{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:29:35Z","timestamp":1725787775711},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/fskd.2012.6234272","type":"proceedings-article","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T19:43:25Z","timestamp":1342727005000},"page":"1066-1070","source":"Crossref","is-referenced-by-count":8,"title":["Privacy-preserving anomaly detection across multi-domain networks"],"prefix":"10.1109","author":[{"given":"Pei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaohong","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Ma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930152"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"23","article-title":"Secure multi-party computation","author":"goldreich","year":"1999","journal-title":"Theory of Cryptography Library"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1217609"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/11573937_51","article-title":"Principal component analysis for distributed data sets with updating","author":"bai","year":"2005","journal-title":"Proceedings of International Workshop on Advanced Parallel Processing Technologies (APPT)"},{"journal-title":"P3CA Private Anomaly Detection Across ISP Networks","year":"0","author":"nagaraja","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.205"},{"journal-title":"Network PCA and Anomaly Detection","year":"0","author":"huang","key":"14"},{"key":"11","first-page":"35","article-title":"Playing devil's advocate: Inferring sensitive information from anonymized network traces","author":"coull","year":"2007","journal-title":"Proceedings of the Network and Distributed System Security Symposium 2007"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177099"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2010.5560086"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"},{"key":"20","first-page":"448","article-title":"Efficient oblivious transfer protocols","author":"naor","year":"2001","journal-title":"Proceedings of 12th SIAM Symposium on Discrete Algorithms (SODA)"},{"key":"2","article-title":"Sepia: Privacy-preserving aggregation of multi-domain network events and statistics","author":"burkhart","year":"2010","journal-title":"USENIX Security Symposium"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2043628.2043632"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.27"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1269899.1254895"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062248"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080118"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028813"},{"key":"9","first-page":"22","article-title":"On the privacy risks of publishing anonymized ip network traces","author":"koukis","year":"2006","journal-title":"Proceedings of the International Conference on Communications and Multimedia Security (CMS) Volume 4237 of Lecture Notes in Computer Science"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71617-4_3"}],"event":{"name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2012,5,29]]},"location":"Chongqing, Sichuan, China","end":{"date-parts":[[2012,5,31]]}},"container-title":["2012 9th International Conference on Fuzzy Systems and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6227654\/6233707\/06234272.pdf?arnumber=6234272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:37:53Z","timestamp":1497980273000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6234272\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/fskd.2012.6234272","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}