Login / Signup
The role of network trace anonymization under attack.
Martin Burkhart
Dominik Schatzmann
Brian Trammell
Elisa Boschi
Bernhard Plattner
Published in:
Comput. Commun. Rev. (2010)
Keyphrases
</>
attack graphs
attack graph
network traffic
network configuration
network model
denial of service attacks
forensic analysis
network structure
network architecture
countermeasures
privacy protection
privacy preservation
network topologies
social network data
community structure
third party
buffer overflow