Privacy in the cloud: A survey of existing solutions and research challenges

P Silva, E Monteiro, P Simoes - IEEE access, 2021 - ieeexplore.ieee.org
Private data is transmitted and stored online every second. Therefore, security and privacy
assurances should be provided at all times. However, that is not always the case. Private …

[HTML][HTML] On Web Browsing Privacy in Anonymized NetFlows.

SE Coull, MP Collins, CV Wright, F Monrose… - USENIX Security …, 2007 - usenix.org
Anonymization of network traces is widely viewed as a necessary condition for releasing
such data for research purposes. For obvious privacy reasons, an important goal of trace …

[图书][B] Privacy-aware knowledge discovery: novel applications and new techniques

F Bonchi, E Ferrari - 2010 - books.google.com
Covering research at the frontier of this field, this volume presents state-of-the-art privacy-
preserving data mining techniques for application domains, such as medicine and social …

DPNeT: Differentially private network traffic synthesis with generative adversarial networks

L Fan, A Pokkunuru - IFIP Annual Conference on Data and Applications …, 2021 - Springer
High quality network traffic data can be shared to enable knowledge discovery and advance
cyber defense research. However, due to its sensitive nature, ensuring safe sharing of such …

Outsourcing security analysis with anonymized logs

J Zhang, N Borisov, W Yurcik - 2006 Securecomm and …, 2006 - ieeexplore.ieee.org
As security monitoring grows both more complicated and more sophisticated, there is an
increased demand for outsourcing these tasks to managed security service providers …

Evaluating the utility of anonymized network traces for intrusion detection

K Lakkaraju, A Slagell - Proceedings of the 4th international conference …, 2008 - dl.acm.org
To intelligently create policies governing the anonymization of network logs, one must
analyze the effects of anonymization on both the security and utility of sanitized data. In this …

The network data handling war: MySQL vs. NfDump

R Hofstede, A Sperotto, T Fioreze, A Pras - Networked Services and …, 2010 - Springer
Network monitoring plays a crucial role in any network management environment.
Especially nowadays, with network speed and load constantly increasing, more and more …

iCAT+: An Interactive Customizable Anonymization Tool using Automated Translation through Deep Learning

M Oqaily, ME Kabir, S Majumdar… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Data anonymization is a viable solution for data owners to mitigate their privacy concerns.
However, existing data anonymization tools are inflexible to support various privacy and …

A multi-view approach to preserve privacy and utility in network trace anonymization

M Mohammady, M Oqaily, L Wang, Y Hong… - ACM Transactions on …, 2021 - dl.acm.org
As network security monitoring grows more sophisticated, there is an increasing need for
outsourcing such tasks to third-party analysts. However, organizations are usually reluctant …

A privacy-aware access control model for distributed network monitoring

EI Papagiannakopoulou, MN Koukovini… - Computers & Electrical …, 2013 - Elsevier
In this paper, we introduce a new access control model that aims at addressing the privacy
implications surrounding network monitoring. In fact, despite its importance, network …