From post

A Survey on Preserving Privacy for Sensitive Association Rules in Databases.

, , и . BAIP, том 70 из Communications in Computer and Information Science, стр. 538-544. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A survey on security issues and solutions at different layers of Cloud computing., , , , и . J. Supercomput., 63 (2): 561-592 (2013)Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks, , , и . CoRR, (2012)ExplicitPRISMSymm: Symmetry Reduction Technique for Explicit Models in PRISM., , и . TAMC, том 9076 из Lecture Notes in Computer Science, стр. 400-412. Springer, (2015)Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computing., , , , и . CUBE, стр. 557-560. ACM, (2012)A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing., и . CICS, стр. 23-30. IEEE, (2013)Load balancing in cloud using improved gray wolf optimizer., и . Concurr. Comput. Pract. Exp., (2022)Towards cough sound analysis using the Internet of things and deep learning for pulmonary disease prediction., , , , , , , , и . Trans. Emerg. Telecommun. Technol., (2022)Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009-2020)., , , , , и . J. Netw. Comput. Appl., (2021)Supervised learning model for identifying illegal activities in Bitcoin., , , , , и . Appl. Intell., 51 (6): 3824-3843 (2021)Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure., , , и . IFIPTM, том 374 из IFIP Advances in Information and Communication Technology, стр. 84-96. Springer, (2012)