{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T15:48:51Z","timestamp":1744904931101},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/noms.2008.4575265","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T15:17:28Z","timestamp":1221578248000},"page":"991-994","source":"Crossref","is-referenced-by-count":8,"title":["Measuring anonymization privacy\/analysis tradeoffs inherent to sharing network data"],"prefix":"10.1109","author":[{"given":"William","family":"Yurcik","sequence":"first","affiliation":[]},{"given":"Clay","family":"Woolam","sequence":"additional","affiliation":[]},{"given":"Greg","family":"Hellings","sequence":"additional","affiliation":[]},{"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359577"},{"key":"18","article-title":"future internet security services enabled by sharing of anonymized logs","author":"zhang","year":"2006","journal-title":"Workshop on Security and Privacy in Future Business Services held in conjunction with International Conference on Emerging Trends in Information and Communication Security (ETRICS)"},{"year":"0","key":"15"},{"key":"16","article-title":"scalable data management alternatives to support data mining heterogeneous logs for computer network security","author":"yurcik","year":"2003","journal-title":"SIAM Workshop on Data Mining for Counter Terrorism and Security"},{"key":"13","article-title":"selecting log data sources to correlate attack traces for computer network security: preliminary results","author":"yin","year":"2003","journal-title":"11th Intl Conf on Telecomunications"},{"year":"0","key":"14"},{"year":"0","key":"11"},{"year":"0","key":"12"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/11909033_3","article-title":"on the privacy risks of publishing anonymized ip network traces","author":"koukis","year":"2006","journal-title":"10th IFIP Open Conf on Comm and Multimedia Security (CMS)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2006.311856"},{"journal-title":"Converter and ANonymizer for Investigating NetFlow","year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SECCMW.2005.1588299"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"key":"5","article-title":"privacy vs. intrusion detection analysis","author":"lundin","year":"1999","journal-title":"Recent Advances in Intrusion Detection (RAID)"},{"key":"4","article-title":"canine: a combined converter and anonymizer tool for processing netflows for security","author":"li","year":"2005","journal-title":"13th Intl Conf on Telecomunications Systems"},{"journal-title":"A Tool for Multi-Field Multi-Level Packet Trace Anonymizaton","year":"0","key":"9"},{"journal-title":"A Tool for Multi-Level Anonymization of Process Accounting Logs","year":"0","key":"8"}],"event":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2008,4,7]]},"location":"Salvador, Bahia, Brazil","end":{"date-parts":[[2008,4,11]]}},"container-title":["NOMS 2008 - 2008 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4567164\/4575087\/04575265.pdf?arnumber=4575265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T07:46:35Z","timestamp":1497771995000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4575265\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/noms.2008.4575265","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}