{"id":"https://openalex.org/W2008798004","doi":"https://doi.org/10.1145/1529282.1529572","title":"A taxonomy and adversarial model for attacks against network log anonymization","display_name":"A taxonomy and adversarial model for attacks against network log anonymization","publication_year":2009,"publication_date":"2009-03-08","ids":{"openalex":"https://openalex.org/W2008798004","doi":"https://doi.org/10.1145/1529282.1529572","mag":"2008798004"},"language":"en","primary_location":{"id":"doi:10.1145/1529282.1529572","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1529282.1529572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 ACM symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047532543","display_name":"Justin King","orcid":"https://orcid.org/0000-0002-5144-1821"},"institutions":[{"id":"https://openalex.org/I5388228","display_name":"University of Rochester","ror":"https://ror.org/022kthw22","country_code":"US","type":"education","lineage":["https://openalex.org/I5388228"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Justin King","raw_affiliation_strings":["IBM Rochester","IBM, Rochester,"],"affiliations":[{"raw_affiliation_string":"IBM Rochester","institution_ids":[]},{"raw_affiliation_string":"IBM, Rochester,","institution_ids":["https://openalex.org/I5388228"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088200494","display_name":"Kiran Lakkaraju","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]},{"id":"https://openalex.org/I308392441","display_name":"International University of the Caribbean","ror":"https://ror.org/02rv57d03","country_code":"JM","type":"education","lineage":["https://openalex.org/I308392441"]}],"countries":["JM","US"],"is_corresponding":false,"raw_author_name":"Kiran Lakkaraju","raw_affiliation_strings":["UIUC","UIUC#TAB#"],"affiliations":[{"raw_affiliation_string":"UIUC","institution_ids":["https://openalex.org/I308392441"]},{"raw_affiliation_string":"UIUC#TAB#","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076711842","display_name":"Adam Slagell","orcid":null},"institutions":[{"id":"https://openalex.org/I19908199","display_name":"National Center for Supercomputing Applications","ror":"https://ror.org/03g9ch715","country_code":"BG","type":"facility","lineage":["https://openalex.org/I19908199"]}],"countries":["BG"],"is_corresponding":false,"raw_author_name":"Adam Slagell","raw_affiliation_strings":["NCSA, UIUC","NCSA/UIUC#TAB#"],"affiliations":[{"raw_affiliation_string":"NCSA, UIUC","institution_ids":["https://openalex.org/I19908199"]},{"raw_affiliation_string":"NCSA/UIUC#TAB#","institution_ids":["https://openalex.org/I19908199"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047532543"],"corresponding_institution_ids":["https://openalex.org/I5388228"],"apc_list":null,"apc_paid":null,"fwci":3.7713,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.93435359,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1286","last_page":"1293"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8765802383422852},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7226698398590088},{"id":"https://openalex.org/keywords/taxonomy","display_name":"Taxonomy (biology)","score":0.5719501376152039},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3613150417804718},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30223581194877625}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8765802383422852},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7226698398590088},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.5719501376152039},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3613150417804718},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30223581194877625},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1529282.1529572","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1529282.1529572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 ACM symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4699999988079071}],"awards":[{"id":"https://openalex.org/G4335754727","display_name":null,"funder_award_id":"CNS 0524643","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W104651583","https://openalex.org/W184773994","https://openalex.org/W1529945719","https://openalex.org/W1531756074","https://openalex.org/W1533403794","https://openalex.org/W1544406760","https://openalex.org/W1592781522","https://openalex.org/W1593744771","https://openalex.org/W1594076931","https://openalex.org/W1599181005","https://openalex.org/W1805704774","https://openalex.org/W1968860775","https://openalex.org/W1988918299","https://openalex.org/W1994956399","https://openalex.org/W2024089312","https://openalex.org/W2078021840","https://openalex.org/W2083961700","https://openalex.org/W2099848066","https://openalex.org/W2104599106","https://openalex.org/W2106295659","https://openalex.org/W2125834021","https://openalex.org/W2147215426","https://openalex.org/W2532289025","https://openalex.org/W4231645469","https://openalex.org/W4299301436","https://openalex.org/W6607693354"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W4246396837","https://openalex.org/W2482350142","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4288019534"],"abstract_inverted_index":{"In":[0,59],"recent":[1],"years,":[2],"it":[3,137],"has":[4,104],"become":[5],"important":[6],"for":[7],"researchers,":[8],"security":[9],"incident":[10],"responders":[11],"and":[12,18,23,114],"educators":[13],"to":[14,29,37,52,107,121],"share":[15],"network":[16],"logs,":[17],"many":[19,42],"log":[20],"anonymization":[21,57,127],"tools":[22],"techniques":[24],"have":[25,45],"been":[26,46],"put":[27],"forth":[28],"sanitize":[30],"this":[31,60],"sensitive":[32],"data":[33,112],"source":[34],"in":[35,48,55,72],"order":[36],"enable":[38],"more":[39],"collaboration.":[40],"Unfortunately,":[41],"new":[43,80],"attacks":[44,71,94],"created,":[47],"parallel,":[49],"that":[50,66,95],"try":[51],"exploit":[53],"weaknesses":[54],"the":[56,88,91,109,123,133],"process.":[58],"paper,":[61],"we":[62,84],"present":[63,78],"a":[64,73,79,100,119,130],"taxonomy":[65,89],"relates":[67],"similar":[68],"kinds":[69],"of":[70,93,125,132,135],"meaningful":[74],"way.":[75],"We":[76],"also":[77],"adversarial":[81],"model":[82],"which":[83],"can":[85,96],"map":[86],"into":[87],"by":[90,99,116],"types":[92,134],"be":[97],"perpetrated":[98],"particular":[101],"adversary.":[102],"This":[103],"helped":[105],"us":[106,118],"negotiate":[108],"trade-offs":[110],"between":[111],"utility":[113],"trust,":[115],"giving":[117],"way":[120],"specify":[122],"strength":[124],"an":[126],"scheme":[128],"as":[129],"measure":[131],"adversaries":[136],"protects":[138],"against.":[139]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
