2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications 2007
DOI: 10.1109/pimrc.2007.4394186
|View full text |Cite
|
Sign up to set email alerts
|

Towards Privacy-Preserving Network Monitoring: Issues and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…It is commonly known that there is no gender divide in e-business, and phenomena like the following that aim to harm women physically, psychologically, and mentally should stop appearing (Bianchi et al 2008;Hafkin and Huyer 2006).…”
Section: Pornography Trafficking Violence Against Women and Censormentioning
confidence: 99%
“…It is commonly known that there is no gender divide in e-business, and phenomena like the following that aim to harm women physically, psychologically, and mentally should stop appearing (Bianchi et al 2008;Hafkin and Huyer 2006).…”
Section: Pornography Trafficking Violence Against Women and Censormentioning
confidence: 99%
“…Our reference system for traffic anomaly detection system consists of two stages [1,2]. The first stage, referred to as front-end (FE), is in charge of tapping the wire and carrying out a preliminary per-packet analysis in real-time.…”
Section: Two-stage Traffic Anomaly Detectionmentioning
confidence: 99%
“…In terms of queueing theory, this is equivalent to considering the time to the first blocked customer in G/D/n/n system with general interarrival times, a constant service time of D = W , and n = m − 1 servers and no waiting places. 1 The actual question is if a "customer" would be blocked during the duration of a flow or not.…”
Section: Sliding Window Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…This is a privacy-enhanced architecture based on analysis of pseudonymised IF Flow Information Export (IPFLX) traffi c flows [25,26]. Using IPFIX for IDS analysis purposes has some disadvantag es.…”
Section: Related Workmentioning
confidence: 99%