE OF THE ART;

EID: 84937846451     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (52)

References (33)
  • 3
    • 79251645890 scopus 로고    scopus 로고
    • Anonymization of IP traffic monitoring data – attacks on two prefix-preserving anonymization schemes and some proposed remedies
    • May
    • BREKNE, T., ÅRNES, A., AND ØSLEBØ, A. Anonymization of IP Traffic Monitoring Data – Attacks on Two Prefix-preserving Anonymization Schemes and Some Proposed Remedies. In Proceedings of the Workshop on Privacy Enhancing Technologies (May 2005), pp. 179–196.
    • (2005) Proceedings of the Workshop on Privacy Enhancing Technologies , pp. 179-196
    • Brekne, T.1    Årnes, A.2    Øslebø, A.3
  • 8
    • 77955212743 scopus 로고    scopus 로고
    • Unpublished manuscript as of February 1
    • DANEZIS, G. Traffic Analysis of the HTTP Protocol over TLS. Unpublished manuscript available at http://homes.esat.kuleuven.be/∼gdanezis/TLSanon.pdf as of February 1, 2007.
    • (2007) Traffic Analysis of the HTTP Protocol over TLS
    • Danezis, G.1
  • 9
    • 4444266989 scopus 로고    scopus 로고
    • Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
    • October
    • FAN, J., XU, J., AMMAR, M., AND MOON, S. Prefix-preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme. Computer Networks 46, 2 (October 2004), 263–272.
    • (2004) Computer Networks , vol.46 , Issue.2 , pp. 263-272
    • Fan, J.1    Xu, J.2    Ammar, M.3    Moon, S.4
  • 10
    • 0033204142 scopus 로고    scopus 로고
    • Packet classification using hierarchical intelligent cuttings
    • GUPTA, P., AND MCKEOWN, N. Packet Classification Using Hierarchical Intelligent Cuttings. In Proceedings of Hot Interconnects VII (1999), pp. 147–160.
    • (1999) Proceedings of Hot Interconnects , vol.7 , pp. 147-160
    • Gupta, P.1    McKeown, N.2
  • 21
    • 85094839698 scopus 로고    scopus 로고
    • Combining cisco netflow exports with relational database technology for usage statistics, intrusion detection, and network forensics
    • December
    • NICKLESS, W., NAVARRO, J., AND WINKLER, L. Combining CISCO NetFlow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics. In Proceedings of the 14th Large Systems Administration Conference (LISA) (December 2000), pp. 285–290.
    • (2000) Proceedings of the 14th Large Systems Administration Conference (LISA) , pp. 285-290
    • Nickless, W.1    Navarro, J.2    Winkler, L.3
  • 30
    • 42549085775 scopus 로고    scopus 로고
    • Sharing network logs for computer forensics: A new tool for the anonymization of netflow records
    • September
    • SLAGELL, A., LI, Y., AND LUO, K. Sharing Network Logs for Computer Forensics: A New Tool for the Anonymization of NetFlow Records. In Proceedings of Computer Network Forensics Research Workshop (September 2005).
    • (2005) Proceedings of Computer Network Forensics Research Workshop
    • Slagell, A.1    Li, Y.2    Luo, K.3
  • 31
    • 3242743560 scopus 로고    scopus 로고
    • A framework for the evaluation of session reconstruction heuristics in web-usage analysis
    • April
    • SPILIOPOULOU, M., MOBASHER, B., BERENDT, B., AND NAKAGAWA, M. A Framework for the Evaluation of Session Reconstruction Heuristics in Web-Usage Analysis. INFORMS Journal on Computing 15, 2 (April 2003), 171–190.
    • (2003) INFORMS Journal on Computing , vol.15 , Issue.2 , pp. 171-190
    • Spiliopoulou, M.1    Mobasher, B.2    Berendt, B.3    Nakagawa, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.