{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:50:45Z","timestamp":1772121045389,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,26]]},"DOI":"10.1145\/3697090.3699865","type":"proceedings-article","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T07:06:08Z","timestamp":1733900768000},"page":"188-191","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Impact of Data Anonymization in Machine Learning Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4571-6242","authenticated-orcid":false,"given":"Ivo","family":"Pimenta","sequence":"first","affiliation":[{"name":"State University of Cear\u00e1, Fortaleza, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0201-2165","authenticated-orcid":false,"given":"Douglas","family":"Silva","sequence":"additional","affiliation":[{"name":"State University of Cear\u00e1, Fortaleza, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7786-9990","authenticated-orcid":false,"given":"Evellin","family":"Moura","sequence":"additional","affiliation":[{"name":"State University of Cear\u00e1, Fortaleza, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3385-5155","authenticated-orcid":false,"given":"Matheus","family":"Silveira","sequence":"additional","affiliation":[{"name":"UBER, S\u00e3o Paulo, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7922-0695","authenticated-orcid":false,"given":"Rafael Lopes","family":"Gomes","sequence":"additional","affiliation":[{"name":"State University of Cear\u00e1, Fortaleza, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2024,12,10]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Wanderson\u00a0L Costa Ariel\u00a0LC Portela and Rafael\u00a0L Gomes. 2021. Features-aware ddos detection in heterogeneous smart environments based on fog and cloud computing. International Journal of Communication Networks and Information Security 13 3 (2021) 491\u2013498.","DOI":"10.54039\/ijcnis.v13i3.5080"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM50620.2020.9282265"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Rafael\u00a0L. Gomes Luiz\u00a0F. Bittencourt Edmundo\u00a0R.M. Madeira Eduardo Cerqueira and Mario Gerla. 2016. A combined energy-bandwidth approach to allocate resilient virtual software defined networks. Journal of Network and Computer Applications 69 (2016) 98\u2013106. 10.1016\/j.jnca.2016.02.024 https:\/\/dl.acm.org\/doi\/10.1016\/j.jnca.2016.02.024","DOI":"10.1016\/j.jnca.2016.02.024"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614097"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Xueluan Gong Yanjiao Chen Qian Wang Meng Wang and Shuyang Li. 2022. Private data inference attacks against cloud: Model technologies and research directions. IEEE Communications Magazine 60 9 (2022) 46\u201352.","DOI":"10.1109\/MCOM.004.2100867"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Ishu Gupta Ashutosh\u00a0Kumar Singh Chung-Nan Lee and Rajkumar Buyya. 2022. Secure data storage and sharing techniques for data protection in cloud environments: A systematic review analysis and future directions. IEEE Access 10 (2022) 71247\u201371277.","DOI":"10.1109\/ACCESS.2022.3188110"},{"key":"e_1_3_3_1_8_2","unstructured":"Saurav Kaushik. 2016. Introduction to feature selection methods with an example (or how to select the right variables?). Analytics Vidhya 1 (2016)."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Nickolaos Koroniotis Nour Moustafa Elena Sitnikova and Benjamin Turnbull. 2019. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems 100 (2019) 779\u2013796.","DOI":"10.1016\/j.future.2019.05.041"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Yair Meidan Michael Bohadana Yael Mathov Yisroel Mirsky Asaf Shabtai Dominik Breitenbacher and Yuval Elovici. 2018. N-baiot\u2014network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing 17 3 (2018) 12\u201322.","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369449"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154276"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Ariel\u00a0LC Portela Silvio\u00a0ESB Ribeiro Rafael\u00a0A Menezes Thelmo de Araujo and Rafael\u00a0L Gomes. 2024. T-For: An Adaptable Forecasting Model for Throughput Performance. IEEE Transactions on Network and Service Management (2024).","DOI":"10.1109\/TNSM.2024.3349701"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154280"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3569902.3570171"},{"key":"e_1_3_3_1_16_2","unstructured":"Shuhan Yuan and Xintao Wu. 2022. Trustworthy anomaly detection: A survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2202.07787 (2022)."}],"event":{"name":"LADC 2024: 13th Latin-American Symposium on Dependable and Secure Computing","location":"Recife Brazil","acronym":"LADC 2024"},"container-title":["Proceedings of the 13th Latin-American Symposium on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3697090.3699865","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3697090.3699865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:33Z","timestamp":1750295853000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3697090.3699865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,26]]},"references-count":15,"alternative-id":["10.1145\/3697090.3699865","10.1145\/3697090"],"URL":"https:\/\/doi.org\/10.1145\/3697090.3699865","relation":{},"subject":[],"published":{"date-parts":[[2024,11,26]]},"assertion":[{"value":"2024-12-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}