Attack Detection vs. Privacy - How to Find the Link or How to Hide It?
Jirí KurVashek MatyasAndriy StetskoPetr SvendaPublished in: Security Protocols Workshop (2011)
Keyphrases
- attack detection
- multistage
- privacy preserving
- intrusion detection system
- cyber attacks
- personal information
- sensitive information
- private information
- product recommendation
- privacy issues
- privacy concerns
- attack scenarios
- data privacy
- privacy preserving data mining
- privacy preservation
- anomaly detection
- security issues
- lightweight