{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:30:45Z","timestamp":1755693045746},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"TENACE PRIN Project funded by the Italian Ministry of Education, University and Research","award":["20103P34XC"],"award-info":[{"award-number":["20103P34XC"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/tnet.2014.2309011","type":"journal-article","created":{"date-parts":[[2014,3,18]],"date-time":"2014-03-18T18:04:12Z","timestamp":1395165852000},"page":"672-686","source":"Crossref","is-referenced-by-count":9,"title":["Obfuscation of Sensitive Data for Incremental Release of Network Flows"],"prefix":"10.1109","volume":"23","author":[{"given":"Daniele","family":"Riboni","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Villani","sequence":"additional","affiliation":[]},{"given":"Domenico","family":"Vitali","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Bettini","sequence":"additional","affiliation":[]},{"given":"Luigi V.","family":"Mancini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","first-page":"13","article-title":"Detecting stepping stones","author":"zhang","year":"2000","journal-title":"Proc 9th Usenix Security Symp"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.307"},{"key":"ref30","first-page":"157","article-title":"Browser fingerprinting from coarse traffic summaries: Techniques and implications","volume":"5587","author":"yen","year":"2009","journal-title":"Proc DIMVA"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"251","DOI":"10.3233\/IDA-2010-0466","article-title":"Exploring discrepancies in findings obtained with the KDD Cup '99 data set","volume":"15","author":"engen","year":"2011","journal-title":"Intell Data Anal"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1519144.1519147"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.03.033"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330148"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529572"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989345"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162686"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1456441.1456445"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1971.223258"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6562849"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672310"},{"key":"ref27","author":"song","year":"2011","journal-title":"?Markov models for network-behavior modeling and anonymization ?"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.27"},{"key":"ref5","first-page":"339","article-title":"On Web browsing privacy in anonymized NetFlows","author":"coull","year":"2007","journal-title":"Proc Usenix Security"},{"key":"ref29","first-page":"689","article-title":"<formula formulatype=\"inline\"><tex Notation=\"TeX\">$m$<\/tex><\/formula>-invariance: Towards privacy preserving re-publication of dynamic datasets","author":"xiao","year":"2007","journal-title":"Proc ACM SIGMOD"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/nem.750"},{"key":"ref7","article-title":"Playing devil's advocate: Inferring sensitive information from anonymized network traces","author":"coull","year":"2007","journal-title":"Proc NDSS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_12"},{"key":"ref1","first-page":"43","article-title":"Circumventing IP-address pseudonymization","author":"brekne","year":"2005","journal-title":"Proc ICCCN"},{"key":"ref9","first-page":"1","article-title":"Differential privacy","volume":"4052","author":"dwork","year":"2006","journal-title":"Proceedings ICALP"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851199"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111330"},{"key":"ref21","first-page":"223","article-title":"On the complexity of optimal <formula formulatype=\"inline\"><tex Notation=\"TeX\">$k$<\/tex> <\/formula>-anonymity","author":"meyerson","year":"2004","journal-title":"Proc ACM PODS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195626"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2011.6107893"},{"key":"ref25","first-page":"63","article-title":"FLAIM: A multi-level anonymization framework for computer and network logs","author":"slagell","year":"2006","journal-title":"Proc LISA"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/7086110\/06774971.pdf?arnumber=6774971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:41:53Z","timestamp":1642005713000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6774971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":32,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2014.2309011","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4]]}}}