{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T02:43:37Z","timestamp":1752461017394,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,8]],"date-time":"2009-03-08T00:00:00Z","timestamp":1236470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS 0524643"],"award-info":[{"award-number":["CNS 0524643"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,8]]},"DOI":"10.1145\/1529282.1529572","type":"proceedings-article","created":{"date-parts":[[2009,4,15]],"date-time":"2009-04-15T13:37:11Z","timestamp":1239802631000},"page":"1286-1293","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["A taxonomy and adversarial model for attacks against network log anonymization"],"prefix":"10.1145","author":[{"given":"Justin","family":"King","sequence":"first","affiliation":[{"name":"IBM Rochester"}]},{"given":"Kiran","family":"Lakkaraju","sequence":"additional","affiliation":[{"name":"UIUC"}]},{"given":"Adam","family":"Slagell","sequence":"additional","affiliation":[{"name":"NCSA, UIUC"}]}],"member":"320","published-online":{"date-parts":[[2009,3,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Report 2005\/049","author":"Avoine G.","year":"2005","unstructured":"Avoine , G. , \" Adversary Model for Radio Frequency Identification,\" Cryptology ePrint Archive , Report 2005\/049 , 2005 . Avoine, G., \"Adversary Model for Radio Frequency Identification,\" Cryptology ePrint Archive, Report 2005\/049, 2005."},{"key":"e_1_3_2_1_2_1","volume-title":"USENIX Security Symposium","author":"Bethencourt J.","year":"2005","unstructured":"Bethencourt , J. , Franklin , J. , Vernon , M. , \" Mapping Internet Sensors with Probe Response Attacks,\" 14 th USENIX Security Symposium , Aug. , 2005 . Bethencourt, J., Franklin, J., Vernon, M., \"Mapping Internet Sensors with Probe Response Attacks,\" 14 th USENIX Security Symposium, Aug., 2005."},{"volume-title":"Feb., 2008.","author":"Coull S.","key":"e_1_3_2_1_3_1","unstructured":"Coull , S. , Wright , C. V. , Keromytis , A. , Monrose , F. , and Reiter , M ., \" Taming the Devil: Techniques for Evaluating Anonymized Network Data,\", 15 th Network and Distributed System Security Symposium (NDSS '08) , Feb., 2008. Coull, S., Wright, C. V., Keromytis, A., Monrose, F., and Reiter, M., \"Taming the Devil: Techniques for Evaluating Anonymized Network Data,\", 15 th Network and Distributed System Security Symposium (NDSS '08), Feb., 2008."},{"volume-title":"Feb., 2007.","author":"Coull S.","key":"e_1_3_2_1_4_1","unstructured":"Coull , S. , Wright , C. V. , Monrose , F. , Collins , M. , and Reiter , M ., \" Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces,\" 14th Network and Distributed System Security Symposium (NDSS '07) , Feb., 2007. Coull, S., Wright, C. V., Monrose, F., Collins, M., and Reiter, M., \"Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces,\" 14th Network and Distributed System Security Symposium (NDSS '07), Feb., 2007."},{"volume-title":"Aug., 2007.","author":"Coull S.","key":"e_1_3_2_1_5_1","unstructured":"Coull , S. , Collins , M. , Wright , C. V. , Monrose , F. , and Reiter , M ., \" On Web Browsing Privacy in Anonymized NetFlows,\" 16 th USENIX Security Symposium , Aug., 2007. Coull, S., Collins, M., Wright, C. V., Monrose, F., and Reiter, M., \"On Web Browsing Privacy in Anonymized NetFlows,\" 16 th USENIX Security Symposium, Aug., 2007."},{"key":"e_1_3_2_1_6_1","volume-title":"Apr.","author":"King J.","year":"2008","unstructured":"King , J. , \"A Taxonomy , Model, and Method for Secure Network Log Anonymization,\" Master's Thesis , University of Illinois at Urbana-Champaign , Apr. , 2008 . King, J., \"A Taxonomy, Model, and Method for Secure Network Log Anonymization,\" Master's Thesis, University of Illinois at Urbana-Champaign, Apr., 2008."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11909033_3"},{"volume-title":"Jun., 2006.","author":"Koukis D.","key":"e_1_3_2_1_9_1","unstructured":"Koukis , D. , Antonatos , S. , Antoniades , D. , Markatos , E. , and Trimintzios , P ., \" A Generic Anonymization Framework for Network Traffic,\" IEEE International Conference on Communications (ICC '06) , Jun., 2006. Koukis, D., Antonatos, S., Antoniades, D., Markatos, E., and Trimintzios, P., \"A Generic Anonymization Framework for Network Traffic,\" IEEE International Conference on Communications (ICC '06), Jun., 2006."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460899"},{"volume-title":"Aug., 2004.","author":"Lincoln P.","key":"e_1_3_2_1_11_1","unstructured":"Lincoln , P. , Porras , P. , and Shmatikov , V ., \" Privacy-preserving Sharing and Correction of Security Alerts,\" 13 th USENIX Security Symposium , Aug., 2004. Lincoln, P., Porras, P., and Shmatikov, V., \"Privacy-preserving Sharing and Correction of Security Alerts,\" 13 th USENIX Security Symposium, Aug., 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11599371_22"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111330"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863994"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278940.1278949"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890128"},{"volume-title":"Feb., 2008.","author":"Ribeiro B.","key":"e_1_3_2_1_18_1","unstructured":"Ribeiro , B. , Chen , W. , Miklau , G. , and Towsley , D ., \" Analyzing Privacy in Enterprise Packet Trace Anonymization,\" 15 th Network and Distributed System Security Symposium (NDSS '08) , Feb., 2008. Ribeiro, B., Chen, W., Miklau, G., and Towsley, D., \"Analyzing Privacy in Enterprise Packet Trace Anonymization,\" 15 th Network and Distributed System Security Symposium (NDSS '08), Feb., 2008."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298307"},{"volume-title":"Dec., 2006.","author":"Slagell A.","key":"e_1_3_2_1_20_1","unstructured":"Slagell , A. , Lakkaraju , K. , and Luo , K ., \" FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs,\" 20 th Large Installation System Administration Conference LISA '06) , Dec., 2006. Slagell, A., Lakkaraju, K., and Luo, K., \"FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs,\" 20 th Large Installation System Administration Conference LISA '06), Dec., 2006."},{"volume-title":"Sep., 2005.","author":"Slagell A.","key":"e_1_3_2_1_21_1","unstructured":"Slagell , A. , Li , Y. , and Luo , K ., \" Sharing Network Logs for Computer Forensics: A New tool for the Anonymization of NetFlow Records,\" First Computer Network Forensics Research Workshop, held in conjunction with IEEE SecureComm , Sep., 2005. Slagell, A., Li, Y., and Luo, K., \"Sharing Network Logs for Computer Forensics: A New tool for the Anonymization of NetFlow Records,\" First Computer Network Forensics Research Workshop, held in conjunction with IEEE SecureComm, Sep., 2005."},{"volume-title":"Sep., 2005.","author":"Slagell A.","key":"e_1_3_2_1_22_1","unstructured":"Slagell , A. , and Yurcik , W ., \" Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization,\" First International Workshop on the Value of Security through Collaboration (SECOVAL '05) , Sep., 2005. Slagell, A., and Yurcik, W., \"Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization,\" First International Workshop on the Value of Security through Collaboration (SECOVAL '05), Sep., 2005."},{"volume-title":"Nov., 2002.","author":"Xu J.","key":"e_1_3_2_1_23_1","unstructured":"Xu , J. , Fan , J. , Ammar , M. , and Moon , S ., \" Prefix-preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme,\" 10 th IEEE International Conference on Network Protocols (ICNP '02) , Nov., 2002. Xu, J., Fan, J., Ammar, M., and Moon, S., \"Prefix-preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme,\" 10 th IEEE International Conference on Network Protocols (ICNP '02), Nov., 2002."},{"key":"e_1_3_2_1_24_1","volume-title":"Passive OS Fingerprinting Tool,\" www.stearns.org\/p0f\/README, viewed","author":"Zalewski M.","year":"2008","unstructured":"Zalewski , M. , and Stearns , W. , \" Passive OS Fingerprinting Tool,\" www.stearns.org\/p0f\/README, viewed Aug. 1, 2008 . Zalewski, M., and Stearns, W., \"Passive OS Fingerprinting Tool,\" www.stearns.org\/p0f\/README, viewed Aug. 1, 2008."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11919568_79"},{"volume-title":"Dec., 2007.","author":"Zhang Q.","key":"e_1_3_2_1_26_1","unstructured":"Zhang , Q. , Wang , J. , and Li , X ., \" On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme,\" International Conference on Information and Communications Security (ICICS '07) , Dec., 2007. Zhang, Q., Wang, J., and Li, X., \"On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme,\" International Conference on Information and Communications Security (ICICS '07), Dec., 2007."}],"event":{"name":"SAC09: The 2009 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Honolulu Hawaii","acronym":"SAC09"},"container-title":["Proceedings of the 2009 ACM symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1529282.1529572","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1529282.1529572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:25Z","timestamp":1750253365000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1529282.1529572"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,8]]},"references-count":26,"alternative-id":["10.1145\/1529282.1529572","10.1145\/1529282"],"URL":"https:\/\/doi.org\/10.1145\/1529282.1529572","relation":{},"subject":[],"published":{"date-parts":[[2009,3,8]]},"assertion":[{"value":"2009-03-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}