Detecting Anomalous LAN Activities under Differential Privacy
Uložené v:
| Vydané v: | Security and Communication Networks Ročník 2022; s. 1 - 15 |
|---|---|
| Hlavní autori: | , , , , , |
| Médium: | Journal Article |
| Jazyk: | Japanese |
| Vydavateľské údaje: |
Hindawi Limited
12.04.2022
|
| Predmet: | |
| ISSN: | 1939-0114, 1939-0122 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Author | Kuljaree Tantayakul Norrathep Rattanavipanon Hideya Ochiai Donlapark Ponnoprat Sinchai Kamolphiwong Touchai Angchuan |
|---|---|
| Author_xml | – sequence: 1 fullname: Norrathep Rattanavipanon – sequence: 2 orcidid: 0000-0001-5679-4426 fullname: Donlapark Ponnoprat – sequence: 3 orcidid: 0000-0002-4568-6726 fullname: Hideya Ochiai – sequence: 4 fullname: Kuljaree Tantayakul – sequence: 5 fullname: Touchai Angchuan – sequence: 6 fullname: Sinchai Kamolphiwong |
| BackLink | https://cir.nii.ac.jp/crid/1871709543140334976$$DView record in CiNii |
| BookMark | eNo9jz1LA0EURQeJYIzp_AFT2K55b76nsFgSo8KiFullZvatjMRZ2N0E_PcaFJt7D7c4cC_ZrPSFGLtGuEXUeiVAiBUqkALgjM3RS18BCjH7Z1QXbDmOOYI0wkjQYs7uNjRRmnJ553XpP8O-P4y8qZ95_TMe85Rp5IfS0sA3uetooDLlsOevQz6G9HXFzruwH2n51wu2297v1o9V8_LwtK6b6sNrU9kYpEjeCXJAKkGMVjsn0bUBjFIpAGqZkqIQo6aUEII1LQrpbGuo7eSC3fxqS85vKZ8SnUULXit5uiyVt0Z-Ayh-SZQ |
| ContentType | Journal Article |
| DBID | RYH |
| DOI | 10.1155/2022/1403200 10.48550/arxiv.2204.06704 |
| DatabaseName | CiNii Complete |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1939-0122 |
| EndPage | 15 |
| GroupedDBID | .4S .DC 05W 0R~ 123 24P 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAFWJ AAMMB AAONW ACCMX ACGFO ADBBV ADIZJ ADMLS AEFGJ AENEX AFBPY AGXDD AIDQK AIDYY AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN ARCSS ATUGU AZVAB BCNDV BHBCM BNHUX BOGZA BRXPI CS3 DR2 DU5 EBS EIS F1Z G-S H13 HZ~ IX1 LITHE MY. MY~ NNB O9- OIG OK1 P2P RYH TH9 TUS W99 WBKPD XV2 |
| ID | FETCH-LOGICAL-j956-7ba32c982e80e4c0bb7588318da0644ca0153cc4eabb5ecc10a76d12387d6edf3 |
| ISSN | 1939-0114 |
| IngestDate | Mon Nov 10 09:13:50 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | Japanese |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-j956-7ba32c982e80e4c0bb7588318da0644ca0153cc4eabb5ecc10a76d12387d6edf3 |
| ORCID | 0000-0002-4568-6726 0000-0001-5679-4426 |
| OpenAccessLink | https://cir.nii.ac.jp/crid/1871709543140334976 |
| PageCount | 15 |
| ParticipantIDs | nii_cinii_1871709543140334976 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-04-12 |
| PublicationDateYYYYMMDD | 2022-04-12 |
| PublicationDate_xml | – month: 04 year: 2022 text: 2022-04-12 day: 12 |
| PublicationDecade | 2020 |
| PublicationTitle | Security and Communication Networks |
| PublicationYear | 2022 |
| Publisher | Hindawi Limited |
| Publisher_xml | – name: Hindawi Limited |
| SSID | ssib036263052 ssj0061474 ssib053799003 |
| Score | 2.345815 |
| SourceID | nii |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Computer Science - Cryptography and Security Computer Science - Networking and Internet Architecture Cryptography and Security (cs.CR) FOS: Computer and information sciences Networking and Internet Architecture (cs.NI) |
| Title | Detecting Anomalous LAN Activities under Differential Privacy |
| URI | https://cir.nii.ac.jp/crid/1871709543140334976 |
| Volume | 2022 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 issn: 1939-0114 databaseCode: 24P dateStart: 20170101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEF5FLQc4oPISryIfuFlu7V3bu3uMaKseqhBBhHpD4_VGchqcyAST_gd-NDNrx3YoEnDgsrI2fmZGM9-8GXsrJGScR_Mg5DYPYh1BoNJ5FCR5LnSudZK55PFPV3IyUdfXejoa_djVwtRLWZZqu9Xr_0pq3ENiU-nsP5C7uylu4DESHVckO65_RfgzS3EB5-0oV19gSTmuV-OJPzZuUARaxm72bYXSrpmNsiGn-bQqajB7Md6P7Wg7F1_YKyShMmFK6Orw-GRVVQQl1_4H2CDchLpAKdNH-M9W5RK1cnXjT2m89RpP7n3eub0F_z3lXBd9YGm5gMpaf4aEh1u4adMXW_cEWrauD2LHUJfkWfhe3C3XQuBIiVpNBemJHe7xPfFMNx1I2GigqptC0LtKIKF-GXSd6yZAI-LD353omrmRLqy2RX3CObW8TSU1lz3kMtEkI3k83Ukn17cnTDowmAipyQ280_uIc2Sbw9B82K7MIknIw8RP2zdpQuvu2ae_PhkBTlkUA4AzO2IPW8vEGzcc9YiNFvCYPRj0q3zCet7yOt7ykLe8nrc8x1vekLe8lreestnF-ezdZdDO3wgW1J1SZiC40YpbFdrYhFmGtqVCHZAD4tjYACJJYUxsIcsSlARRCDLNEQkpmac2n4tn7AA5zT5nnjAo5gGhvyFzX2UQI060sdJZKsAIeMGO8bs_m4LWCG14icgfoS3-YyJGwPzyD7-_Yvd73nvNDjbVN3vM7pl6U3yt3jgy_gRpQWQc |
| linkProvider | Wiley-Blackwell |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detecting+Anomalous+LAN+Activities+under+Differential+Privacy&rft.jtitle=Security+and+Communication+Networks&rft.au=Norrathep+Rattanavipanon&rft.au=Donlapark+Ponnoprat&rft.au=Hideya+Ochiai&rft.au=Kuljaree+Tantayakul&rft.date=2022-04-12&rft.pub=Hindawi+Limited&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2022&rft.spage=1&rft.epage=15&rft_id=info:doi/10.1155%2F2022%2F1403200&rft_id=info:doi/10.48550%2Farxiv.2204.06704 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |