Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1 Hit in 3.9 sec

Shanon

Mislav Culig
2021 unpublished
This data can be contained in various logs, including packet traces which contain packets captured from an interface within the network.  ...  Access to real-world data is important for network research and security.  ...  Assuming all the queries are secure and policy is kept up to date, preventing the queries themselves from being used in an attack, the system proposed by Mirkovic still has unanonymized traces stored on  ... 
doi:10.25365/thesis.65779 fatcat:yvhg5fetcfac3pojpio7cwrkmq