G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson et al., Enriching network security analysis with time travel, ACM SIGCOMM Computer Communication Review, vol.38, issue.4, pp.183-194, 2008.
DOI : 10.1145/1402946.1402980

P. Mell, K. Scarfone, and S. Romanosky, CVSS a complete guide to the common vulnerability scoring system version 2.0, 2007.

S. Klewitz-hommelsen, Indicators for privacy violation of internet sites, Electronic Government, pp.219-223, 2002.

S. Clauß and S. S. , Structuring anonymity metrics, Proceedings of the second ACM workshop on Digital identity management, pp.55-62, 2006.

P. S. Ti, Protecting respondents' identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, pp.1010-1027, 2001.

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, ldiversity: Privacy beyond k-anonymity, p.52, 2007.

R. Pang and V. Paxson, A high-level programming environment for packet trace anonymization and transformation, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, pp.339-351, 2003.
DOI : 10.1145/863955.863994

M. Sobirey, S. Fischer-hübner, and K. Rannenberg, Pseudonymous Audit for Privacy Enhanced Intrusion Detection, Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC'97, pp.151-163, 1997.
DOI : 10.1007/978-0-387-35259-6_13

S. Fischer-hübner, IDA -An Intrusion Detection and Avoidance System, 2007.

M. Sobirey, B. Richter, and H. König, The intrusion detection system aid architecture and experiences in automated autid trail analysis, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security, pp.278-290, 1996.

R. Büschkes and D. , Kesdogan: Privacy enhanced intrusion detection, Multilateral Security in Communications, Information Security, pp.187-204, 1999.

U. Flegel, Privacy-Respecting Intrusion Detection. 1 edn, 2007.

T. Holz, An efficient distributed intrusion detection scheme, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004., pp.39-40, 2004.
DOI : 10.1109/CMPSAC.2004.1342666