Now showing items 1-5 of 5

    • Anonymizing cybersecurity data in critical infrastructures: the CIPSEC approach 

      Rodríguez Hoyos, Ana Fernanda; Estrada Jiménez, José Antonio; Rebollo-Monedero, David; Forné Muñoz, Jorge; Trapero Burgos, Rubén; Álvarez Romero, Antonio (ISCRAM, 2019)
      Conference report
      Open Access
      Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold. ...
    • Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis 

      Rebollo-Monedero, David; Mezher, Ahmad Mohamad; Casanova, Xavier; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2019-07-09)
      Article
      Open Access
      k-Anonymous microaggregation is a widespread technique to address the problem of protecting the privacy of the respondents involved beyond the mere suppression of their identifiers, in applications where preserving the ...
    • Mathematically optimized, recursive prepartitioning strategies for k-anonymous microaggregation of large-scale datasets 

      Pallarès Segarra, Esteve; Rebollo-Monedero, David; Rodríguez Hoyos, Ana Fernanda; Estrada Jiménez, José Antonio; Mezher, Ahmad Mohamad; Forné Muñoz, Jorge (2019-11-11)
      Article
      Open Access
      The technical contents of this work fall within the statistical disclosure control (SDC) field, which concerns the postprocessing of the demographic portion of the statistical results of surveys containing sensitive personal ...
    • On collaborative anonymous communications in lossy networks 

      Rebollo-Monedero, David; Forné Muñoz, Jorge; Pallarès Segarra, Esteve; Parra-Arnau, Javier; Tripp Barba, Carolina; Urquiza Aguiar, Luis; Aguilar Igartua, Mónica (2013-05-17)
      Article
      Restricted access - publisher's policy
      Message encryption does not prevent eavesdroppers from unveiling who is communicating with whom, when, or how frequently, a privacy risk wireless networks are particularly vulnerable to. The Crowds protocol, a well-established ...
    • The Fast Maximum Distance to Average Vector (F-MDAV): an algorithm for k-Anonymous microaggregation in big data 

      Rodríguez Hoyos, Ana Fernanda; Estrada Jiménez, José Antonio; Rebollo-Monedero, David; Mezher, Ahmad Mohamad; Parra Arnau, Javier; Forné Muñoz, Jorge (Elsevier, 2020-02-10)
      Article
      Restricted access - publisher's policy
      The massive exploitation of tons of data is currently guiding critical decisions in domains such as economics or health. But serious privacy risks arise since personal data is commonly involved. k-Anonymous microaggregation ...