Author of the publication

Obfuscation of Sensitive Data for Incremental Release of Network Flows.

, , , , and . IEEE/ACM Trans. Netw., 23 (2): 672-686 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mapping the File Systems Genome: rationales, technique, results and applications., , , and . CoRR, (2013)Relieve Internet Routing Security of Public Key Infrastructure., , , , and . ICCCN, page 1-9. IEEE, (2012)Obfuscation of Sensitive Data for Incremental Release of Network Flows., , , , and . IEEE/ACM Trans. Netw., 23 (2): 672-686 (2015)Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers., , , , , and . Int. J. Secur. Networks, 10 (3): 137-150 (2015)Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements., , , and . CRiSIS, page 1-8. IEEE Computer Society, (2013)Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers., , , , , and . CoRR, (2013)Obfuscation of sensitive data in network flows., , , , and . INFOCOM, page 2372-2380. IEEE, (2012)Replication Schemes in Unattended Wireless Sensor Networks., , and . NTMS, page 1-5. IEEE, (2011)DDoS Detection with Information Theory Metrics and Netflows - A Real Case., , , , and . SECRYPT, page 172-181. SciTePress, (2012)MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks., , , and . SRDS Workshops, page 42-51. IEEE Computer Society, (2011)