Search dblp for Publications

export results for "privacy intrusion"

 download as .bib file

@article{DBLP:journals/adhoc/BukhariZHMMMS24,
  author       = {Syed Muhammad Salman Bukhari and
                  Muhammad Hamza Zafar and
                  Mohamad Abou Houran and
                  Syed Kumayl Raza Moosavi and
                  Majad Mansoor and
                  Muhammad Muaaz and
                  Filippo Sanfilippo},
  title        = {Secure and privacy-preserving intrusion detection in wireless sensor
                  networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability},
  journal      = {Ad Hoc Networks},
  volume       = {155},
  pages        = {103407},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103407},
  doi          = {10.1016/J.ADHOC.2024.103407},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/BukhariZHMMMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/DuY24,
  author       = {Jiawei Du and
                  Kai Yang},
  title        = {{NIDS-FLGDP:} Network Intrusion Detection Algorithm Based on Gaussian
                  Differential Privacy Federated Learning},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {33},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1142/s0218126624500488},
  doi          = {10.1142/S0218126624500488},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsc/DuY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/VigneshSK24,
  author       = {M. Ragul Vignesh and
                  K. Srihari and
                  S. Karthik},
  title        = {Privacy-preserving intrusion detection in Internet of medical things
                  neural networks using a novel recurrent U-Net auto-encoder algorithm
                  for biomedical applications},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {46},
  number       = {2},
  pages        = {4093--4104},
  year         = {2024},
  url          = {https://doi.org/10.3233/jifs-234441},
  doi          = {10.3233/JIFS-234441},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/VigneshSK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-07343,
  author       = {Shakil Ibne Ahsan and
                  Phil Legg and
                  S. M. Iftekharul Alam},
  title        = {Privacy-Preserving Intrusion Detection in Software-defined {VANET}
                  using Federated Learning with {BERT}},
  journal      = {CoRR},
  volume       = {abs/2401.07343},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.07343},
  doi          = {10.48550/ARXIV.2401.07343},
  eprinttype    = {arXiv},
  eprint       = {2401.07343},
  timestamp    = {Thu, 01 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-07343.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/datascience/LiSS23,
  author       = {Junzhou Li and
                  Qianhui Sun and
                  Feixian Sun},
  title        = {Enhancing Privacy-Preserving Intrusion Detection in Blockchain-Based
                  Networks with Deep Learning},
  journal      = {Data Sci. J.},
  volume       = {22},
  year         = {2023},
  url          = {https://doi.org/10.5334/dsj-2023-031},
  doi          = {10.5334/DSJ-2023-031},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/datascience/LiSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ida/WuZ23,
  author       = {Weifei Wu and
                  Yanhui Zhang},
  title        = {An efficient intrusion detection method using federated transfer learning
                  and support vector machine with privacy-preserving},
  journal      = {Intell. Data Anal.},
  volume       = {27},
  number       = {4},
  pages        = {1121--1141},
  year         = {2023},
  url          = {https://doi.org/10.3233/IDA-226617},
  doi          = {10.3233/IDA-226617},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ida/WuZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/CeldranSFBPS23,
  author       = {Alberto Huertas Celdr{\'{a}}n and
                  Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and
                  Chao Feng and
                  G{\'{e}}r{\^{o}}me Bovet and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Burkhard Stiller},
  title        = {Privacy-Preserving and Syscall-Based Intrusion Detection System for
                  IoT Spectrum Sensors Affected by Data Falsification Attacks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {10},
  pages        = {8408--8415},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3213889},
  doi          = {10.1109/JIOT.2022.3213889},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/CeldranSFBPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcomps/TruongL23,
  author       = {Vu Tuan Truong and
                  Long Bao Le},
  title        = {MetaCIDS: Privacy-Preserving Collaborative Intrusion Detection for
                  Metaverse based on Blockchain and Online Federated Learning},
  journal      = {{IEEE} Open J. Comput. Soc.},
  volume       = {4},
  pages        = {253--266},
  year         = {2023},
  url          = {https://doi.org/10.1109/OJCS.2023.3312299},
  doi          = {10.1109/OJCS.2023.3312299},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ojcomps/TruongL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/patterns/HoussiauSRSM23,
  author       = {Florimond Houssiau and
                  Piotr Sapiezynski and
                  Laura Radaelli and
                  Erez Shmueli and
                  Yves{-}Alexandre de Montjoye},
  title        = {Detrimental network effects in privacy: {A} graph-theoretic model
                  for node-based intrusions},
  journal      = {Patterns},
  volume       = {4},
  number       = {1},
  pages        = {100662},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.patter.2022.100662},
  doi          = {10.1016/J.PATTER.2022.100662},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/patterns/HoussiauSRSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/NtizikiraWASL23,
  author       = {Ernest Ntizikira and
                  Lei Wang and
                  Fahad Alblehai and
                  Kiran Saleem and
                  Muhammad Ali Lodhi},
  title        = {Secure and Privacy-Preserving Intrusion Detection and Prevention in
                  the Internet of Unmanned Aerial Vehicles},
  journal      = {Sensors},
  volume       = {23},
  number       = {19},
  pages        = {8077},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23198077},
  doi          = {10.3390/S23198077},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/NtizikiraWASL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/AlcazarSCGRBS23,
  author       = {Pedro Ruzafa Alcazar and
                  Pablo Fern{\'{a}}ndez Saura and
                  Enrique M{\'{a}}rmol Campos and
                  Aurora Gonz{\'{a}}lez{-}Vidal and
                  Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and
                  Jorge Bernal Bernab{\'{e}} and
                  Antonio F. Skarmeta},
  title        = {Intrusion Detection Based on Privacy-Preserving Federated Learning
                  for the Industrial IoT},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {2},
  pages        = {1145--1154},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2021.3126728},
  doi          = {10.1109/TII.2021.3126728},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/AlcazarSCGRBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdc/AgbajeAMHNO23,
  author       = {Paul Agbaje and
                  Afia Anjum and
                  Arkajyoti Mitra and
                  Sena Hounsinou and
                  Ebelechukwu Nwafor and
                  Habeeb Olufowobi},
  title        = {Privacy-Preserving Intrusion Detection System for Internet of Vehicles
                  using Split Learning},
  booktitle    = {Proceedings of the {IEEE/ACM} 10th International Conference on Big
                  Data Computing, Applications and Technologies, {BDCAT} 2023, Taormina
                  (Messina), Italy, December 4-7, 2023},
  pages        = {07:1--07:8},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3632366.3632388},
  doi          = {10.1145/3632366.3632388},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bdc/AgbajeAMHNO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/TaslimasaDNXIRG23,
  author       = {Hamideh Taslimasa and
                  Sajjad Dadkhah and
                  Euclides Carlos Pinto Neto and
                  Pulei Xiong and
                  Shahrear Iqbal and
                  Suprio Ray and
                  Ali A. Ghorbani},
  title        = {ImageFed: Practical Privacy Preserving Intrusion Detection System
                  for In-Vehicle {CAN} Bus Protocol},
  booktitle    = {9th Intl Conference on Big Data Security on Cloud, BigDataSecurity,
                  {IEEE} Intl Conference on High Performance and Smart Computing, {HPSC}
                  and {IEEE} Intl Conference on Intelligent Data and Security {IDS}
                  2023, New York, NY, USA, May 6-8, 2023},
  pages        = {122--129},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS58521.2023.00031},
  doi          = {10.1109/BIGDATASECURITY-HPSC-IDS58521.2023.00031},
  timestamp    = {Fri, 09 Jun 2023 15:18:15 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/TaslimasaDNXIRG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codit/ChaabeneAJRAC23,
  author       = {Riadh Ben Chaabene and
                  Darine Ameyed and
                  Fehmi Jaafar and
                  Alexis Roger and
                  Esma A{\"{\i}}meur and
                  Mohamed Cheriet},
  title        = {A Privacy-Preserving Federated Learning for IoT Intrusion Detection
                  System},
  booktitle    = {9th International Conference on Control, Decision and Information
                  Technologies, CoDIT 2023, Rome, Italy, July 3-6, 2023},
  pages        = {351--356},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CoDIT58514.2023.10284221},
  doi          = {10.1109/CODIT58514.2023.10284221},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codit/ChaabeneAJRAC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/SiachosKPGK23,
  author       = {Ioannis Siachos and
                  Konstantinos Kaltakis and
                  Konstantina Papachristopoulou and
                  Ioannis Giannoulakis and
                  Emmanouil Kafetzakis},
  title        = {Comparison of Machine Learning Algorithms Trained Under Differential
                  Privacy for Intrusion Detection Systems},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023},
  pages        = {654--658},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSR57506.2023.10225010},
  doi          = {10.1109/CSR57506.2023.10225010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/SiachosKPGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/ManwaringT23,
  author       = {Derek Manwaring and
                  Geetha Thamilarasu},
  editor       = {Irfan Awan and
                  Muhammad Younas and
                  Markus Aleksy},
  title        = {Defense Guild: {A} Privacy-preserving Intrusion Detection System for
                  Healthcare Data in Cloud},
  booktitle    = {10th International Conference on Future Internet of Things and Cloud,
                  FiCloud 2023, Marrakesh, Morocco, August 14-16, 2023},
  pages        = {52--57},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/FiCloud58648.2023.00016},
  doi          = {10.1109/FICLOUD58648.2023.00016},
  timestamp    = {Thu, 04 Apr 2024 15:39:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ficloud/ManwaringT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3i/WankhedeVPMBM23,
  author       = {Hansaraj Shalikram Wankhede and
                  R. Venkatesh and
                  Sumit Pundir and
                  Ravikiran Madala and
                  Kamunuri Ganapathi Babu and
                  Badepally Mallaiah},
  title        = {Real-Time Innovation in Future Generation Security for Data Privacy
                  Intrusion System in Machine Learning Approach},
  booktitle    = {6th International Conference on Contemporary Computing and Informatics,
                  {IC3I} 2023, Gautam Buddha Nagar, India, September 14-16, 2023},
  pages        = {1416--1421},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IC3I59117.2023.10397738},
  doi          = {10.1109/IC3I59117.2023.10397738},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic3i/WankhedeVPMBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/AbhijitHBPS23,
  author       = {Chunduru Sri Abhijit and
                  Rishav Himmatramka and
                  Aum Shiva Rama Bishoyi and
                  Lallith Prasath and
                  T. Subbulakshmi},
  title        = {Privacy-Preserving Network Intrusion Detection using Federated Learning},
  booktitle    = {14th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCNT56998.2023.10307648},
  doi          = {10.1109/ICCCNT56998.2023.10307648},
  timestamp    = {Thu, 30 Nov 2023 16:40:53 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/AbhijitHBPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/IhekoronyeKL23,
  author       = {Vivian Ukamaka Ihekoronye and
                  Dong{-}Seong Kim and
                  Jae Min Lee},
  title        = {Federated Learning with Differential Privacy for Intrusion Detection
                  in Internet of Flying Things: {A} Robust Approach},
  booktitle    = {14th International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2023, Jeju Island, Korea, Republic of, October
                  11-13, 2023},
  pages        = {932--937},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICTC58733.2023.10392902},
  doi          = {10.1109/ICTC58733.2023.10392902},
  timestamp    = {Tue, 13 Feb 2024 21:32:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ictc/IhekoronyeKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotsms/BensaidLS23,
  author       = {Radjaa Bensaid and
                  Nabila Labraoui and
                  Haythem Bany Salameh},
  editor       = {Muhannad Quwaider and
                  Yaser Jararweh},
  title        = {Federated Deep Learning-based Intrusion Detection Approach for Enhancing
                  Privacy in Fog-IoT Networks},
  booktitle    = {10th International Conference on Internet of Things: Systems, Management
                  and Security, {IOTSMS} 2023, San Antonio, TX, USA, October 23-25,
                  2023},
  pages        = {156--160},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IOTSMS59855.2023.10325826},
  doi          = {10.1109/IOTSMS59855.2023.10325826},
  timestamp    = {Sat, 09 Dec 2023 09:49:48 +0100},
  biburl       = {https://dblp.org/rec/conf/iotsms/BensaidLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/MohanrajS23,
  title        = {{RETRACTED} {ARTICLE:} Security and privacy issue in multi-cloud accommodating
                  Intrusion Detection System},
  journal      = {Distributed Parallel Databases},
  volume       = {41},
  number       = {1-2},
  pages        = {155},
  year         = {2023},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s10619-021-07338-x},
  doi          = {10.1007/S10619-021-07338-X},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dpd/MohanrajS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/RadhaK22,
  author       = {D. Radha and
                  M. G. Kavitha},
  title        = {Deep Learning Enabled Privacy Preserving Techniques for Intrusion
                  Detection Systems in the Industrial Internet of Things},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {52},
  number       = {3-4},
  pages        = {223--247},
  year         = {2022},
  url          = {https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-52-number-3-4-2022/20595-2/},
  timestamp    = {Sat, 25 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/RadhaK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/DeviM22,
  author       = {K. Devi and
                  Balaubramanian Muthusenthil},
  title        = {Intrusion detection framework for securing privacy attack in cloud
                  computing environment using {DCCGAN-RFOA}},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {33},
  number       = {9},
  year         = {2022},
  url          = {https://doi.org/10.1002/ett.4561},
  doi          = {10.1002/ETT.4561},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/DeviM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AwanDAR22,
  author       = {Kamran Ahmad Awan and
                  Ikram Ud Din and
                  Ahmad Almogren and
                  Joel J. P. C. Rodrigues},
  title        = {AutoTrust: {A} privacy-enhanced trust-based intrusion detection approach
                  for internet of smart things},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {137},
  pages        = {288--301},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.07.026},
  doi          = {10.1016/J.FUTURE.2022.07.026},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/AwanDAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenZY22,
  author       = {Yang Chen and
                  Junzhe Zhang and
                  Chai Kiat Yeo},
  title        = {Privacy-preserving knowledge transfer for intrusion detection with
                  federated deep autoencoding gaussian mixture model},
  journal      = {Inf. Sci.},
  volume       = {609},
  pages        = {1204--1220},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.07.104},
  doi          = {10.1016/J.INS.2022.07.104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChenZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csci/EzeluB22,
  author       = {Chukwuebuka Ezelu and
                  Ulrich Buehler},
  title        = {Privacy-Preserving Collaborative Intrusion Detection Systems: {A}
                  Federated Learning Framework},
  booktitle    = {International Conference on Computational Science and Computational
                  Intelligence, {CSCI} 2022, Las Vegas, NV, USA, December 14-16, 2022},
  pages        = {1076--1079},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSCI58124.2022.00190},
  doi          = {10.1109/CSCI58124.2022.00190},
  timestamp    = {Mon, 22 Apr 2024 15:12:51 +0200},
  biburl       = {https://dblp.org/rec/conf/csci/EzeluB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec4europe/SauraGBS22,
  author       = {Pablo Fern{\'{a}}ndez Saura and
                  Juan Francisco Mart{\'{\i}}nez Gil and
                  Jorge Bernal Bernab{\'{e}} and
                  Antonio F. Skarmeta},
  editor       = {Antonio F. Skarmeta and
                  Daniele Canavese and
                  Antonio Lioy and
                  Sara Nieves Matheu},
  title        = {Privacy-Preserving Cyber Threat Information Sharing Leveraging FL-Based
                  Intrusion Detection in the Financial Sector},
  booktitle    = {Digital Sovereignty in Cyber Security: New Challenges in Future Vision
                  - First International Workshop, CyberSec4Europe 2022, Venice, Italy,
                  April 17-21, 2022, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1807},
  pages        = {50--64},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36096-1\_4},
  doi          = {10.1007/978-3-031-36096-1\_4},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec4europe/SauraGBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincom/EliasCOSNJB22,
  author       = {Erik Miguel de Elias and
                  Vinicius Sanches Carriel and
                  Guilherme Werneck de Oliveira and
                  Aldri Luiz dos Santos and
                  Michele Nogueira and
                  Roberto Hirata Junior and
                  Daniel Mac{\^{e}}do Batista},
  editor       = {Igor M. Moraes and
                  Miguel Elias M. Campista and
                  Yacine Ghamri{-}Doudane and
                  Lu{\'{\i}}s Henrique M. K. Costa and
                  Marcelo G. Rubinstein},
  title        = {A Hybrid {CNN-LSTM} Model for IIoT Edge Privacy-Aware Intrusion Detection},
  booktitle    = {{IEEE} Latin-American Conference on Communications, {LATINCOM} 2022,
                  Rio de Janeiro, Brazil, November 30 - Dec. 2, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/LATINCOM56090.2022.10000468},
  doi          = {10.1109/LATINCOM56090.2022.10000468},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincom/EliasCOSNJB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/LiH22,
  author       = {Simin Li and
                  Mu Han},
  editor       = {Yuan Xu and
                  Hongyang Yan and
                  Huang Teng and
                  Jun Cai and
                  Jin Li},
  title        = {Priv-IDS: {A} Privacy Protection and Intrusion Detection Framework
                  for In-Vehicle Network},
  booktitle    = {Machine Learning for Cyber Security - 4th International Conference,
                  {ML4CS} 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13656},
  pages        = {165--179},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20099-1\_14},
  doi          = {10.1007/978-3-031-20099-1\_14},
  timestamp    = {Mon, 30 Jan 2023 08:02:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/LiH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/KhanPKKHNA21,
  author       = {Izhar Ahmed Khan and
                  Dechang Pi and
                  Nasrullah Khan and
                  Zaheer Ullah Khan and
                  Yasir Hussain and
                  Asif Nawaz and
                  Farman Ali},
  title        = {A privacy-conserving framework based intrusion detection method for
                  detecting and recognizing malicious behaviours in cyber-physical power
                  networks},
  journal      = {Appl. Intell.},
  volume       = {51},
  number       = {10},
  pages        = {7306--7321},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10489-021-02222-8},
  doi          = {10.1007/S10489-021-02222-8},
  timestamp    = {Sun, 30 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/KhanPKKHNA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/XuLWLG21,
  author       = {Mengfan Xu and
                  Xinghua Li and
                  Yunwei Wang and
                  Bin Luo and
                  Jingjing Guo},
  title        = {Privacy-preserving multisource transfer learning in intrusion detection
                  system},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.3957},
  doi          = {10.1002/ETT.3957},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/XuLWLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SinghM21,
  author       = {Neeraj Kumar Singh and
                  Vasundhara Mahajan},
  title        = {End-User Privacy Protection Scheme from cyber intrusion in smart grid
                  advanced metering infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100410},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100410},
  doi          = {10.1016/J.IJCIP.2021.100410},
  timestamp    = {Thu, 10 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SinghM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SpathoulasTD21,
  author       = {Georgios P. Spathoulas and
                  Georgios Theodoridis and
                  Georgios{-}Paraskevas Damiris},
  title        = {Using homomorphic encryption for privacy-preserving clustering of
                  intrusion detection alerts},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {3},
  pages        = {347--370},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-020-00506-7},
  doi          = {10.1007/S10207-020-00506-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SpathoulasTD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/HanCM21,
  author       = {Mu Han and
                  Pengzhou Cheng and
                  Shidian Ma},
  title        = {PPM-InVIDS: Privacy protection model for in-vehicle intrusion detection
                  system based complex-valued neural network},
  journal      = {Veh. Commun.},
  volume       = {31},
  pages        = {100374},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.vehcom.2021.100374},
  doi          = {10.1016/J.VEHCOM.2021.100374},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/HanCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/MokrySBQGCCN21,
  author       = {Laylon Mokry and
                  Paul Slife and
                  Patrick Bishop and
                  Jose Quiroz and
                  Cooper Guzzi and
                  Zhiyuan Chen and
                  Adina Crainiceanu and
                  Don Needham},
  editor       = {Yixin Chen and
                  Heiko Ludwig and
                  Yicheng Tu and
                  Usama M. Fayyad and
                  Xingquan Zhu and
                  Xiaohua Hu and
                  Suren Byna and
                  Xiong Liu and
                  Jianping Zhang and
                  Shirui Pan and
                  Vagelis Papalexakis and
                  Jianwu Wang and
                  Alfredo Cuzzocrea and
                  Carlos Ordonez},
  title        = {Efficient and Privacy-Preserving Collaborative Intrusion Detection
                  Using Additive Secret Sharing and Differential Privacy},
  booktitle    = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando,
                  FL, USA, December 15-18, 2021},
  pages        = {3324--3333},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigData52589.2021.9671428},
  doi          = {10.1109/BIGDATA52589.2021.9671428},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/MokrySBQGCCN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/KumarTG21,
  author       = {Prabhat Kumar and
                  Rakesh Tripathi and
                  Govind P. Gupta},
  title        = {{P2IDF:} {A} Privacy-Preserving based Intrusion Detection Framework
                  for Software Defined Internet of Things-Fog (SDIoT-Fog)},
  booktitle    = {{ICDCN} '21: International Conference on Distributed Computing and
                  Networking, Virtual Event, Nara, Japan, January 5-8, 2021, Adjunct
                  Volume},
  pages        = {37--42},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3427477.3429989},
  doi          = {10.1145/3427477.3429989},
  timestamp    = {Mon, 17 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcn/KumarTG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ShiGLYL21,
  author       = {Jibo Shi and
                  Bin Ge and
                  Yang Liu and
                  Yu Yan and
                  Shuang Li},
  title        = {Data Privacy Security Guaranteed Network Intrusion Detection System
                  Based on Federated Learning},
  booktitle    = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484545},
  doi          = {10.1109/INFOCOMWKSHPS51825.2021.9484545},
  timestamp    = {Fri, 23 Jul 2021 09:24:13 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ShiGLYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/DuyHCP21,
  author       = {Phan The Duy and
                  Huynh Nhat Hao and
                  Huynh Minh Chu and
                  Van{-}Hau Pham},
  editor       = {Min Yang and
                  Chao Chen and
                  Yang Liu},
  title        = {A Secure and Privacy Preserving Federated Learning Approach for IoT
                  Intrusion Detection System},
  booktitle    = {Network and System Security - 15th International Conference, {NSS}
                  2021, Tianjin, China, October 23, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13041},
  pages        = {353--368},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92708-0\_23},
  doi          = {10.1007/978-3-030-92708-0\_23},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/DuyHCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/Shi0ZY21,
  author       = {Jibo Shi and
                  Yun Lin and
                  Zherui Zhang and
                  Shui Yu},
  title        = {A Hybrid Intrusion Detection System Based on Machine Learning under
                  Differential Privacy Protection},
  booktitle    = {94th {IEEE} Vehicular Technology Conference, {VTC} Fall 2021, Norman,
                  OK, USA, September 27-30, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VTC2021-Fall52928.2021.9625540},
  doi          = {10.1109/VTC2021-FALL52928.2021.9625540},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/Shi0ZY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-09878,
  author       = {Ajesh Koyatan Chathoth and
                  Abhyuday Jagannatha and
                  Stephen Lee},
  title        = {Federated Intrusion Detection for IoT with Heterogeneous Cohort Privacy},
  journal      = {CoRR},
  volume       = {abs/2101.09878},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.09878},
  eprinttype    = {arXiv},
  eprint       = {2101.09878},
  timestamp    = {Sat, 30 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-09878.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-06765,
  author       = {Stanislav Abaimov},
  title        = {Towards a Privacy-preserving Deep Learning-based Network Intrusion
                  Detection in Data Distribution Services},
  journal      = {CoRR},
  volume       = {abs/2106.06765},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.06765},
  eprinttype    = {arXiv},
  eprint       = {2106.06765},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-06765.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-02362,
  author       = {Jyoti Fakirah and
                  Lauhim Mahfuz Zishan and
                  Roshni Mooruth and
                  Michael N. Johnstone and
                  Wencheng Yang},
  title        = {A Low-Cost Machine Learning Based Network Intrusion Detection System
                  with Data Privacy Preservation},
  journal      = {CoRR},
  volume       = {abs/2107.02362},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.02362},
  eprinttype    = {arXiv},
  eprint       = {2107.02362},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-02362.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/KimP20,
  author       = {Jinsu Kim and
                  Namje Park},
  title        = {A Face Image Virtualization Mechanism for Privacy Intrusion Prevention
                  in Healthcare Video Surveillance Systems},
  journal      = {Symmetry},
  volume       = {12},
  number       = {6},
  pages        = {891},
  year         = {2020},
  url          = {https://doi.org/10.3390/sym12060891},
  doi          = {10.3390/SYM12060891},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/KimP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ChenQCHMH20,
  author       = {Min Chen and
                  Yongfeng Qian and
                  Jing Chen and
                  Kai Hwang and
                  Shiwen Mao and
                  Long Hu},
  title        = {Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical
                  Data Sharing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {8},
  number       = {4},
  pages        = {1274--1283},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCC.2016.2617382},
  doi          = {10.1109/TCC.2016.2617382},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/ChenQCHMH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blackseecom/Al-MarriCA20,
  author       = {Noor Ali Al{-}Athba Al{-}Marri and
                  Bekir Sait Ciftler and
                  Mohamed M. Abdallah},
  title        = {Federated Mimic Learning for Privacy Preserving Intrusion Detection},
  booktitle    = {{IEEE} International Black Sea Conference on Communications and Networking,
                  BlackSeaCom 2020, Odessa, Ukraine, May 26-29, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BlackSeaCom48709.2020.9234959},
  doi          = {10.1109/BLACKSEACOM48709.2020.9234959},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blackseecom/Al-MarriCA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/SaharkhizanAHDPS20,
  author       = {Mahdis Saharkhizan and
                  Amin Azmoodeh and
                  Hamed HaddadPajouh and
                  Ali Dehghantanha and
                  Reza M. Parizi and
                  Gautam Srivastava},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha},
  title        = {A Hybrid Deep Generative Local Metric Learning Method for Intrusion
                  Detection},
  booktitle    = {Handbook of Big Data Privacy},
  pages        = {343--357},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38557-6\_16},
  doi          = {10.1007/978-3-030-38557-6\_16},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/SaharkhizanAHDPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-06974,
  author       = {Noor Ali Al{-}Athba Al{-}Marri and
                  Bekir Sait Ciftler and
                  Mohamed M. Abdallah},
  title        = {Federated Mimic Learning for Privacy Preserving Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/2012.06974},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.06974},
  eprinttype    = {arXiv},
  eprint       = {2012.06974},
  timestamp    = {Sat, 02 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-06974.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/GiftyBK19,
  author       = {Gifty R. and
                  Bharathi R. and
                  Krishnakumar P.},
  title        = {Privacy and security of big data in cyber physical systems using Weibull
                  distribution-based intrusion detection},
  journal      = {Neural Comput. Appl.},
  volume       = {31},
  number       = {{S-1}},
  pages        = {23--34},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00521-018-3635-6},
  doi          = {10.1007/S00521-018-3635-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/GiftyBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/AlaqraW19,
  author       = {Ala Sarah Alaqra and
                  Erik W{\"{a}}stlund},
  editor       = {Abbas Moallem},
  title        = {Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives
                  and Sharing Behaviors},
  booktitle    = {{HCI} for Cybersecurity, Privacy and Trust - First International Conference,
                  {HCI-CPT} 2019, Held as Part of the 21st {HCI} International Conference,
                  {HCII} 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11594},
  pages        = {355--370},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22351-9\_24},
  doi          = {10.1007/978-3-030-22351-9\_24},
  timestamp    = {Wed, 17 Jul 2019 11:08:48 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/AlaqraW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsca/ChewOWP19,
  author       = {Yee Jian Chew and
                  Shih Yin Ooi and
                  Kok{-}Seng Wong and
                  Ying{-}Han Pang},
  title        = {Privacy Preserving of {IP} Address through Truncation Method in Network-based
                  Intrusion Detection System},
  booktitle    = {Proceedings of the 8th International Conference on Software and Computer
                  Applications, {ICSCA} '19, Penang, Malaysia, February 19-21, 2019},
  pages        = {569--573},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3316615.3316626},
  doi          = {10.1145/3316615.3316626},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsca/ChewOWP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/SgaglioneCDMRCS19,
  author       = {Luigi Sgaglione and
                  Luigi Coppolino and
                  Salvatore D'Antonio and
                  Giovanni Mazzeo and
                  Luigi Romano and
                  Domenico Cotroneo and
                  Andrea Scognamiglio},
  editor       = {Sumitra Reddy},
  title        = {Privacy Preserving Intrusion Detection Via Homomorphic Encryption},
  booktitle    = {28th {IEEE} International Conference on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises, {WETICE} 2019, Naples, Italy, June
                  12-14, 2019},
  pages        = {321--326},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WETICE.2019.00073},
  doi          = {10.1109/WETICE.2019.00073},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wetice/SgaglioneCDMRCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/BernieriP19,
  author       = {Giuseppe Bernieri and
                  Federica Pascucci},
  editor       = {Cristina Alcaraz},
  title        = {Improving Security in Industrial Internet of Things: {A} Distributed
                  Intrusion Detection Methodology},
  booktitle    = {Security and Privacy Trends in the Industrial Internet of Things},
  pages        = {161--179},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12330-7\_8},
  doi          = {10.1007/978-3-030-12330-7\_8},
  timestamp    = {Thu, 23 May 2019 15:32:42 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/BernieriP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/WangMLLLX18,
  author       = {Yu Wang and
                  Weizhi Meng and
                  Wenjuan Li and
                  Jin Li and
                  Waixi Liu and
                  Yang Xiang},
  title        = {A fog-based privacy-preserving approach for distributed signature-based
                  intrusion detection},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {122},
  pages        = {26--35},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jpdc.2018.07.013},
  doi          = {10.1016/J.JPDC.2018.07.013},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/WangMLLLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WuLZ18,
  author       = {Hongchen Wu and
                  Mingyang Li and
                  Huaxiang Zhang},
  title        = {{UISTD:} {A} Trust-Aware Model for Diverse Item Personalization in
                  Social Sensing with Lower Privacy Intrusion},
  journal      = {Sensors},
  volume       = {18},
  number       = {12},
  pages        = {4383},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18124383},
  doi          = {10.3390/S18124383},
  timestamp    = {Sat, 29 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/WuLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsipn/0011Z18,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  title        = {Distributed Privacy-Preserving Collaborative Intrusion Detection Systems
                  for VANETs},
  journal      = {{IEEE} Trans. Signal Inf. Process. over Networks},
  volume       = {4},
  number       = {1},
  pages        = {148--161},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSIPN.2018.2801622},
  doi          = {10.1109/TSIPN.2018.2801622},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsipn/0011Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-09007,
  author       = {Laura Radaelli and
                  Piotr Sapiezynski and
                  Florimond Houssiau and
                  Erez Shmueli and
                  Yves{-}Alexandre de Montjoye},
  title        = {Quantifying Surveillance in the Networked Age: Node-based Intrusions
                  and Group Privacy},
  journal      = {CoRR},
  volume       = {abs/1803.09007},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.09007},
  eprinttype    = {arXiv},
  eprint       = {1803.09007},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-09007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-09160,
  author       = {Junaid Arshad and
                  Muhammad Ajmal Azad and
                  Khaled Salah and
                  Wei Jie and
                  Razi Iqbal and
                  Mamoun Alazab},
  title        = {A Review of Performance, Energy and Privacy of Intrusion Detection
                  Systems for IoT},
  journal      = {CoRR},
  volume       = {abs/1812.09160},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.09160},
  eprinttype    = {arXiv},
  eprint       = {1812.09160},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-09160.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinDRZ18,
  author       = {Chenglu Jin and
                  Marten van Dijk and
                  Michael K. Reiter and
                  Haibin Zhang},
  title        = {PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1171},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinDRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csr/NiksefatKS17,
  author       = {Salman Niksefat and
                  Parisa Kaghazgaran and
                  Babak Sadeghiyan},
  title        = {Privacy issues in intrusion detection systems: {A} taxonomy, survey
                  and future directions},
  journal      = {Comput. Sci. Rev.},
  volume       = {25},
  pages        = {69--78},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cosrev.2017.07.001},
  doi          = {10.1016/J.COSREV.2017.07.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csr/NiksefatKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhuJM17,
  author       = {Sencun Zhu and
                  Kevin I. Jones and
                  Leandros A. Maglaras},
  title        = {Vulnerability Analysis, Intrusion Detection and Privacy Preservation
                  of Modern Communication Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {12},
  pages        = {e1},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.28-12-2017.153514},
  doi          = {10.4108/EAI.28-12-2017.153514},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhuJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CanardDKPS17,
  author       = {S{\'{e}}bastien Canard and
                  A{\"{\i}}da Diop and
                  Nizar Kheir and
                  Marie Paindavoine and
                  Mohamed Sabt},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection
                  System over Encrypted Traffic},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {561--574},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053013},
  doi          = {10.1145/3052973.3053013},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CanardDKPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/WangXLML17,
  author       = {Yu Wang and
                  Lin Xie and
                  Wenjuan Li and
                  Weizhi Meng and
                  Jin Li},
  editor       = {Sheng Wen and
                  Wei Wu and
                  Aniello Castiglione},
  title        = {A Privacy-Preserving Framework for Collaborative Intrusion Detection
                  Networks Through Fog Computing},
  booktitle    = {Cyberspace Safety and Security - 9th International Symposium, {CSS}
                  2017, Xi'an, China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10581},
  pages        = {267--279},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69471-9\_20},
  doi          = {10.1007/978-3-319-69471-9\_20},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/WangXLML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/JinHD17,
  author       = {Richeng Jin and
                  Xiaofan He and
                  Huaiyu Dai},
  title        = {On the Tradeoff between Privacy and Utility in Collaborative Intrusion
                  Detection Systems-A Game Theoretical Approach},
  booktitle    = {Proceedings of the Hot Topics in Science of Security: Symposium and
                  Bootcamp, HoTSoS 2017, Hanover, MD, USA, April 4-5, 2017},
  pages        = {45--51},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055305.3055311},
  doi          = {10.1145/3055305.3055311},
  timestamp    = {Tue, 06 Nov 2018 16:57:27 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/JinHD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcis/KeshkMSC17,
  author       = {Marwa Keshk and
                  Nour Moustafa and
                  Elena Sitnikova and
                  Gideon Creech},
  title        = {Privacy preservation intrusion detection technique for {SCADA} systems},
  booktitle    = {2017 Military Communications and Information Systems Conference, MilCIS
                  2017, Canberra, Australia, November 14-16, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MilCIS.2017.8190422},
  doi          = {10.1109/MILCIS.2017.8190422},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcis/KeshkMSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-02828,
  author       = {Marwa Keshk and
                  Nour Moustafa and
                  Elena Sitnikova and
                  Gideon Creech},
  title        = {Privacy Preservation Intrusion Detection Technique for {SCADA} Systems},
  journal      = {CoRR},
  volume       = {abs/1711.02828},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.02828},
  eprinttype    = {arXiv},
  eprint       = {1711.02828},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-02828.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfn/Golling0R16,
  author       = {Mario Golling and
                  Robert Koch and
                  Gabi Dreo Rodosek},
  editor       = {Paul M{\"{u}}ller and
                  Bernhard Neumair and
                  Helmut Reiser and
                  Gabi Dreo Rodosek},
  title        = {Privacy-aware intrusion detection in high-speed backbone networks
                  - design and prototypical implementation of a multi-layered {NIDS}},
  booktitle    = {9. DFN-Forum - Kommunikationstechnologien, 30. Mai - 1. Juni 2016,
                  Rostock, Germany},
  series       = {{LNI}},
  volume       = {{P-257}},
  pages        = {77--86},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/896},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfn/Golling0R16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/KimS16,
  author       = {Sanghui Kim and
                  DongBack Seo},
  editor       = {Ting{-}Peng Liang and
                  Shin{-}Yuan Hung and
                  Patrick Y. K. Chau and
                  She{-}I Chang},
  title        = {Factors affecting Privacy Intrusion on Social Networking sites},
  booktitle    = {20th Pacific Asia Conference on Information Systems, {PACIS} 2016,
                  Chiayi, Taiwan, June 27 - July 1, 2016},
  pages        = {61},
  year         = {2016},
  url          = {http://aisel.aisnet.org/pacis2016/61},
  timestamp    = {Tue, 08 Nov 2016 09:28:09 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/KimS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DaraM16,
  author       = {Sashank Dara and
                  V. N. Muralidhara},
  title        = {Privacy Preserving Architectures for Collaborative Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/1602.02452},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.02452},
  eprinttype    = {arXiv},
  eprint       = {1602.02452},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DaraM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/LiCSALR15,
  author       = {Shancang Li and
                  Junhua Chen and
                  Theodoros Spyridopoulos and
                  Panagiotis Andriotis and
                  Robert Ludwiniak and
                  Gordon Russell},
  editor       = {Theo Tryfonas and
                  Ioannis G. Askoxylakis},
  title        = {Real-Time Monitoring of Privacy Abuses and Intrusion Detection in
                  Android System},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - Third
                  International Conference, {HAS} 2015, Held as Part of {HCI} International
                  2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9190},
  pages        = {379--390},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20376-8\_34},
  doi          = {10.1007/978-3-319-20376-8\_34},
  timestamp    = {Tue, 01 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/LiCSALR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issnip/DoN15,
  author       = {Hoang Giang Do and
                  Wee Keong Ng},
  title        = {Privacy-preserving approach for sharing and processing intrusion alert
                  data},
  booktitle    = {Tenth {IEEE} International Conference on Intelligent Sensors, Sensor
                  Networks and Information Processing, {ISSNIP} 2015, Singapore, April
                  7-9, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSNIP.2015.7106911},
  doi          = {10.1109/ISSNIP.2015.7106911},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issnip/DoN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/NiksefatSMS14,
  author       = {Salman Niksefat and
                  Babak Sadeghiyan and
                  Payman Mohassel and
                  Seyed Saeed Sadeghian},
  title        = {{ZIDS:} {A} Privacy-Preserving Intrusion Detection System Using Secure
                  Two-Party Computation Protocols},
  journal      = {Comput. J.},
  volume       = {57},
  number       = {4},
  pages        = {494--509},
  year         = {2014},
  url          = {https://doi.org/10.1093/comjnl/bxt019},
  doi          = {10.1093/COMJNL/BXT019},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/NiksefatSMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Mo14,
  author       = {Jojo Y. C. Mo},
  title        = {Are data protection laws sufficient for privacy intrusions? The case
                  in Hong Kong},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {30},
  number       = {4},
  pages        = {429--438},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.clsr.2014.05.006},
  doi          = {10.1016/J.CLSR.2014.05.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Mo14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/WahidLZ14,
  author       = {Alif Wahid and
                  Christopher Leckie and
                  Chenfeng Vincent Zhou},
  title        = {Estimating the number of hosts corresponding to an intrusion alert
                  while preserving privacy},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {80},
  number       = {3},
  pages        = {502--519},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jcss.2013.06.007},
  doi          = {10.1016/J.JCSS.2013.06.007},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/WahidLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/KurM14,
  author       = {Jir{\'{\i}} Kur and
                  Vashek Maty{\'{a}}s},
  editor       = {Claudia Eckert and
                  Sokratis K. Katsikas and
                  G{\"{u}}nther Pernul},
  title        = {A Protocol for Intrusion Detection in Location Privacy-Aware Wireless
                  Sensor Networks},
  booktitle    = {Trust, Privacy, and Security in Digital Business - 11th International
                  Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8647},
  pages        = {180--190},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09770-1\_16},
  doi          = {10.1007/978-3-319-09770-1\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/KurM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MatyasK13,
  author       = {Vashek Matyas and
                  Jir{\'{\i}} Kur},
  title        = {Conflicts between Intrusion Detection and Privacy Mechanisms for Wireless
                  Sensor Networks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {5},
  pages        = {73--76},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2013.111},
  doi          = {10.1109/MSP.2013.111},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MatyasK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OhanaPC13,
  author       = {Donny Jacob Ohana and
                  Liza Phillips and
                  Lei Chen},
  title        = {Preventing Cell Phone Intrusion and Theft using Biometrics},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {173--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.19},
  doi          = {10.1109/SPW.2013.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/OhanaPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MoreMJF12,
  author       = {Sumit More and
                  Mary Matthews and
                  Anupam Joshi and
                  Tim Finin},
  title        = {A Knowledge-Based Approach to Intrusion Detection Modeling},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {75--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.26},
  doi          = {10.1109/SPW.2012.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MoreMJF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/BitterNEW12,
  author       = {Christian Bitter and
                  John North and
                  David A. Elizondo and
                  Tim Watson},
  editor       = {David A. Elizondo and
                  Agusti Solanas and
                  Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}}},
  title        = {An Introduction to the Use of Neural Networks for Network Intrusion
                  Detection},
  booktitle    = {Computational Intelligence for Privacy and Security},
  series       = {Studies in Computational Intelligence},
  volume       = {394},
  pages        = {5--24},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-25237-2\_2},
  doi          = {10.1007/978-3-642-25237-2\_2},
  timestamp    = {Tue, 16 May 2017 14:24:36 +0200},
  biburl       = {https://dblp.org/rec/series/sci/BitterNEW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-2030,
  author       = {Abdul Razaque and
                  Khaled M. Elleithy},
  title        = {Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems
                  {(MSAIDS)} to Protect Privacy of Users over Mobile Collaborative Learning
                  {(MCL)}},
  journal      = {CoRR},
  volume       = {abs/1210.2030},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.2030},
  eprinttype    = {arXiv},
  eprint       = {1210.2030},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-2030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Ulltveit-MoeOK11,
  author       = {Nils Ulltveit{-}Moe and
                  Vladimir A. Oleshchuk and
                  Geir M. K{\o}ien},
  title        = {Location-Aware Mobile Intrusion Detection with Enhanced Privacy in
                  a 5G Context},
  journal      = {Wirel. Pers. Commun.},
  volume       = {57},
  number       = {3},
  pages        = {317--338},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11277-010-0069-6},
  doi          = {10.1007/S11277-010-0069-6},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/Ulltveit-MoeOK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/BahsiL11,
  author       = {Hayretdin Bahsi and
                  Albert Levi},
  editor       = {Christian Czosseck and
                  Enn Tyugu and
                  Thomas C. Wingfield},
  title        = {Preserving organizational privacy in intrusion detection log sharing},
  booktitle    = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn,
                  Estonia, June 7-10, 2011},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/5954705/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/BahsiL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcoss/SintoniSDSOR11,
  author       = {Alex Sintoni and
                  Anthony Schoofs and
                  Aiden R. Doherty and
                  Alan F. Smeaton and
                  Gregory M. P. O'Hare and
                  Antonio G. Ruzzelli},
  title        = {Generating power footprints without appliance interaction: An enabler
                  for privacy intrusion},
  booktitle    = {Distributed Computing in Sensor Systems, 7th {IEEE} International
                  Conference and Workshops, {DCOSS} 2011, Barcelona, Spain, 27-29 June,
                  2011, Proceedings},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DCOSS.2011.5982180},
  doi          = {10.1109/DCOSS.2011.5982180},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dcoss/SintoniSDSOR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangWZF11,
  author       = {Chuang Wang and
                  Guiling Wang and
                  Wensheng Zhang and
                  Taiming Feng},
  title        = {Reconciling privacy preservation and intrusion detection in sensory
                  data aggregation},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {336--340},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5935177},
  doi          = {10.1109/INFCOM.2011.5935177},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/WangWZF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icann/Guijarro-BerdinasFSF10,
  author       = {Bertha Guijarro{-}Berdi{\~{n}}as and
                  Santiago Fern{\'{a}}ndez{-}Lorenzo and
                  Noelia S{\'{a}}nchez{-}Maro{\~{n}}o and
                  Oscar Fontenla{-}Romero},
  editor       = {Konstantinos I. Diamantaras and
                  Wlodek Duch and
                  Lazaros S. Iliadis},
  title        = {A Privacy-Preserving Distributed and Incremental Learning Method for
                  Intrusion Detection},
  booktitle    = {Artificial Neural Networks - {ICANN} 2010 - 20th International Conference,
                  Thessaloniki, Greece, September 15-18, 2010, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6352},
  pages        = {415--421},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15819-3\_56},
  doi          = {10.1007/978-3-642-15819-3\_56},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icann/Guijarro-BerdinasFSF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/BenaliBGC10,
  author       = {Fatiha Benali and
                  Nadia Bennani and
                  Gabriele Gianini and
                  Stelvio Cimato},
  editor       = {Robert Meersman and
                  Tharam S. Dillon and
                  Pilar Herrero},
  title        = {A Distributed and Privacy-Preserving Method for Network Intrusion
                  Detection},
  booktitle    = {On the Move to Meaningful Internet Systems, {OTM} 2010 - Confederated
                  International Conferences: CoopIS, IS, {DOA} and ODBASE, Hersonissos,
                  Crete, Greece, October 25-29, 2010, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6427},
  pages        = {861--875},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16949-6\_13},
  doi          = {10.1007/978-3-642-16949-6\_13},
  timestamp    = {Thu, 14 Oct 2021 10:28:26 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/BenaliBGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SommerP10,
  author       = {Robin Sommer and
                  Vern Paxson},
  title        = {Outside the Closed World: On Using Machine Learning for Network Intrusion
                  Detection},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {305--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.25},
  doi          = {10.1109/SP.2010.25},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SommerP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1007-1473,
  author       = {Xinyu Xing and
                  Jianxun Dang and
                  Richard Han and
                  Xue Liu and
                  Shivakant Mishra},
  title        = {Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures},
  journal      = {CoRR},
  volume       = {abs/1007.1473},
  year         = {2010},
  url          = {http://arxiv.org/abs/1007.1473},
  eprinttype    = {arXiv},
  eprint       = {1007.1473},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1007-1473.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/TroussetPM09,
  author       = {Fran{\c{c}}ois Trousset and
                  Pascal Poncelet and
                  Florent Masseglia},
  editor       = {Victor Munt{\'{e}}s{-}Mulero and
                  Jordi Nin},
  title        = {{SAX:} a privacy preserving general pupose methodapplied to detection
                  of intrusions},
  booktitle    = {Proceeding of the {ACM} First International Workshop on Privacy and
                  Anonymity for Very Large Databases, {CIKM-PAVLAD} 2009, Hong Kong,
                  China, November 6, 2009},
  pages        = {17--24},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1651449.1651454},
  doi          = {10.1145/1651449.1651454},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cikm/TroussetPM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egc/VermaTPM09,
  author       = {Nischal Verma and
                  Fran{\c{c}}ois Trousset and
                  Pascal Poncelet and
                  Florent Masseglia},
  editor       = {Fabrice Guillet and
                  Gilbert Ritschard and
                  Djamel Abdelkader Zighed and
                  Henri Briand},
  title        = {Intrusion Detections in Collaborative Organizations by Preserving
                  Privacy},
  booktitle    = {Advances in Knowledge Discovery and Management [Best of {EGC} 2009,
                  Strasbourg, France]},
  series       = {Studies in Computational Intelligence},
  volume       = {292},
  pages        = {235--247},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00580-0\_14},
  doi          = {10.1007/978-3-642-00580-0\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/egc/VermaTPM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/TanaraksiritavornM09,
  author       = {Soontaree Tanaraksiritavorn and
                  Shivakant Mishra},
  title        = {A Privacy Preserving Intrusion Tolerant Voting Architecture},
  booktitle    = {Proceedings of The Eighth {IEEE} International Symposium on Networking
                  Computing and Applications, {NCA} 2009, July 9-11, 2009, Cambridge,
                  Massachusetts, {USA}},
  pages        = {148--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NCA.2009.43},
  doi          = {10.1109/NCA.2009.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/TanaraksiritavornM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Allen08,
  author       = {Thomas G. L. Allen},
  editor       = {Belur V. Dasarathy},
  title        = {An innovative middle tier design for protecting federal privacy act
                  data},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2008, Orlando, FL, USA, March 17-18, 2008},
  series       = {{SPIE} Proceedings},
  volume       = {6973},
  pages        = {697304},
  publisher    = {{SPIE}},
  year         = {2008},
  url          = {https://doi.org/10.1117/12.770415},
  doi          = {10.1117/12.770415},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Allen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Flegel07,
  author       = {Ulrich Flegel},
  title        = {Privacy-Respecting Intrusion Detection},
  series       = {Advances in Information Security},
  volume       = {35},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-68254-9},
  doi          = {10.1007/978-0-387-68254-9},
  isbn         = {978-0-387-34346-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Flegel07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/ParkLLC07,
  author       = {Hyun{-}A Park and
                  Dong Hoon Lee and
                  Jongin Lim and
                  Sang Hyun Cho},
  editor       = {Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang and
                  Qing Yang and
                  Xueqi Cheng and
                  Jue Wang and
                  Fei{-}Yue Wang and
                  Hsinchun Chen},
  title        = {{PPIDS:} Privacy Preserving Intrusion Detection System},
  booktitle    = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI}
                  2007, Chengdu, China, April 11-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4430},
  pages        = {269--274},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71549-8\_27},
  doi          = {10.1007/978-3-540-71549-8\_27},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/paisi/ParkLLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/LiDZ07,
  author       = {Zhuowei Li and
                  Amitabha Das and
                  Jianying Zhou},
  editor       = {Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul and
                  A Min Tjoa},
  title        = {Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures},
  booktitle    = {Trust, Privacy and Security in Digital Business, 4th International
                  Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4657},
  pages        = {54--64},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74409-2\_8},
  doi          = {10.1007/978-3-540-74409-2\_8},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/LiDZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMicec/AnJC06,
  author       = {Xiangdong An and
                  Dawn N. Jutla and
                  Nick Cercone},
  editor       = {Mark S. Fox and
                  Bruce Spencer},
  title        = {Privacy intrusion detection using dynamic Bayesian networks},
  booktitle    = {Proceedings of the 8th International Conference on Electronic Commerce:
                  The new e-commerce - Innovations for Conquering Current Barriers,
                  Obstacles and Limitations to Conducting Successful Business on the
                  Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16,
                  2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {156},
  pages        = {208--215},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1151454.1151493},
  doi          = {10.1145/1151454.1151493},
  timestamp    = {Tue, 06 Apr 2021 12:12:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMicec/AnJC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/StytzB06,
  author       = {Martin R. Stytz and
                  Sheila B. Banks},
  editor       = {Belur V. Dasarathy},
  title        = {Personal privacy, information assurance, and the threat posed by malware
                  techology},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {624107},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.665344},
  doi          = {10.1117/12.665344},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/StytzB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/AnJC06,
  author       = {Xiangdong An and
                  Dawn N. Jutla and
                  Nick Cercone},
  title        = {A Bayesian Network Approach to Detecting Privacy Intrusion},
  booktitle    = {Proceedings of the 2006 {IEEE/WIC/ACM} International Conference on
                  Intelligent Agent Technology - Workshops, Hong Kong, China, 18-22
                  December 2006},
  pages        = {73--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/WI-IATW.2006.6},
  doi          = {10.1109/WI-IATW.2006.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/AnJC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideas/AnJC06,
  author       = {Xiangdong An and
                  Dawn N. Jutla and
                  Nick Cercone},
  editor       = {Bipin C. Desai and
                  Shyam K. Gupta},
  title        = {Probabilistic Internal Privacy Intrusion Detection},
  booktitle    = {Tenth International Database Engineering and Applications Symposium
                  {(IDEAS} 2006), 11-14 December 2006, Delhi, India},
  pages        = {317--318},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IDEAS.2006.38},
  doi          = {10.1109/IDEAS.2006.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ideas/AnJC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SodiyaLA05,
  author       = {Adesina S. Sodiya and
                  H. O. D. Longe and
                  Adio T. Akinwale},
  title        = {Maintaining privacy in anomaly-based intrusion detection systems},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {1},
  pages        = {72--80},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510582683},
  doi          = {10.1108/09685220510582683},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SodiyaLA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/VenterOE04,
  author       = {Hein S. Venter and
                  Martin S. Olivier and
                  Jan H. P. Eloff},
  title        = {{PIDS:} a privacy intrusion detection system},
  journal      = {Internet Res.},
  volume       = {14},
  number       = {5},
  pages        = {360--365},
  year         = {2004},
  url          = {https://doi.org/10.1108/10662240410566953},
  doi          = {10.1108/10662240410566953},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/VenterOE04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Johnston01,
  author       = {Steven R. Johnston},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {The Impact of Privacy and Data Protection Legislation on the Sharing
                  of Intrusion Detection Information},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {150--171},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_10},
  doi          = {10.1007/3-540-45474-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Johnston01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LundinJ00,
  author       = {Emilie Lundin and
                  Erland Jonsson},
  title        = {Anomaly-based intrusion detection: privacy concerns and other problems},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {4},
  pages        = {623--640},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00134-1},
  doi          = {10.1016/S1389-1286(00)00134-1},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LundinJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BiskupF00,
  author       = {Joachim Biskup and
                  Ulrich Flegel},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Transaction-Based Pseudonyms in Audit Data for Privacy Respecting
                  Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {28--48},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_3},
  doi          = {10.1007/3-540-39945-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BiskupF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LundinJ99,
  author       = {Emilie Lundin and
                  Erland Jonsson},
  title        = {Privacy vs. Intrusion Detection Analysis},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Lundin.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LundinJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SobireyFR97,
  author       = {Michael Sobirey and
                  Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg},
  editor       = {Louise Yngstr{\"{o}}m and
                  Jan Carlsen},
  title        = {Pseudonymous audit for privacy enhanced intrusion detection},
  booktitle    = {Information Security in Research and Business, Proceedings of the
                  {IFIP} {TC11} 13th International Conference on Information Security
                  {(SEC} '97), 14-16 May 1997, Copenhagen, Denmark},
  series       = {{IFIP} Conference Proceedings},
  volume       = {92},
  pages        = {151--163},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Thu, 03 Jan 2002 12:08:24 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/SobireyFR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/SipiorW96,
  author       = {Janice C. Sipior and
                  Burke T. Ward},
  editor       = {Janice I. DeGross and
                  Sirkka L. Jarvenpaa and
                  Ananth Srinivasan},
  title        = {United States Cases of Employee E-Mail Privacy Intrusions: Do You
                  Really Know the Legal Consequences?},
  booktitle    = {Proceedings of the Seventeenth International Conference on Information
                  Systems, Cleveland, Ohio, USA, December 16-18, 1996},
  pages        = {16},
  publisher    = {Association for Information Systems},
  year         = {1996},
  url          = {http://aisel.aisnet.org/icis1996/16},
  timestamp    = {Sun, 29 Mar 2015 13:07:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/SipiorW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics