A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
International Research Journal of Engineering and Technology
An application encompasses network modeling and simulation, recognition of privacy assaults, and formalization of research results. Indeed, existing techniques for network flow sanitization are vulnerable to different kinds of attacks, and solutions proposed for micro data anonymity cannot be directly applied to network traces. In our previous research, we proposed an obfuscation technique for network flows, providing formal confidentiality guarantees under realistic assumptions about thefatcat:srxovfbxy5bbzkfpqy5aojfz6a