Obfuscation of sensitive data in network flows | IEEE Conference Publication | IEEE Xplore