From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Layered Knowledge Chunks for Database Inference., , и . DBSec, том A-47 из IFIP Transactions, стр. 275-295. North-Holland, (1993)Using Conceptual Graphs to Represent Database Inference Security Analysis, и . Jour. Computing and Info. Tech., 4 (4): 291-307 (1994)A Layered TCB Implementation versus the Hinke-Schaefer Approach., , , , и . DBSec, стр. 151-165. North-Holland, (1989)Target-Independent Mining for Scientific Data: Capturing Transients and Trends for Phenomena Mining., , , и . KDD, стр. 187-190. AAAI Press, (1997)AERIE: Database Inference Modeling and Detection Using Conceptual Graphs., и . Workshop on Conceptual Graphs, том 754 из Lecture Notes in Computer Science, стр. 206-215. Springer, (1992)Protecting databases from inference attacks., , и . Comput. Secur., 16 (8): 687-708 (1997)Metadata: The Golden Nuggets of Mining Data., , и . MD, IEEE Computer Society, (1996)Database Inference Engine Design Approach.. DBSec, стр. 247-262. North-Holland, (1988)Aerie: An Inference Modeling and Detection Approach for Databases., и . DBSec, том A-21 из IFIP Transactions, стр. 179-194. North-Holland, (1992)A Framework for Inference-Directed Data Mining., , и . DBSec, том 79 из IFIP Conference Proceedings, стр. 229-239. Chapman & Hall, (1996)