{"id":"https://openalex.org/W4386191465","doi":"https://doi.org/10.1145/3617181","title":"A Self-adaptive and Secure Approach to Share Network Trace Data","display_name":"A Self-adaptive and Secure Approach to Share Network Trace Data","publication_year":2023,"publication_date":"2023-08-26","ids":{"openalex":"https://openalex.org/W4386191465","doi":"https://doi.org/10.1145/3617181"},"language":"en","primary_location":{"id":"doi:10.1145/3617181","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3617181","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3617181","source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3617181","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067368473","display_name":"Antonios Xenakis","orcid":"https://orcid.org/0000-0002-7072-9994"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Antonios Xenakis","raw_affiliation_strings":["University of Maryland Baltimore County, USA"],"raw_orcid":"https://orcid.org/0009-0009-4321-6841","affiliations":[{"raw_affiliation_string":"University of Maryland Baltimore County, USA","institution_ids":["https://openalex.org/I79272384"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092700224","display_name":"Sabrina Mamtaz Nourin","orcid":"https://orcid.org/0009-0000-4822-5522"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sabrina Mamtaz Nourin","raw_affiliation_strings":["University of Maryland Baltimore County, USA"],"raw_orcid":"https://orcid.org/0009-0000-4822-5522","affiliations":[{"raw_affiliation_string":"University of Maryland Baltimore County, USA","institution_ids":["https://openalex.org/I79272384"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100438515","display_name":"Zhiyuan Chen","orcid":"https://orcid.org/0000-0002-6984-7248"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhiyuan Chen","raw_affiliation_strings":["University of Maryland Baltimore County, USA"],"raw_orcid":"https://orcid.org/0000-0002-6984-7248","affiliations":[{"raw_affiliation_string":"University of Maryland Baltimore County, USA","institution_ids":["https://openalex.org/I79272384"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065573453","display_name":"George Karabatis","orcid":"https://orcid.org/0000-0002-2208-0801"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George Karabatis","raw_affiliation_strings":["University of Maryland Baltimore County, USA"],"raw_orcid":"https://orcid.org/0000-0002-2208-0801","affiliations":[{"raw_affiliation_string":"University of Maryland Baltimore County, USA","institution_ids":["https://openalex.org/I79272384"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060546610","display_name":"Ahmed Aleroud","orcid":"https://orcid.org/0000-0003-4337-1488"},"institutions":[{"id":"https://openalex.org/I25041050","display_name":"Augusta University","ror":"https://ror.org/012mef835","country_code":"US","type":"education","lineage":["https://openalex.org/I25041050"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmed Aleroud","raw_affiliation_strings":["Augusta University, USA"],"raw_orcid":"https://orcid.org/0000-0003-4337-1488","affiliations":[{"raw_affiliation_string":"Augusta University, USA","institution_ids":["https://openalex.org/I25041050"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092700225","display_name":"Jhancy Amarsingh","orcid":"https://orcid.org/0009-0002-8580-187X"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jhancy Amarsingh","raw_affiliation_strings":["University of Maryland Baltimore County, USA"],"raw_orcid":"https://orcid.org/0009-0002-8580-187X","affiliations":[{"raw_affiliation_string":"University of Maryland Baltimore County, USA","institution_ids":["https://openalex.org/I79272384"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5067368473"],"corresponding_institution_ids":["https://openalex.org/I79272384"],"apc_list":null,"apc_paid":null,"fwci":0.1688,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.55886566,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"4","issue":"4","first_page":"1","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8241182565689087},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.8056726455688477},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.7725104093551636},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7232542634010315},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.7214870452880859},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5969630479812622},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5679284334182739},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4828932285308838},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.44055482745170593},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4247223436832428},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.414675235748291},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30810993909835815}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8241182565689087},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.8056726455688477},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.7725104093551636},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7232542634010315},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.7214870452880859},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5969630479812622},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5679284334182739},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4828932285308838},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.44055482745170593},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4247223436832428},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.414675235748291},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30810993909835815},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3617181","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3617181","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3617181","source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3617181","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3617181","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3617181","source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386191465.pdf","grobid_xml":"https://content.openalex.org/works/W4386191465.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1992286709","https://openalex.org/W1993116423","https://openalex.org/W2151856781","https://openalex.org/W2159024459","https://openalex.org/W2328150949","https://openalex.org/W2599014521","https://openalex.org/W2804166280","https://openalex.org/W3045004532","https://openalex.org/W3137654308","https://openalex.org/W3203236016","https://openalex.org/W3205275092","https://openalex.org/W4205228770","https://openalex.org/W4248358572","https://openalex.org/W4253682725","https://openalex.org/W4317889697","https://openalex.org/W4321993631"],"related_works":["https://openalex.org/W2171597999","https://openalex.org/W17155033","https://openalex.org/W2189136227","https://openalex.org/W1866537546","https://openalex.org/W630850086","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W3044308011"],"abstract_inverted_index":{"A":[0,177],"large":[1],"volume":[2],"of":[3,69,101,131,175,179],"network":[4,27,30,70,90,164],"trace":[5,91,165],"data":[6,44,76,92,166],"are":[7,39],"collected":[8],"by":[9],"the":[10,59,67,102,123,129,135,180,191,195],"government":[11],"and":[12,14,17,32,116,134,159,167,171],"public":[13],"private":[15],"organizations":[16,38],"can":[18,83],"be":[19,95,139],"analyzed":[20],"for":[21,49,146],"various":[22],"purposes":[23],"such":[24,127],"as":[25,128],"resolving":[26],"problems,":[28],"improving":[29],"performance,":[31],"understanding":[33],"user":[34,148],"behavior.":[35],"However,":[36],"most":[37],"reluctant":[40],"to":[41,58,85,94,149,162],"share":[42],"their":[43,118],"with":[45,183],"any":[46],"external":[47],"experts":[48],"analysis,":[50],"because":[51],"they":[52,111],"contain":[53],"sensitive":[54,79],"information":[55,80],"deemed":[56],"proprietary":[57],"organization,":[60],"thus":[61],"raising":[62],"privacy":[63,132],"concerns.":[64],"Even":[65],"if":[66],"payload":[68],"packets":[71],"is":[72,143],"not":[73],"shared,":[74],"header":[75],"may":[77],"disclose":[78],"that":[81,137,190],"adversaries":[82],"exploit":[84],"perform":[86],"unauthorized":[87],"actions.":[88],"So":[89],"need":[93],"anonymized":[96],"before":[97],"being":[98],"shared.":[99],"Most":[100],"existing":[103,184,196],"anonymization":[104,185,197],"tools":[105,186],"have":[106],"two":[107],"major":[108],"shortcomings:":[109],"(1)":[110],"cannot":[112],"provide":[113],"provable":[114,169],"protection,":[115],"(2)":[117],"performance":[119],"relies":[120],"on":[121],"setting":[122],"right":[124],"parameter":[125],"values":[126],"degree":[130],"protection":[133,170],"features":[136],"should":[138],"anonymized,":[140],"but":[141],"there":[142],"little":[144],"assistance":[145],"a":[147,157],"optimally":[150],"set":[151],"these":[152],"parameters.":[153,176],"This":[154],"article":[155],"proposes":[156],"self-adaptive":[158],"secure":[160],"approach":[161,182],"anonymize":[163],"provides":[168],"automatic":[172],"optimal":[173],"settings":[174],"comparison":[178],"proposed":[181,192],"via":[187],"experimentation":[188],"demonstrated":[189],"method":[193],"outperforms":[194],"techniques.":[198]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
