메뉴 건너뛰기




Volumn 9, Issue 3, 2010, Pages 500-505

A novel hybrid protection technique of privacy-preserving data mining and anti-data mining

Author keywords

Anti data mining; Clustering; Knowledge discovery; Privacy preserving data mining

Indexed keywords

DATA MINING TECHNIQUES; DATA SETS; EXPERIMENTAL TEST; HIER-ARCHICAL CLUSTERING; HYBRID PROTECTION SCHEME; KNOWLEDGE DISCOVERY; MINING PROCESS; PRIVACY INFORMATION; PRIVACY PRESERVING DATA MINING; PROTECTION TECHNIQUES; REVERSE ORDER; TWO PHASIS;

EID: 75949107726     PISSN: 18125638     EISSN: 18125646     Source Type: Journal    
DOI: 10.3923/itj.2010.500.505     Document Type: Article
Times cited : (11)

References (15)
  • 2
  • 4
    • 14644403631 scopus 로고    scopus 로고
    • An integrated tool for microarray data clustering and cluster validity assessment
    • DOI 10.1093/bioinformatics/bti190
    • Bolshakova, N., F. Azuaje and P. Cunningham, 2005. An integrated tool for microarray data clustering and cluster validity assessment. Bio informatics, 21: 451-455. (Pubitemid 40310231)
    • (2005) Bioinformatics , vol.21 , Issue.4 , pp. 451-455
    • Bolshakova, N.1    Azuaje, F.2    Cunningham, P.3
  • 10
    • 64549145427 scopus 로고    scopus 로고
    • Privacy-preserving data publishing for cluster analysis
    • Fung, B.C.M., K. Wangb, L. Wanga and P.C.K. Hung, 2009. Privacy-preserving data publishing for cluster analysis. Data Knowledge Eng., 68: 552-575.
    • (2009) Data Knowledge Eng. , vol.68 , pp. 552-575
    • Fung, B.C.M.1    Wangb, K.2    Wanga, L.3    Hung, P.C.K.4
  • 11
    • 0041914580 scopus 로고    scopus 로고
    • Secure access schemes in mobile database systems
    • Hwang, M.S. and C.H. Lee, 2001. Secure access schemes in mobile database systems. Eur. Trans. Telecommun., 12: 303-310.
    • (2001) Eur. Trans. Telecommun. , vol.12 , pp. 303-310
    • Hwang, M.S.1    Lee, C.H.2
  • 12
    • 39749130001 scopus 로고    scopus 로고
    • Transforming semi-honest protocols to ensure accountability
    • Jiang, W., C. Clifton and M. Kantarcyodu, 2008. Transforming semi-honest protocols to ensure accountability. Data Knowledge Eng., 65: 57-74.
    • (2008) Data Knowledge Eng. , vol.65 , pp. 57-74
    • Jiang, W.1    Clifton, C.2    Kantarcyodu, M.3
  • 13
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • Liu, K., H. Kargupta and J. Ryan, 2006. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowledge Data Eng., 18: 92-106.
    • (2006) IEEE Trans. Knowledge Data Eng. , vol.18 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 14
    • 41449115712 scopus 로고    scopus 로고
    • Measurement of performance impact of SSL on IP data transmissions
    • Rapuano, S. and E. Zimeo, 2008. Measurement of performance impact of SSL on IP data transmissions. Measurement, 41: 481-490.
    • (2008) Measurement , vol.41 , pp. 481-490
    • Rapuano, S.1    Zimeo, E.2
  • 15
    • 37049013902 scopus 로고    scopus 로고
    • VPN technology: IPSEC vs SSL
    • Rowan, T., 2007. VPN technology: IPSEC vs SSL. Network Security, 2007: 13-17.
    • (2007) Network Security , vol.2007 , pp. 13-17
    • Rowan, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.