From post

On the Identification of Property Based Generalizations in Microdata Anonymization.

, , , и . DBSec, том 6166 из Lecture Notes in Computer Science, стр. 81-96. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scalable Nonlinear AUC Maximization Methods., , и . ECML/PKDD (2), том 11052 из Lecture Notes in Computer Science, стр. 292-307. Springer, (2018)On the Identification of Property Based Generalizations in Microdata Anonymization., , , и . DBSec, том 6166 из Lecture Notes in Computer Science, стр. 81-96. Springer, (2010)Towards Performance of NLP Transformers on URL-Based Phishing Detection for Mobile Devices., , и . J. Ubiquitous Syst. Pervasive Networks, 17 (1): 35-42 (2022)Simulating Measurement Attacks in a Scada System Testbed., и . Critical Infrastructure Protection, том 636 из IFIP Advances in Information and Communication Technology, стр. 135-153. Springer, (2021)Workflow Resilience for Mission Critical Systems., , и . SSS, том 14310 из Lecture Notes in Computer Science, стр. 498-512. Springer, (2023)Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks., и . ABAC@CODASPY, стр. 25-34. ACM, (2016)Periodic Scheduling in On-Demand Broadcast System., , и . ISTA, том P-48 из LNI, стр. 107-121. GI, (2004)Designing High Integrity Systems Using Aspects., , и . IICIS, том 251 из IFIP Conference Proceedings, стр. 37-57. Kluwer, (2002)Personal health record storage on privacy preserving green clouds., , , и . CollaborateCom, стр. 448-457. ICST / IEEE, (2013)A Trust Model for Pervasive Computing Environments., , и . CollaborateCom, IEEE Computer Society / ICST, (2006)