{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:14:47Z","timestamp":1766733287555,"version":"3.37.3"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Huawei R&D Center"},{"DOI":"10.13039\/501100000780","name":"EU Project PIMCity","doi-asserted-by":"publisher","award":["N. 871370"],"award-info":[{"award-number":["N. 871370"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SmartData@PoliTO center for Big Data technologies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/tnsm.2021.3057927","type":"journal-article","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T03:39:17Z","timestamp":1612928357000},"page":"1233-1245","source":"Crossref","is-referenced-by-count":4,"title":["<i>\u03b1<\/i>-MON: Traffic Anonymizer for Passive Monitoring"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7140-5940","authenticated-orcid":false,"given":"Thomas","family":"Favale","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4258-4679","authenticated-orcid":false,"given":"Martino","family":"Trevisan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1932-1261","authenticated-orcid":false,"given":"Idilio","family":"Drago","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1859-6693","authenticated-orcid":false,"given":"Marco","family":"Mellia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/863993.863994"},{"key":"ref38","first-page":"1","article-title":"A scalable system for sharing Internet measurements","author":"allman","year":"2007","journal-title":"Proc Passive Active Meas (PAM"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1901"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406957"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674991"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7258"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505233"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/863993.863994"},{"journal-title":"Encrypted Server Name Indication for TLS 1 3","year":"2019","author":"rescorla","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8484"},{"key":"ref10","article-title":"Z-anonymity: Zero-delay anonymization for data streams","author":"jha","year":"2020","journal-title":"Proc IEEE Int Conf Big Data"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255113"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497558"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.47"},{"journal-title":"Data-Plane Development Kit","year":"2020","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600756CM"},{"journal-title":"Scalable TCP session monitoring with symmetric receive-side scaling","year":"2016","author":"woo","key":"ref19"},{"journal-title":"Tcpdpriv","year":"2020","author":"minshall","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2016.7856712"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3341216.3342208"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3098593.3098602"},{"journal-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"2016","key":"ref6"},{"journal-title":"Tcpurify","year":"2008","author":"blanton","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2017.8117145"},{"article-title":"Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression","year":"1998","author":"samarati","key":"ref8"},{"key":"ref7","first-page":"280","article-title":"Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme","author":"xu","year":"2002","journal-title":"Proc IEEE Int Conf Netw Protocols (ICNP)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2597443"},{"key":"ref9","article-title":"?-MON: Anonymized passive traffic monitoring","author":"favale","year":"2020","journal-title":"Proc 32th Int Teletraffic Congr"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2933358"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505234"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2967588"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2011.5772055"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230560"},{"journal-title":"Benchmarking methodology for network interconnect devices","year":"1999","key":"ref23"},{"key":"ref26","first-page":"311","article-title":"Kids: K-anonymization data stream base on sliding window","author":"zhang","year":"2010","journal-title":"Proc IEEE Int Conf Future Comput Commun"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557079"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9450206\/09351564.pdf?arnumber=9351564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:41Z","timestamp":1652194361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9351564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":40,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3057927","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}