Cost-Effective IP Trace Publishing Using Data Sketch
暂无分享,去创建一个
[1] Paul Barford,et al. Self-configuring network traffic generation , 2004, IMC '04.
[2] Jelena Mirkovic,et al. Privacy-safe network trace sharing via secure queries , 2008, NDA '08.
[3] Spyros Antonatos,et al. On the Privacy Risks of Publishing Anonymized IP Network Traces , 2006, Communications and Multimedia Security.
[4] Martin May,et al. The risk-utility tradeoff for IP address truncation , 2008, NDA '08.
[5] Charles V. Wright,et al. Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces , 2007, NDSS.
[6] Lei Zhen-ming. A Passive RTT Estimate Algorithm for TCP , 2004 .
[7] Vern Paxson,et al. Issues and etiquette concerning use of shared measurement data , 2007, IMC '07.
[8] Amin Vahdat,et al. Realistic and responsive network traffic generation , 2006, SIGCOMM.
[9] Abhinav Parate,et al. A framework for safely publishing communication traces , 2009, CIKM.
[10] Michael K. Reiter,et al. The Challenges of Effectively Anonymizing Network Data , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[11] Martin F. Arlitt,et al. SC2D: an alternative to trace anonymization , 2006, MineNet '06.
[12] kc claffy,et al. The RTT distribution of TCP flows on the Internet and its impact on TCP based flow control , 2004 .
[13] Amin Vahdat,et al. Realistic and responsive network traffic generation , 2006, SIGCOMM 2006.
[14] Jason Lee,et al. The devil and packet trace anonymization , 2006, CCRV.
[15] Hao Jiang,et al. Passive estimation of TCP round-trip times , 2002, CCRV.