search menu icon-carat-right cmu-wordmark

Privacy Preserving Network Flow Recording

In this presentation, the authors describe ways to use netflow data in ways that preserve privacy.

Software Engineering Institute



  • Basic Ideas
  • Requirements
  • NetFlow
  • Threat Model and Challenges
  • Scenarios
  • Algorithm Steps, Queries, and Setup
  • Results
  • Discussion and Future Work

This presentation was delivered at FloCon 2011

Part of a Collection

FloCon 2011 Collection

This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.