{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:51:24Z","timestamp":1726361484426},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/seccom.2007.4550306","type":"proceedings-article","created":{"date-parts":[[2008,6,25]],"date-time":"2008-06-25T18:08:16Z","timestamp":1214417296000},"page":"49-56","source":"Crossref","is-referenced-by-count":15,"title":["SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy\/analysis tradeoffs"],"prefix":"10.1109","author":[{"given":"William","family":"Yurcik","sequence":"first","affiliation":[]},{"given":"Clay","family":"Woolam","sequence":"additional","affiliation":[]},{"given":"Greg","family":"Hellings","sequence":"additional","affiliation":[]},{"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111330"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505233"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.161"},{"journal-title":"Snort Lightweight Intrusion Detection for Networks","year":"0","author":"roesch","key":"ref13"},{"journal-title":"SCRUB-PA A Tool for Multi-Level Anonymization of Process Accounting Logs","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SECCMW.2005.1588299"},{"key":"ref16","article-title":"FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs","author":"slagell","year":"2006","journal-title":"Usenix LISA"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2006.1652097"},{"journal-title":"Tcpdump Libpcap Official Site","year":"0","key":"ref18"},{"key":"ref19","article-title":"Selecting Log Data Sources to Correlate Attack Traces For Computer Network Security: Preliminary Results","author":"yin","year":"2003","journal-title":"11th Intl Conf on Telecom Systems"},{"journal-title":"CANINE C onverter and A N onymizer for Investigating N etFlow Events","year":"0","key":"ref4"},{"key":"ref3","article-title":"Anonymization of IP Traffic Monitoring Data - Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies","author":"brekne","year":"2005","journal-title":"Workshop on Privacy Enhancing Technologies (PET)"},{"key":"ref6","article-title":"CANINE: A Combined Converter and Anonymizer Tool for Processing NetFlows for Security","author":"li","year":"2005","journal-title":"13th Intl Conf on Telecom Systems"},{"key":"ref5","article-title":"Inferring Sensitive Information from Anonymized Network Traces","author":"coull","year":"2007","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"journal-title":"Tcpdpriv","year":"0","author":"minshall","key":"ref8"},{"key":"ref7","article-title":"SCRUBPA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting","author":"luo","year":"2006","journal-title":"ACM Computing Research Repository (CoRR)"},{"journal-title":"TCPurify - &#x201C;a sanitary sniffer","year":"0","author":"blanton","key":"ref2"},{"journal-title":"Anontool","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/863993.863994"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359577"}],"event":{"name":"2007 3rd International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007","start":{"date-parts":[[2007,9,17]]},"location":"Nice, France","end":{"date-parts":[[2007,9,21]]}},"container-title":["2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543879\/4550291\/04550306.pdf?arnumber=4550306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T16:20:00Z","timestamp":1489681200000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4550306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/seccom.2007.4550306","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}