Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "privacy intrusion"
@article{DBLP:journals/adhoc/BukhariZHMMMS24, author = {Syed Muhammad Salman Bukhari and Muhammad Hamza Zafar and Mohamad Abou Houran and Syed Kumayl Raza Moosavi and Majad Mansoor and Muhammad Muaaz and Filippo Sanfilippo}, title = {Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability}, journal = {Ad Hoc Networks}, volume = {155}, pages = {103407}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2024.103407}, doi = {10.1016/J.ADHOC.2024.103407}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/BukhariZHMMMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/DuY24, author = {Jiawei Du and Kai Yang}, title = {{NIDS-FLGDP:} Network Intrusion Detection Algorithm Based on Gaussian Differential Privacy Federated Learning}, journal = {J. Circuits Syst. Comput.}, volume = {33}, number = {3}, year = {2024}, url = {https://doi.org/10.1142/s0218126624500488}, doi = {10.1142/S0218126624500488}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsc/DuY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/VigneshSK24, author = {M. Ragul Vignesh and K. Srihari and S. Karthik}, title = {Privacy-preserving intrusion detection in Internet of medical things neural networks using a novel recurrent U-Net auto-encoder algorithm for biomedical applications}, journal = {J. Intell. Fuzzy Syst.}, volume = {46}, number = {2}, pages = {4093--4104}, year = {2024}, url = {https://doi.org/10.3233/jifs-234441}, doi = {10.3233/JIFS-234441}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/VigneshSK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-07343, author = {Shakil Ibne Ahsan and Phil Legg and S. M. Iftekharul Alam}, title = {Privacy-Preserving Intrusion Detection in Software-defined {VANET} using Federated Learning with {BERT}}, journal = {CoRR}, volume = {abs/2401.07343}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.07343}, doi = {10.48550/ARXIV.2401.07343}, eprinttype = {arXiv}, eprint = {2401.07343}, timestamp = {Thu, 01 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-07343.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/datascience/LiSS23, author = {Junzhou Li and Qianhui Sun and Feixian Sun}, title = {Enhancing Privacy-Preserving Intrusion Detection in Blockchain-Based Networks with Deep Learning}, journal = {Data Sci. J.}, volume = {22}, year = {2023}, url = {https://doi.org/10.5334/dsj-2023-031}, doi = {10.5334/DSJ-2023-031}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/datascience/LiSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ida/WuZ23, author = {Weifei Wu and Yanhui Zhang}, title = {An efficient intrusion detection method using federated transfer learning and support vector machine with privacy-preserving}, journal = {Intell. Data Anal.}, volume = {27}, number = {4}, pages = {1121--1141}, year = {2023}, url = {https://doi.org/10.3233/IDA-226617}, doi = {10.3233/IDA-226617}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ida/WuZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CeldranSFBPS23, author = {Alberto Huertas Celdr{\'{a}}n and Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and Chao Feng and G{\'{e}}r{\^{o}}me Bovet and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Burkhard Stiller}, title = {Privacy-Preserving and Syscall-Based Intrusion Detection System for IoT Spectrum Sensors Affected by Data Falsification Attacks}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {10}, pages = {8408--8415}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3213889}, doi = {10.1109/JIOT.2022.3213889}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/CeldranSFBPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcomps/TruongL23, author = {Vu Tuan Truong and Long Bao Le}, title = {MetaCIDS: Privacy-Preserving Collaborative Intrusion Detection for Metaverse based on Blockchain and Online Federated Learning}, journal = {{IEEE} Open J. Comput. Soc.}, volume = {4}, pages = {253--266}, year = {2023}, url = {https://doi.org/10.1109/OJCS.2023.3312299}, doi = {10.1109/OJCS.2023.3312299}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ojcomps/TruongL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/patterns/HoussiauSRSM23, author = {Florimond Houssiau and Piotr Sapiezynski and Laura Radaelli and Erez Shmueli and Yves{-}Alexandre de Montjoye}, title = {Detrimental network effects in privacy: {A} graph-theoretic model for node-based intrusions}, journal = {Patterns}, volume = {4}, number = {1}, pages = {100662}, year = {2023}, url = {https://doi.org/10.1016/j.patter.2022.100662}, doi = {10.1016/J.PATTER.2022.100662}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/patterns/HoussiauSRSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/NtizikiraWASL23, author = {Ernest Ntizikira and Lei Wang and Fahad Alblehai and Kiran Saleem and Muhammad Ali Lodhi}, title = {Secure and Privacy-Preserving Intrusion Detection and Prevention in the Internet of Unmanned Aerial Vehicles}, journal = {Sensors}, volume = {23}, number = {19}, pages = {8077}, year = {2023}, url = {https://doi.org/10.3390/s23198077}, doi = {10.3390/S23198077}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/NtizikiraWASL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/AlcazarSCGRBS23, author = {Pedro Ruzafa Alcazar and Pablo Fern{\'{a}}ndez Saura and Enrique M{\'{a}}rmol Campos and Aurora Gonz{\'{a}}lez{-}Vidal and Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Jorge Bernal Bernab{\'{e}} and Antonio F. Skarmeta}, title = {Intrusion Detection Based on Privacy-Preserving Federated Learning for the Industrial IoT}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {2}, pages = {1145--1154}, year = {2023}, url = {https://doi.org/10.1109/TII.2021.3126728}, doi = {10.1109/TII.2021.3126728}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/AlcazarSCGRBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdc/AgbajeAMHNO23, author = {Paul Agbaje and Afia Anjum and Arkajyoti Mitra and Sena Hounsinou and Ebelechukwu Nwafor and Habeeb Olufowobi}, title = {Privacy-Preserving Intrusion Detection System for Internet of Vehicles using Split Learning}, booktitle = {Proceedings of the {IEEE/ACM} 10th International Conference on Big Data Computing, Applications and Technologies, {BDCAT} 2023, Taormina (Messina), Italy, December 4-7, 2023}, pages = {07:1--07:8}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3632366.3632388}, doi = {10.1145/3632366.3632388}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bdc/AgbajeAMHNO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/TaslimasaDNXIRG23, author = {Hamideh Taslimasa and Sajjad Dadkhah and Euclides Carlos Pinto Neto and Pulei Xiong and Shahrear Iqbal and Suprio Ray and Ali A. Ghorbani}, title = {ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle {CAN} Bus Protocol}, booktitle = {9th Intl Conference on Big Data Security on Cloud, BigDataSecurity, {IEEE} Intl Conference on High Performance and Smart Computing, {HPSC} and {IEEE} Intl Conference on Intelligent Data and Security {IDS} 2023, New York, NY, USA, May 6-8, 2023}, pages = {122--129}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS58521.2023.00031}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS58521.2023.00031}, timestamp = {Fri, 09 Jun 2023 15:18:15 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/TaslimasaDNXIRG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codit/ChaabeneAJRAC23, author = {Riadh Ben Chaabene and Darine Ameyed and Fehmi Jaafar and Alexis Roger and Esma A{\"{\i}}meur and Mohamed Cheriet}, title = {A Privacy-Preserving Federated Learning for IoT Intrusion Detection System}, booktitle = {9th International Conference on Control, Decision and Information Technologies, CoDIT 2023, Rome, Italy, July 3-6, 2023}, pages = {351--356}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CoDIT58514.2023.10284221}, doi = {10.1109/CODIT58514.2023.10284221}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codit/ChaabeneAJRAC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/SiachosKPGK23, author = {Ioannis Siachos and Konstantinos Kaltakis and Konstantina Papachristopoulou and Ioannis Giannoulakis and Emmanouil Kafetzakis}, title = {Comparison of Machine Learning Algorithms Trained Under Differential Privacy for Intrusion Detection Systems}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023}, pages = {654--658}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSR57506.2023.10225010}, doi = {10.1109/CSR57506.2023.10225010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csr2/SiachosKPGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficloud/ManwaringT23, author = {Derek Manwaring and Geetha Thamilarasu}, editor = {Irfan Awan and Muhammad Younas and Markus Aleksy}, title = {Defense Guild: {A} Privacy-preserving Intrusion Detection System for Healthcare Data in Cloud}, booktitle = {10th International Conference on Future Internet of Things and Cloud, FiCloud 2023, Marrakesh, Morocco, August 14-16, 2023}, pages = {52--57}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/FiCloud58648.2023.00016}, doi = {10.1109/FICLOUD58648.2023.00016}, timestamp = {Thu, 04 Apr 2024 15:39:38 +0200}, biburl = {https://dblp.org/rec/conf/ficloud/ManwaringT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3i/WankhedeVPMBM23, author = {Hansaraj Shalikram Wankhede and R. Venkatesh and Sumit Pundir and Ravikiran Madala and Kamunuri Ganapathi Babu and Badepally Mallaiah}, title = {Real-Time Innovation in Future Generation Security for Data Privacy Intrusion System in Machine Learning Approach}, booktitle = {6th International Conference on Contemporary Computing and Informatics, {IC3I} 2023, Gautam Buddha Nagar, India, September 14-16, 2023}, pages = {1416--1421}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IC3I59117.2023.10397738}, doi = {10.1109/IC3I59117.2023.10397738}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic3i/WankhedeVPMBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/AbhijitHBPS23, author = {Chunduru Sri Abhijit and Rishav Himmatramka and Aum Shiva Rama Bishoyi and Lallith Prasath and T. Subbulakshmi}, title = {Privacy-Preserving Network Intrusion Detection using Federated Learning}, booktitle = {14th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCNT56998.2023.10307648}, doi = {10.1109/ICCCNT56998.2023.10307648}, timestamp = {Thu, 30 Nov 2023 16:40:53 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/AbhijitHBPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/IhekoronyeKL23, author = {Vivian Ukamaka Ihekoronye and Dong{-}Seong Kim and Jae Min Lee}, title = {Federated Learning with Differential Privacy for Intrusion Detection in Internet of Flying Things: {A} Robust Approach}, booktitle = {14th International Conference on Information and Communication Technology Convergence, {ICTC} 2023, Jeju Island, Korea, Republic of, October 11-13, 2023}, pages = {932--937}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICTC58733.2023.10392902}, doi = {10.1109/ICTC58733.2023.10392902}, timestamp = {Tue, 13 Feb 2024 21:32:58 +0100}, biburl = {https://dblp.org/rec/conf/ictc/IhekoronyeKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotsms/BensaidLS23, author = {Radjaa Bensaid and Nabila Labraoui and Haythem Bany Salameh}, editor = {Muhannad Quwaider and Yaser Jararweh}, title = {Federated Deep Learning-based Intrusion Detection Approach for Enhancing Privacy in Fog-IoT Networks}, booktitle = {10th International Conference on Internet of Things: Systems, Management and Security, {IOTSMS} 2023, San Antonio, TX, USA, October 23-25, 2023}, pages = {156--160}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IOTSMS59855.2023.10325826}, doi = {10.1109/IOTSMS59855.2023.10325826}, timestamp = {Sat, 09 Dec 2023 09:49:48 +0100}, biburl = {https://dblp.org/rec/conf/iotsms/BensaidLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dpd/MohanrajS23, title = {{RETRACTED} {ARTICLE:} Security and privacy issue in multi-cloud accommodating Intrusion Detection System}, journal = {Distributed Parallel Databases}, volume = {41}, number = {1-2}, pages = {155}, year = {2023}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s10619-021-07338-x}, doi = {10.1007/S10619-021-07338-X}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dpd/MohanrajS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/RadhaK22, author = {D. Radha and M. G. Kavitha}, title = {Deep Learning Enabled Privacy Preserving Techniques for Intrusion Detection Systems in the Industrial Internet of Things}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {52}, number = {3-4}, pages = {223--247}, year = {2022}, url = {https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-52-number-3-4-2022/20595-2/}, timestamp = {Sat, 25 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/RadhaK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/DeviM22, author = {K. Devi and Balaubramanian Muthusenthil}, title = {Intrusion detection framework for securing privacy attack in cloud computing environment using {DCCGAN-RFOA}}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {33}, number = {9}, year = {2022}, url = {https://doi.org/10.1002/ett.4561}, doi = {10.1002/ETT.4561}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/DeviM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AwanDAR22, author = {Kamran Ahmad Awan and Ikram Ud Din and Ahmad Almogren and Joel J. P. C. Rodrigues}, title = {AutoTrust: {A} privacy-enhanced trust-based intrusion detection approach for internet of smart things}, journal = {Future Gener. Comput. Syst.}, volume = {137}, pages = {288--301}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.07.026}, doi = {10.1016/J.FUTURE.2022.07.026}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AwanDAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenZY22, author = {Yang Chen and Junzhe Zhang and Chai Kiat Yeo}, title = {Privacy-preserving knowledge transfer for intrusion detection with federated deep autoencoding gaussian mixture model}, journal = {Inf. Sci.}, volume = {609}, pages = {1204--1220}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.07.104}, doi = {10.1016/J.INS.2022.07.104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ChenZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csci/EzeluB22, author = {Chukwuebuka Ezelu and Ulrich Buehler}, title = {Privacy-Preserving Collaborative Intrusion Detection Systems: {A} Federated Learning Framework}, booktitle = {International Conference on Computational Science and Computational Intelligence, {CSCI} 2022, Las Vegas, NV, USA, December 14-16, 2022}, pages = {1076--1079}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSCI58124.2022.00190}, doi = {10.1109/CSCI58124.2022.00190}, timestamp = {Mon, 22 Apr 2024 15:12:51 +0200}, biburl = {https://dblp.org/rec/conf/csci/EzeluB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec4europe/SauraGBS22, author = {Pablo Fern{\'{a}}ndez Saura and Juan Francisco Mart{\'{\i}}nez Gil and Jorge Bernal Bernab{\'{e}} and Antonio F. Skarmeta}, editor = {Antonio F. Skarmeta and Daniele Canavese and Antonio Lioy and Sara Nieves Matheu}, title = {Privacy-Preserving Cyber Threat Information Sharing Leveraging FL-Based Intrusion Detection in the Financial Sector}, booktitle = {Digital Sovereignty in Cyber Security: New Challenges in Future Vision - First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17-21, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1807}, pages = {50--64}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36096-1\_4}, doi = {10.1007/978-3-031-36096-1\_4}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec4europe/SauraGBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincom/EliasCOSNJB22, author = {Erik Miguel de Elias and Vinicius Sanches Carriel and Guilherme Werneck de Oliveira and Aldri Luiz dos Santos and Michele Nogueira and Roberto Hirata Junior and Daniel Mac{\^{e}}do Batista}, editor = {Igor M. Moraes and Miguel Elias M. Campista and Yacine Ghamri{-}Doudane and Lu{\'{\i}}s Henrique M. K. Costa and Marcelo G. Rubinstein}, title = {A Hybrid {CNN-LSTM} Model for IIoT Edge Privacy-Aware Intrusion Detection}, booktitle = {{IEEE} Latin-American Conference on Communications, {LATINCOM} 2022, Rio de Janeiro, Brazil, November 30 - Dec. 2, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/LATINCOM56090.2022.10000468}, doi = {10.1109/LATINCOM56090.2022.10000468}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincom/EliasCOSNJB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/LiH22, author = {Simin Li and Mu Han}, editor = {Yuan Xu and Hongyang Yan and Huang Teng and Jun Cai and Jin Li}, title = {Priv-IDS: {A} Privacy Protection and Intrusion Detection Framework for In-Vehicle Network}, booktitle = {Machine Learning for Cyber Security - 4th International Conference, {ML4CS} 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13656}, pages = {165--179}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20099-1\_14}, doi = {10.1007/978-3-031-20099-1\_14}, timestamp = {Mon, 30 Jan 2023 08:02:13 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/LiH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/KhanPKKHNA21, author = {Izhar Ahmed Khan and Dechang Pi and Nasrullah Khan and Zaheer Ullah Khan and Yasir Hussain and Asif Nawaz and Farman Ali}, title = {A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks}, journal = {Appl. Intell.}, volume = {51}, number = {10}, pages = {7306--7321}, year = {2021}, url = {https://doi.org/10.1007/s10489-021-02222-8}, doi = {10.1007/S10489-021-02222-8}, timestamp = {Sun, 30 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/KhanPKKHNA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/XuLWLG21, author = {Mengfan Xu and Xinghua Li and Yunwei Wang and Bin Luo and Jingjing Guo}, title = {Privacy-preserving multisource transfer learning in intrusion detection system}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/ett.3957}, doi = {10.1002/ETT.3957}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/XuLWLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SinghM21, author = {Neeraj Kumar Singh and Vasundhara Mahajan}, title = {End-User Privacy Protection Scheme from cyber intrusion in smart grid advanced metering infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100410}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100410}, doi = {10.1016/J.IJCIP.2021.100410}, timestamp = {Thu, 10 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SinghM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SpathoulasTD21, author = {Georgios P. Spathoulas and Georgios Theodoridis and Georgios{-}Paraskevas Damiris}, title = {Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {3}, pages = {347--370}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00506-7}, doi = {10.1007/S10207-020-00506-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SpathoulasTD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/HanCM21, author = {Mu Han and Pengzhou Cheng and Shidian Ma}, title = {PPM-InVIDS: Privacy protection model for in-vehicle intrusion detection system based complex-valued neural network}, journal = {Veh. Commun.}, volume = {31}, pages = {100374}, year = {2021}, url = {https://doi.org/10.1016/j.vehcom.2021.100374}, doi = {10.1016/J.VEHCOM.2021.100374}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/HanCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/MokrySBQGCCN21, author = {Laylon Mokry and Paul Slife and Patrick Bishop and Jose Quiroz and Cooper Guzzi and Zhiyuan Chen and Adina Crainiceanu and Don Needham}, editor = {Yixin Chen and Heiko Ludwig and Yicheng Tu and Usama M. Fayyad and Xingquan Zhu and Xiaohua Hu and Suren Byna and Xiong Liu and Jianping Zhang and Shirui Pan and Vagelis Papalexakis and Jianwu Wang and Alfredo Cuzzocrea and Carlos Ordonez}, title = {Efficient and Privacy-Preserving Collaborative Intrusion Detection Using Additive Secret Sharing and Differential Privacy}, booktitle = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando, FL, USA, December 15-18, 2021}, pages = {3324--3333}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigData52589.2021.9671428}, doi = {10.1109/BIGDATA52589.2021.9671428}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/MokrySBQGCCN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/KumarTG21, author = {Prabhat Kumar and Rakesh Tripathi and Govind P. Gupta}, title = {{P2IDF:} {A} Privacy-Preserving based Intrusion Detection Framework for Software Defined Internet of Things-Fog (SDIoT-Fog)}, booktitle = {{ICDCN} '21: International Conference on Distributed Computing and Networking, Virtual Event, Nara, Japan, January 5-8, 2021, Adjunct Volume}, pages = {37--42}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3427477.3429989}, doi = {10.1145/3427477.3429989}, timestamp = {Mon, 17 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/KumarTG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ShiGLYL21, author = {Jibo Shi and Bin Ge and Yang Liu and Yu Yan and Shuang Li}, title = {Data Privacy Security Guaranteed Network Intrusion Detection System Based on Federated Learning}, booktitle = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484545}, doi = {10.1109/INFOCOMWKSHPS51825.2021.9484545}, timestamp = {Fri, 23 Jul 2021 09:24:13 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ShiGLYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/DuyHCP21, author = {Phan The Duy and Huynh Nhat Hao and Huynh Minh Chu and Van{-}Hau Pham}, editor = {Min Yang and Chao Chen and Yang Liu}, title = {A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System}, booktitle = {Network and System Security - 15th International Conference, {NSS} 2021, Tianjin, China, October 23, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13041}, pages = {353--368}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92708-0\_23}, doi = {10.1007/978-3-030-92708-0\_23}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/DuyHCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/Shi0ZY21, author = {Jibo Shi and Yun Lin and Zherui Zhang and Shui Yu}, title = {A Hybrid Intrusion Detection System Based on Machine Learning under Differential Privacy Protection}, booktitle = {94th {IEEE} Vehicular Technology Conference, {VTC} Fall 2021, Norman, OK, USA, September 27-30, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VTC2021-Fall52928.2021.9625540}, doi = {10.1109/VTC2021-FALL52928.2021.9625540}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vtc/Shi0ZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-09878, author = {Ajesh Koyatan Chathoth and Abhyuday Jagannatha and Stephen Lee}, title = {Federated Intrusion Detection for IoT with Heterogeneous Cohort Privacy}, journal = {CoRR}, volume = {abs/2101.09878}, year = {2021}, url = {https://arxiv.org/abs/2101.09878}, eprinttype = {arXiv}, eprint = {2101.09878}, timestamp = {Sat, 30 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-09878.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-06765, author = {Stanislav Abaimov}, title = {Towards a Privacy-preserving Deep Learning-based Network Intrusion Detection in Data Distribution Services}, journal = {CoRR}, volume = {abs/2106.06765}, year = {2021}, url = {https://arxiv.org/abs/2106.06765}, eprinttype = {arXiv}, eprint = {2106.06765}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-06765.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-02362, author = {Jyoti Fakirah and Lauhim Mahfuz Zishan and Roshni Mooruth and Michael N. Johnstone and Wencheng Yang}, title = {A Low-Cost Machine Learning Based Network Intrusion Detection System with Data Privacy Preservation}, journal = {CoRR}, volume = {abs/2107.02362}, year = {2021}, url = {https://arxiv.org/abs/2107.02362}, eprinttype = {arXiv}, eprint = {2107.02362}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-02362.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/KimP20, author = {Jinsu Kim and Namje Park}, title = {A Face Image Virtualization Mechanism for Privacy Intrusion Prevention in Healthcare Video Surveillance Systems}, journal = {Symmetry}, volume = {12}, number = {6}, pages = {891}, year = {2020}, url = {https://doi.org/10.3390/sym12060891}, doi = {10.3390/SYM12060891}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/KimP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ChenQCHMH20, author = {Min Chen and Yongfeng Qian and Jing Chen and Kai Hwang and Shiwen Mao and Long Hu}, title = {Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {8}, number = {4}, pages = {1274--1283}, year = {2020}, url = {https://doi.org/10.1109/TCC.2016.2617382}, doi = {10.1109/TCC.2016.2617382}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/ChenQCHMH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blackseecom/Al-MarriCA20, author = {Noor Ali Al{-}Athba Al{-}Marri and Bekir Sait Ciftler and Mohamed M. Abdallah}, title = {Federated Mimic Learning for Privacy Preserving Intrusion Detection}, booktitle = {{IEEE} International Black Sea Conference on Communications and Networking, BlackSeaCom 2020, Odessa, Ukraine, May 26-29, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BlackSeaCom48709.2020.9234959}, doi = {10.1109/BLACKSEACOM48709.2020.9234959}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blackseecom/Al-MarriCA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/SaharkhizanAHDPS20, author = {Mahdis Saharkhizan and Amin Azmoodeh and Hamed HaddadPajouh and Ali Dehghantanha and Reza M. Parizi and Gautam Srivastava}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha}, title = {A Hybrid Deep Generative Local Metric Learning Method for Intrusion Detection}, booktitle = {Handbook of Big Data Privacy}, pages = {343--357}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38557-6\_16}, doi = {10.1007/978-3-030-38557-6\_16}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/SaharkhizanAHDPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-06974, author = {Noor Ali Al{-}Athba Al{-}Marri and Bekir Sait Ciftler and Mohamed M. Abdallah}, title = {Federated Mimic Learning for Privacy Preserving Intrusion Detection}, journal = {CoRR}, volume = {abs/2012.06974}, year = {2020}, url = {https://arxiv.org/abs/2012.06974}, eprinttype = {arXiv}, eprint = {2012.06974}, timestamp = {Sat, 02 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-06974.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/GiftyBK19, author = {Gifty R. and Bharathi R. and Krishnakumar P.}, title = {Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection}, journal = {Neural Comput. Appl.}, volume = {31}, number = {{S-1}}, pages = {23--34}, year = {2019}, url = {https://doi.org/10.1007/s00521-018-3635-6}, doi = {10.1007/S00521-018-3635-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/GiftyBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/AlaqraW19, author = {Ala Sarah Alaqra and Erik W{\"{a}}stlund}, editor = {Abbas Moallem}, title = {Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors}, booktitle = {{HCI} for Cybersecurity, Privacy and Trust - First International Conference, {HCI-CPT} 2019, Held as Part of the 21st {HCI} International Conference, {HCII} 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11594}, pages = {355--370}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22351-9\_24}, doi = {10.1007/978-3-030-22351-9\_24}, timestamp = {Wed, 17 Jul 2019 11:08:48 +0200}, biburl = {https://dblp.org/rec/conf/hci/AlaqraW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsca/ChewOWP19, author = {Yee Jian Chew and Shih Yin Ooi and Kok{-}Seng Wong and Ying{-}Han Pang}, title = {Privacy Preserving of {IP} Address through Truncation Method in Network-based Intrusion Detection System}, booktitle = {Proceedings of the 8th International Conference on Software and Computer Applications, {ICSCA} '19, Penang, Malaysia, February 19-21, 2019}, pages = {569--573}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3316615.3316626}, doi = {10.1145/3316615.3316626}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsca/ChewOWP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/SgaglioneCDMRCS19, author = {Luigi Sgaglione and Luigi Coppolino and Salvatore D'Antonio and Giovanni Mazzeo and Luigi Romano and Domenico Cotroneo and Andrea Scognamiglio}, editor = {Sumitra Reddy}, title = {Privacy Preserving Intrusion Detection Via Homomorphic Encryption}, booktitle = {28th {IEEE} International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, {WETICE} 2019, Naples, Italy, June 12-14, 2019}, pages = {321--326}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WETICE.2019.00073}, doi = {10.1109/WETICE.2019.00073}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wetice/SgaglioneCDMRCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/BernieriP19, author = {Giuseppe Bernieri and Federica Pascucci}, editor = {Cristina Alcaraz}, title = {Improving Security in Industrial Internet of Things: {A} Distributed Intrusion Detection Methodology}, booktitle = {Security and Privacy Trends in the Industrial Internet of Things}, pages = {161--179}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12330-7\_8}, doi = {10.1007/978-3-030-12330-7\_8}, timestamp = {Thu, 23 May 2019 15:32:42 +0200}, biburl = {https://dblp.org/rec/books/sp/19/BernieriP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/WangMLLLX18, author = {Yu Wang and Weizhi Meng and Wenjuan Li and Jin Li and Waixi Liu and Yang Xiang}, title = {A fog-based privacy-preserving approach for distributed signature-based intrusion detection}, journal = {J. Parallel Distributed Comput.}, volume = {122}, pages = {26--35}, year = {2018}, url = {https://doi.org/10.1016/j.jpdc.2018.07.013}, doi = {10.1016/J.JPDC.2018.07.013}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/WangMLLLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WuLZ18, author = {Hongchen Wu and Mingyang Li and Huaxiang Zhang}, title = {{UISTD:} {A} Trust-Aware Model for Diverse Item Personalization in Social Sensing with Lower Privacy Intrusion}, journal = {Sensors}, volume = {18}, number = {12}, pages = {4383}, year = {2018}, url = {https://doi.org/10.3390/s18124383}, doi = {10.3390/S18124383}, timestamp = {Sat, 29 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/WuLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsipn/0011Z18, author = {Tao Zhang and Quanyan Zhu}, title = {Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs}, journal = {{IEEE} Trans. Signal Inf. Process. over Networks}, volume = {4}, number = {1}, pages = {148--161}, year = {2018}, url = {https://doi.org/10.1109/TSIPN.2018.2801622}, doi = {10.1109/TSIPN.2018.2801622}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsipn/0011Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-09007, author = {Laura Radaelli and Piotr Sapiezynski and Florimond Houssiau and Erez Shmueli and Yves{-}Alexandre de Montjoye}, title = {Quantifying Surveillance in the Networked Age: Node-based Intrusions and Group Privacy}, journal = {CoRR}, volume = {abs/1803.09007}, year = {2018}, url = {http://arxiv.org/abs/1803.09007}, eprinttype = {arXiv}, eprint = {1803.09007}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-09007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-09160, author = {Junaid Arshad and Muhammad Ajmal Azad and Khaled Salah and Wei Jie and Razi Iqbal and Mamoun Alazab}, title = {A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT}, journal = {CoRR}, volume = {abs/1812.09160}, year = {2018}, url = {http://arxiv.org/abs/1812.09160}, eprinttype = {arXiv}, eprint = {1812.09160}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-09160.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinDRZ18, author = {Chenglu Jin and Marten van Dijk and Michael K. Reiter and Haibin Zhang}, title = {PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1171}, year = {2018}, url = {https://eprint.iacr.org/2018/1171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinDRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/NiksefatKS17, author = {Salman Niksefat and Parisa Kaghazgaran and Babak Sadeghiyan}, title = {Privacy issues in intrusion detection systems: {A} taxonomy, survey and future directions}, journal = {Comput. Sci. Rev.}, volume = {25}, pages = {69--78}, year = {2017}, url = {https://doi.org/10.1016/j.cosrev.2017.07.001}, doi = {10.1016/J.COSREV.2017.07.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csr/NiksefatKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhuJM17, author = {Sencun Zhu and Kevin I. Jones and Leandros A. Maglaras}, title = {Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {12}, pages = {e1}, year = {2017}, url = {https://doi.org/10.4108/eai.28-12-2017.153514}, doi = {10.4108/EAI.28-12-2017.153514}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ZhuJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CanardDKPS17, author = {S{\'{e}}bastien Canard and A{\"{\i}}da Diop and Nizar Kheir and Marie Paindavoine and Mohamed Sabt}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {561--574}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053013}, doi = {10.1145/3052973.3053013}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CanardDKPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/WangXLML17, author = {Yu Wang and Lin Xie and Wenjuan Li and Weizhi Meng and Jin Li}, editor = {Sheng Wen and Wei Wu and Aniello Castiglione}, title = {A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing}, booktitle = {Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10581}, pages = {267--279}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69471-9\_20}, doi = {10.1007/978-3-319-69471-9\_20}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/WangXLML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/JinHD17, author = {Richeng Jin and Xiaofan He and Huaiyu Dai}, title = {On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach}, booktitle = {Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, Hanover, MD, USA, April 4-5, 2017}, pages = {45--51}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055305.3055311}, doi = {10.1145/3055305.3055311}, timestamp = {Tue, 06 Nov 2018 16:57:27 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/JinHD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcis/KeshkMSC17, author = {Marwa Keshk and Nour Moustafa and Elena Sitnikova and Gideon Creech}, title = {Privacy preservation intrusion detection technique for {SCADA} systems}, booktitle = {2017 Military Communications and Information Systems Conference, MilCIS 2017, Canberra, Australia, November 14-16, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MilCIS.2017.8190422}, doi = {10.1109/MILCIS.2017.8190422}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcis/KeshkMSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-02828, author = {Marwa Keshk and Nour Moustafa and Elena Sitnikova and Gideon Creech}, title = {Privacy Preservation Intrusion Detection Technique for {SCADA} Systems}, journal = {CoRR}, volume = {abs/1711.02828}, year = {2017}, url = {http://arxiv.org/abs/1711.02828}, eprinttype = {arXiv}, eprint = {1711.02828}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-02828.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfn/Golling0R16, author = {Mario Golling and Robert Koch and Gabi Dreo Rodosek}, editor = {Paul M{\"{u}}ller and Bernhard Neumair and Helmut Reiser and Gabi Dreo Rodosek}, title = {Privacy-aware intrusion detection in high-speed backbone networks - design and prototypical implementation of a multi-layered {NIDS}}, booktitle = {9. DFN-Forum - Kommunikationstechnologien, 30. Mai - 1. Juni 2016, Rostock, Germany}, series = {{LNI}}, volume = {{P-257}}, pages = {77--86}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/896}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfn/Golling0R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/KimS16, author = {Sanghui Kim and DongBack Seo}, editor = {Ting{-}Peng Liang and Shin{-}Yuan Hung and Patrick Y. K. Chau and She{-}I Chang}, title = {Factors affecting Privacy Intrusion on Social Networking sites}, booktitle = {20th Pacific Asia Conference on Information Systems, {PACIS} 2016, Chiayi, Taiwan, June 27 - July 1, 2016}, pages = {61}, year = {2016}, url = {http://aisel.aisnet.org/pacis2016/61}, timestamp = {Tue, 08 Nov 2016 09:28:09 +0100}, biburl = {https://dblp.org/rec/conf/pacis/KimS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DaraM16, author = {Sashank Dara and V. N. Muralidhara}, title = {Privacy Preserving Architectures for Collaborative Intrusion Detection}, journal = {CoRR}, volume = {abs/1602.02452}, year = {2016}, url = {http://arxiv.org/abs/1602.02452}, eprinttype = {arXiv}, eprint = {1602.02452}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DaraM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/LiCSALR15, author = {Shancang Li and Junhua Chen and Theodoros Spyridopoulos and Panagiotis Andriotis and Robert Ludwiniak and Gordon Russell}, editor = {Theo Tryfonas and Ioannis G. Askoxylakis}, title = {Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - Third International Conference, {HAS} 2015, Held as Part of {HCI} International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9190}, pages = {379--390}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20376-8\_34}, doi = {10.1007/978-3-319-20376-8\_34}, timestamp = {Tue, 01 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/LiCSALR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issnip/DoN15, author = {Hoang Giang Do and Wee Keong Ng}, title = {Privacy-preserving approach for sharing and processing intrusion alert data}, booktitle = {Tenth {IEEE} International Conference on Intelligent Sensors, Sensor Networks and Information Processing, {ISSNIP} 2015, Singapore, April 7-9, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSNIP.2015.7106911}, doi = {10.1109/ISSNIP.2015.7106911}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issnip/DoN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/NiksefatSMS14, author = {Salman Niksefat and Babak Sadeghiyan and Payman Mohassel and Seyed Saeed Sadeghian}, title = {{ZIDS:} {A} Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols}, journal = {Comput. J.}, volume = {57}, number = {4}, pages = {494--509}, year = {2014}, url = {https://doi.org/10.1093/comjnl/bxt019}, doi = {10.1093/COMJNL/BXT019}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/NiksefatSMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Mo14, author = {Jojo Y. C. Mo}, title = {Are data protection laws sufficient for privacy intrusions? The case in Hong Kong}, journal = {Comput. Law Secur. Rev.}, volume = {30}, number = {4}, pages = {429--438}, year = {2014}, url = {https://doi.org/10.1016/j.clsr.2014.05.006}, doi = {10.1016/J.CLSR.2014.05.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Mo14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/WahidLZ14, author = {Alif Wahid and Christopher Leckie and Chenfeng Vincent Zhou}, title = {Estimating the number of hosts corresponding to an intrusion alert while preserving privacy}, journal = {J. Comput. Syst. Sci.}, volume = {80}, number = {3}, pages = {502--519}, year = {2014}, url = {https://doi.org/10.1016/j.jcss.2013.06.007}, doi = {10.1016/J.JCSS.2013.06.007}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/WahidLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/KurM14, author = {Jir{\'{\i}} Kur and Vashek Maty{\'{a}}s}, editor = {Claudia Eckert and Sokratis K. Katsikas and G{\"{u}}nther Pernul}, title = {A Protocol for Intrusion Detection in Location Privacy-Aware Wireless Sensor Networks}, booktitle = {Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8647}, pages = {180--190}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09770-1\_16}, doi = {10.1007/978-3-319-09770-1\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/KurM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MatyasK13, author = {Vashek Matyas and Jir{\'{\i}} Kur}, title = {Conflicts between Intrusion Detection and Privacy Mechanisms for Wireless Sensor Networks}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {5}, pages = {73--76}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.111}, doi = {10.1109/MSP.2013.111}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MatyasK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/OhanaPC13, author = {Donny Jacob Ohana and Liza Phillips and Lei Chen}, title = {Preventing Cell Phone Intrusion and Theft using Biometrics}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {173--180}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.19}, doi = {10.1109/SPW.2013.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/OhanaPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MoreMJF12, author = {Sumit More and Mary Matthews and Anupam Joshi and Tim Finin}, title = {A Knowledge-Based Approach to Intrusion Detection Modeling}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {75--81}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.26}, doi = {10.1109/SPW.2012.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MoreMJF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/BitterNEW12, author = {Christian Bitter and John North and David A. Elizondo and Tim Watson}, editor = {David A. Elizondo and Agusti Solanas and Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}}}, title = {An Introduction to the Use of Neural Networks for Network Intrusion Detection}, booktitle = {Computational Intelligence for Privacy and Security}, series = {Studies in Computational Intelligence}, volume = {394}, pages = {5--24}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-25237-2\_2}, doi = {10.1007/978-3-642-25237-2\_2}, timestamp = {Tue, 16 May 2017 14:24:36 +0200}, biburl = {https://dblp.org/rec/series/sci/BitterNEW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-2030, author = {Abdul Razaque and Khaled M. Elleithy}, title = {Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems {(MSAIDS)} to Protect Privacy of Users over Mobile Collaborative Learning {(MCL)}}, journal = {CoRR}, volume = {abs/1210.2030}, year = {2012}, url = {http://arxiv.org/abs/1210.2030}, eprinttype = {arXiv}, eprint = {1210.2030}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-2030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Ulltveit-MoeOK11, author = {Nils Ulltveit{-}Moe and Vladimir A. Oleshchuk and Geir M. K{\o}ien}, title = {Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context}, journal = {Wirel. Pers. Commun.}, volume = {57}, number = {3}, pages = {317--338}, year = {2011}, url = {https://doi.org/10.1007/s11277-010-0069-6}, doi = {10.1007/S11277-010-0069-6}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/Ulltveit-MoeOK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BahsiL11, author = {Hayretdin Bahsi and Albert Levi}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Preserving organizational privacy in intrusion detection log sharing}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--14}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954705/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BahsiL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcoss/SintoniSDSOR11, author = {Alex Sintoni and Anthony Schoofs and Aiden R. Doherty and Alan F. Smeaton and Gregory M. P. O'Hare and Antonio G. Ruzzelli}, title = {Generating power footprints without appliance interaction: An enabler for privacy intrusion}, booktitle = {Distributed Computing in Sensor Systems, 7th {IEEE} International Conference and Workshops, {DCOSS} 2011, Barcelona, Spain, 27-29 June, 2011, Proceedings}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DCOSS.2011.5982180}, doi = {10.1109/DCOSS.2011.5982180}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dcoss/SintoniSDSOR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangWZF11, author = {Chuang Wang and Guiling Wang and Wensheng Zhang and Taiming Feng}, title = {Reconciling privacy preservation and intrusion detection in sensory data aggregation}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {336--340}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5935177}, doi = {10.1109/INFCOM.2011.5935177}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/WangWZF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icann/Guijarro-BerdinasFSF10, author = {Bertha Guijarro{-}Berdi{\~{n}}as and Santiago Fern{\'{a}}ndez{-}Lorenzo and Noelia S{\'{a}}nchez{-}Maro{\~{n}}o and Oscar Fontenla{-}Romero}, editor = {Konstantinos I. Diamantaras and Wlodek Duch and Lazaros S. Iliadis}, title = {A Privacy-Preserving Distributed and Incremental Learning Method for Intrusion Detection}, booktitle = {Artificial Neural Networks - {ICANN} 2010 - 20th International Conference, Thessaloniki, Greece, September 15-18, 2010, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6352}, pages = {415--421}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15819-3\_56}, doi = {10.1007/978-3-642-15819-3\_56}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icann/Guijarro-BerdinasFSF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/BenaliBGC10, author = {Fatiha Benali and Nadia Bennani and Gabriele Gianini and Stelvio Cimato}, editor = {Robert Meersman and Tharam S. Dillon and Pilar Herrero}, title = {A Distributed and Privacy-Preserving Method for Network Intrusion Detection}, booktitle = {On the Move to Meaningful Internet Systems, {OTM} 2010 - Confederated International Conferences: CoopIS, IS, {DOA} and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6427}, pages = {861--875}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16949-6\_13}, doi = {10.1007/978-3-642-16949-6\_13}, timestamp = {Thu, 14 Oct 2021 10:28:26 +0200}, biburl = {https://dblp.org/rec/conf/otm/BenaliBGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SommerP10, author = {Robin Sommer and Vern Paxson}, title = {Outside the Closed World: On Using Machine Learning for Network Intrusion Detection}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {305--316}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.25}, doi = {10.1109/SP.2010.25}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/SommerP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1007-1473, author = {Xinyu Xing and Jianxun Dang and Richard Han and Xue Liu and Shivakant Mishra}, title = {Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures}, journal = {CoRR}, volume = {abs/1007.1473}, year = {2010}, url = {http://arxiv.org/abs/1007.1473}, eprinttype = {arXiv}, eprint = {1007.1473}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1007-1473.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/TroussetPM09, author = {Fran{\c{c}}ois Trousset and Pascal Poncelet and Florent Masseglia}, editor = {Victor Munt{\'{e}}s{-}Mulero and Jordi Nin}, title = {{SAX:} a privacy preserving general pupose methodapplied to detection of intrusions}, booktitle = {Proceeding of the {ACM} First International Workshop on Privacy and Anonymity for Very Large Databases, {CIKM-PAVLAD} 2009, Hong Kong, China, November 6, 2009}, pages = {17--24}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1651449.1651454}, doi = {10.1145/1651449.1651454}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cikm/TroussetPM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egc/VermaTPM09, author = {Nischal Verma and Fran{\c{c}}ois Trousset and Pascal Poncelet and Florent Masseglia}, editor = {Fabrice Guillet and Gilbert Ritschard and Djamel Abdelkader Zighed and Henri Briand}, title = {Intrusion Detections in Collaborative Organizations by Preserving Privacy}, booktitle = {Advances in Knowledge Discovery and Management [Best of {EGC} 2009, Strasbourg, France]}, series = {Studies in Computational Intelligence}, volume = {292}, pages = {235--247}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00580-0\_14}, doi = {10.1007/978-3-642-00580-0\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/egc/VermaTPM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/TanaraksiritavornM09, author = {Soontaree Tanaraksiritavorn and Shivakant Mishra}, title = {A Privacy Preserving Intrusion Tolerant Voting Architecture}, booktitle = {Proceedings of The Eighth {IEEE} International Symposium on Networking Computing and Applications, {NCA} 2009, July 9-11, 2009, Cambridge, Massachusetts, {USA}}, pages = {148--155}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NCA.2009.43}, doi = {10.1109/NCA.2009.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/TanaraksiritavornM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Allen08, author = {Thomas G. L. Allen}, editor = {Belur V. Dasarathy}, title = {An innovative middle tier design for protecting federal privacy act data}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008}, series = {{SPIE} Proceedings}, volume = {6973}, pages = {697304}, publisher = {{SPIE}}, year = {2008}, url = {https://doi.org/10.1117/12.770415}, doi = {10.1117/12.770415}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Allen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Flegel07, author = {Ulrich Flegel}, title = {Privacy-Respecting Intrusion Detection}, series = {Advances in Information Security}, volume = {35}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-68254-9}, doi = {10.1007/978-0-387-68254-9}, isbn = {978-0-387-34346-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Flegel07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/ParkLLC07, author = {Hyun{-}A Park and Dong Hoon Lee and Jongin Lim and Sang Hyun Cho}, editor = {Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang and Qing Yang and Xueqi Cheng and Jue Wang and Fei{-}Yue Wang and Hsinchun Chen}, title = {{PPIDS:} Privacy Preserving Intrusion Detection System}, booktitle = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI} 2007, Chengdu, China, April 11-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4430}, pages = {269--274}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71549-8\_27}, doi = {10.1007/978-3-540-71549-8\_27}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/paisi/ParkLLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/LiDZ07, author = {Zhuowei Li and Amitabha Das and Jianying Zhou}, editor = {Costas Lambrinoudakis and G{\"{u}}nther Pernul and A Min Tjoa}, title = {Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures}, booktitle = {Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4657}, pages = {54--64}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74409-2\_8}, doi = {10.1007/978-3-540-74409-2\_8}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/LiDZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMicec/AnJC06, author = {Xiangdong An and Dawn N. Jutla and Nick Cercone}, editor = {Mark S. Fox and Bruce Spencer}, title = {Privacy intrusion detection using dynamic Bayesian networks}, booktitle = {Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {156}, pages = {208--215}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1151454.1151493}, doi = {10.1145/1151454.1151493}, timestamp = {Tue, 06 Apr 2021 12:12:56 +0200}, biburl = {https://dblp.org/rec/conf/ACMicec/AnJC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/StytzB06, author = {Martin R. Stytz and Sheila B. Banks}, editor = {Belur V. Dasarathy}, title = {Personal privacy, information assurance, and the threat posed by malware techology}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {624107}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.665344}, doi = {10.1117/12.665344}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/StytzB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/AnJC06, author = {Xiangdong An and Dawn N. Jutla and Nick Cercone}, title = {A Bayesian Network Approach to Detecting Privacy Intrusion}, booktitle = {Proceedings of the 2006 {IEEE/WIC/ACM} International Conference on Intelligent Agent Technology - Workshops, Hong Kong, China, 18-22 December 2006}, pages = {73--76}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/WI-IATW.2006.6}, doi = {10.1109/WI-IATW.2006.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/AnJC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideas/AnJC06, author = {Xiangdong An and Dawn N. Jutla and Nick Cercone}, editor = {Bipin C. Desai and Shyam K. Gupta}, title = {Probabilistic Internal Privacy Intrusion Detection}, booktitle = {Tenth International Database Engineering and Applications Symposium {(IDEAS} 2006), 11-14 December 2006, Delhi, India}, pages = {317--318}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IDEAS.2006.38}, doi = {10.1109/IDEAS.2006.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ideas/AnJC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SodiyaLA05, author = {Adesina S. Sodiya and H. O. D. Longe and Adio T. Akinwale}, title = {Maintaining privacy in anomaly-based intrusion detection systems}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {1}, pages = {72--80}, year = {2005}, url = {https://doi.org/10.1108/09685220510582683}, doi = {10.1108/09685220510582683}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SodiyaLA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/VenterOE04, author = {Hein S. Venter and Martin S. Olivier and Jan H. P. Eloff}, title = {{PIDS:} a privacy intrusion detection system}, journal = {Internet Res.}, volume = {14}, number = {5}, pages = {360--365}, year = {2004}, url = {https://doi.org/10.1108/10662240410566953}, doi = {10.1108/10662240410566953}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/VenterOE04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Johnston01, author = {Steven R. Johnston}, editor = {Wenke Lee and Ludovic M{\'{e}} and Andreas Wespi}, title = {The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information}, booktitle = {Recent Advances in Intrusion Detection, 4th International Symposium, {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2212}, pages = {150--171}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45474-8\_10}, doi = {10.1007/3-540-45474-8\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/Johnston01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LundinJ00, author = {Emilie Lundin and Erland Jonsson}, title = {Anomaly-based intrusion detection: privacy concerns and other problems}, journal = {Comput. Networks}, volume = {34}, number = {4}, pages = {623--640}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00134-1}, doi = {10.1016/S1389-1286(00)00134-1}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LundinJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BiskupF00, author = {Joachim Biskup and Ulrich Flegel}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {28--48}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_3}, doi = {10.1007/3-540-39945-3\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BiskupF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LundinJ99, author = {Emilie Lundin and Erland Jonsson}, title = {Privacy vs. Intrusion Detection Analysis}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, url = {http://www.raid-symposium.org/raid99/PAPERS/Lundin.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LundinJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SobireyFR97, author = {Michael Sobirey and Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg}, editor = {Louise Yngstr{\"{o}}m and Jan Carlsen}, title = {Pseudonymous audit for privacy enhanced intrusion detection}, booktitle = {Information Security in Research and Business, Proceedings of the {IFIP} {TC11} 13th International Conference on Information Security {(SEC} '97), 14-16 May 1997, Copenhagen, Denmark}, series = {{IFIP} Conference Proceedings}, volume = {92}, pages = {151--163}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Thu, 03 Jan 2002 12:08:24 +0100}, biburl = {https://dblp.org/rec/conf/sec/SobireyFR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/SipiorW96, author = {Janice C. Sipior and Burke T. Ward}, editor = {Janice I. DeGross and Sirkka L. Jarvenpaa and Ananth Srinivasan}, title = {United States Cases of Employee E-Mail Privacy Intrusions: Do You Really Know the Legal Consequences?}, booktitle = {Proceedings of the Seventeenth International Conference on Information Systems, Cleveland, Ohio, USA, December 16-18, 1996}, pages = {16}, publisher = {Association for Information Systems}, year = {1996}, url = {http://aisel.aisnet.org/icis1996/16}, timestamp = {Sun, 29 Mar 2015 13:07:34 +0200}, biburl = {https://dblp.org/rec/conf/icis/SipiorW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.