Enriching network security analysis with time travel, ACM SIGCOMM Computer Communication Review, vol.38, issue.4, pp.183-194, 2008. ,
DOI : 10.1145/1402946.1402980
CVSS a complete guide to the common vulnerability scoring system version 2.0, 2007. ,
Indicators for privacy violation of internet sites, Electronic Government, pp.219-223, 2002. ,
Structuring anonymity metrics, Proceedings of the second ACM workshop on Digital identity management, pp.55-62, 2006. ,
Protecting respondents' identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, pp.1010-1027, 2001. ,
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
ldiversity: Privacy beyond k-anonymity, p.52, 2007. ,
A high-level programming environment for packet trace anonymization and transformation, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, pp.339-351, 2003. ,
DOI : 10.1145/863955.863994
Pseudonymous Audit for Privacy Enhanced Intrusion Detection, Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC'97, pp.151-163, 1997. ,
DOI : 10.1007/978-0-387-35259-6_13
IDA -An Intrusion Detection and Avoidance System, 2007. ,
The intrusion detection system aid architecture and experiences in automated autid trail analysis, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security, pp.278-290, 1996. ,
Kesdogan: Privacy enhanced intrusion detection, Multilateral Security in Communications, Information Security, pp.187-204, 1999. ,
Privacy-Respecting Intrusion Detection. 1 edn, 2007. ,
An efficient distributed intrusion detection scheme, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004., pp.39-40, 2004. ,
DOI : 10.1109/CMPSAC.2004.1342666