Author of the publication

Data Anonymization According to the Combination of Attributes on Social Network Sites.

, , and . SSCC, volume 377 of Communications in Computer and Information Science, page 272-280. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Anonymization According to the Combination of Attributes on Social Network Sites., , and . SSCC, volume 377 of Communications in Computer and Information Science, page 272-280. Springer, (2013)Development of Malaysian Digital Forensics Investigator Competency Identification Methods., , and . AMLTA, volume 322 of Communications in Computer and Information Science, page 554-565. Springer, (2012)Safety Use of Hospital Information Systems: A Preliminary Investigation., and . KMO, volume 224 of Lecture Notes in Business Information Processing, page 707-721. Springer, (2015)Examining Factors Influencing IT Outsourcing Success in Malaysian Organizations., , , and . ACIS, (2006)A framework for integrated risk management process using survival analysis approach in information security., , and . IAS, page 185-190. IEEE, (2010)Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness., , and . WorldCIST, volume 206 of Advances in Intelligent Systems and Computing, page 213-220. Springer, (2013)Effectiveness of Using Integrated Algorithm in Preserving Privacy of Social Network Sites Users., , and . DICTAP (2), volume 167 of Communications in Computer and Information Science, page 237-249. Springer, (2011)Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage., , and . WorldCIST (1), volume 569 of Advances in Intelligent Systems and Computing, page 144-154. Springer, (2017)Enhanced Web Log Cleaning Algorithm for Web Intrusion Detection., and . IC2IT, volume 265 of Advances in Intelligent Systems and Computing, page 315-324. Springer, (2014)Fuzzy Based Threat Analysis in Total Hospital Information System., , , , and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 1-14. Springer, (2010)