Differential privacy for collaborative security
暂无分享,去创建一个
Andreas Haeberlen | Adam J. Aviv | Jonathan M. Smith | Benjamin C. Pierce | Jason Reed | Daniel Wagner | Jonathan M. Smith | B. Pierce | Andreas Haeberlen | Daniel Wagner | J. Reed
[1] Michael K. Reiter,et al. Traffic Aggregation for Malware Detection , 2008, DIMVA.
[2] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[3] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[4] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[5] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[6] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[7] Cynthia Dwork,et al. Differential privacy and robust statistics , 2009, STOC '09.
[8] Chris Kanich,et al. Spamalytics: an empirical analysis of spam marketing conversion , 2009, CACM.
[9] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[10] Cynthia Dwork,et al. The Differential Privacy Frontier (Extended Abstract) , 2009, TCC.
[11] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[12] Thorsten Holz,et al. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.
[13] Aaron Roth,et al. Differentially private combinatorial optimization , 2009, SODA '10.
[14] Tim Roughgarden,et al. The Median Mechanism: Interactive and Efficient Privacy with Multiple Queries , 2009, ArXiv.
[15] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[16] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[17] W. Timothy Strayer,et al. Using Machine Learning Techniques to Identify Botnet Traffic , 2006 .
[18] Sofya Raskhodnikova,et al. What Can We Learn Privately? , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[19] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[20] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[21] Sumit Gulwani,et al. Continuity analysis of programs , 2010, POPL '10.
[22] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[23] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[24] H. T. Kung,et al. Use of spectral analysis in defense against DoS attacks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[25] Steven M. Bellovin,et al. Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.
[26] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[27] Aaron Roth,et al. A learning theory approach to noninteractive database privacy , 2011, JACM.
[28] Suresh Singh,et al. An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.
[29] Cynthia Dwork,et al. Practical privacy: the SuLQ framework , 2005, PODS.
[30] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[31] Louisa Flintoft. Know your enemy , 2003, Nature Reviews Cancer.