2013
DOI: 10.1007/978-3-642-31600-5_12
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of Privacy Preservation Techniques in Data Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 20 publications
0
16
0
Order By: Relevance
“…In the case of the tMM model, the local summary terms required are (22) above and the following four terms:…”
Section: Private M-stepmentioning
confidence: 99%
See 3 more Smart Citations
“…In the case of the tMM model, the local summary terms required are (22) above and the following four terms:…”
Section: Private M-stepmentioning
confidence: 99%
“…The first three terms are analogous to (22) to (24), respectively, but with an extra weight variable (k) ijm and the final term is used only for the calculation of (k+1) i .…”
Section: Private M-stepmentioning
confidence: 99%
See 2 more Smart Citations
“…In the reactive approach security agencies try to catch the culprits after the incident to mitigate the effects of the terrorist incident. In both the approaches privacy of the people should be preserve because it cannot be fully compromised for national security as security and privacy are inversely proportional to each other [1]. In counter terrorism the first step after any incident is to find the terrorist group name that might be involved in that particular incident and to make a planned strategy to catch them.…”
Section: Introductionmentioning
confidence: 99%