-
1
-
-
84980104458
-
Financial ratios, discriminant analysis and the prediction of corporate bankruptcy
-
Altman, E. (1968) ‘Financial ratios, discriminant analysis and the prediction of corporate bankruptcy’, Journal of Finance, Vol. 23, pp.589–609.
-
(1968)
Journal of Finance
, vol.23
, pp. 589-609
-
-
Altman, E.1
-
2
-
-
0033368596
-
Multicenter patient records research: security policies and tools
-
Behlen, F.M. and Johnson, S.B. (1999) ‘Multicenter patient records research: security policies and tools’, J Am Med Inform Assoc., Vol. 6, No. 6, pp.435–443.
-
(1999)
J Am Med Inform Assoc.
, vol.6
, Issue.6
, pp. 435-443
-
-
Behlen, F.M.1
Johnson, S.B.2
-
3
-
-
0036754633
-
Confidentiality issues for medical data miners
-
Berman, J.J. (2002) ‘Confidentiality issues for medical data miners’, Artif Intell Med., Vol. 26, Nos. 1–2, pp.25–36.
-
(2002)
Artif Intell Med.
, vol.26
, Issue.1-2
, pp. 25-36
-
-
Berman, J.J.1
-
4
-
-
26944458803
-
A framework for evaluating privacy preserving data mining algorithms
-
Bertino, E. (2005) ‘A framework for evaluating privacy preserving data mining algorithms’, Data Mining and Knowledge Discovery, Vol. 11, pp.121–154.
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, pp. 121-154
-
-
Bertino, E.1
-
5
-
-
0043234660
-
Variable precision rough set theory and data discretisation: an application to corporate failure prediction
-
Beynon, M.J. and Peel, M.J. (2001) ‘Variable precision rough set theory and data discretisation: an application to corporate failure prediction’, Omega, Vol. 29, pp.561–576.
-
(2001)
Omega
, vol.29
, pp. 561-576
-
-
Beynon, M.J.1
Peel, M.J.2
-
6
-
-
12344313039
-
On privacy-preserving access to distributed heterogeneous healthcare information
-
Hilton Waikoloa, Hawaii, 5–8 January
-
Boyens, C., Krishnan, R. and Padman, R. (2004) ‘On privacy-preserving access to distributed heterogeneous healthcare information’, Proceedings of the 37th Annual Hawaii International Conference on System Sciences, Hilton Waikoloa, Hawaii, 5–8 January.
-
(2004)
Proceedings of the 37th Annual Hawaii International Conference on System Sciences
-
-
Boyens, C.1
Krishnan, R.2
Padman, R.3
-
7
-
-
13544271697
-
Prediction of commercial bank failure via multivariate statistical analysis of financial structures: the Turkish case
-
Canbas, S., Caubak, B. and Kilic, S.B. (2005) ‘Prediction of commercial bank failure via multivariate statistical analysis of financial structures: the Turkish case’, European Journal of Operational Research, Vol. 166, pp.528–546.
-
(2005)
European Journal of Operational Research
, vol.166
, pp. 528-546
-
-
Canbas, S.1
Caubak, B.2
Kilic, S.B.3
-
8
-
-
36849000464
-
A random rotation perturbation approach to privacy preserving data classification
-
New Orleans, Louisiana, USA, 27–30 November
-
Chen, K. and Liu, L. (2005) ‘A random rotation perturbation approach to privacy preserving data classification’, Fifth IEEE International Conference on Data Mining, New Orleans, Louisiana, USA, 27–30 November.
-
(2005)
Fifth IEEE International Conference on Data Mining
-
-
Chen, K.1
Liu, L.2
-
13
-
-
0003733695
-
-
Technical Report tr-99–06, International Computer Science Institute, Berkeley, California
-
Dasgupta, S. and Gupta, A. (1999) ‘An elementary proof of Johnson-Lindenstrauss lemma’, Technical Report tr-99–06, International Computer Science Institute, Berkeley, California.
-
(1999)
An elementary proof of Johnson-Lindenstrauss lemma
-
-
Dasgupta, S.1
Gupta, A.2
-
14
-
-
15744373612
-
Randomization in privacy preserving data mining
-
Evfimievski, A. (2002) ‘Randomization in privacy preserving data mining’, ACM SIGKDD Explorations Newsletter, Vol. 4, No. 2, pp.43–48.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 43-48
-
-
Evfimievski, A.1
-
15
-
-
83255177748
-
Homeland insecurity: datamining, terrorism detection and confidentiality
-
55th Session, Sydney
-
Fienberg, S.E. (2005) ‘Homeland insecurity: datamining, terrorism detection and confidentiality’, Bull. Internat. Stat. Inst., 55th Session, Sydney.
-
(2005)
Bull. Internat. Stat. Inst.
-
-
Fienberg, S.E.1
-
16
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
Kargupta, H., Liu, K. and Ryan, J. (2006) ‘Random projection-based multiplicative data perturbation for privacy preserving distributed data mining’, IEEE Transactions on Knowledge and Data Engineering, Vol. 18, No. 1, pp.92–106.
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.1
, pp. 92-106
-
-
Kargupta, H.1
Liu, K.2
Ryan, J.3
-
20
-
-
70449100614
-
Dimensionality reduction by random projection and latent semantic indexing
-
San Francisco, California, USA, 1–3 May
-
Lin, J. and Gunopulos, D. (2003) ‘Dimensionality reduction by random projection and latent semantic indexing’, Text Mining Workshop at the 3rd SIAM International Conference on Data Mining, San Francisco, California, USA, 1–3 May.
-
(2003)
Text Mining Workshop at the 3rd SIAM International Conference on Data Mining
-
-
Lin, J.1
Gunopulos, D.2
-
21
-
-
33646367179
-
Data shuffling - a new masking approach for numerical data
-
Muralidhar, K. and Sarathy, R. (2006) ‘Data shuffling - a new masking approach for numerical data’, Management Science, Vol. 52, No. 5, pp.658–670.
-
(2006)
Management Science
, vol.52
, Issue.5
, pp. 658-670
-
-
Muralidhar, K.1
Sarathy, R.2
-
22
-
-
28844447994
-
Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation
-
Brighton, UK, 1 November
-
Oliveira, S.R.M. and Zaiane, O.R. (2004) ‘Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation’, Proc. of the Workshop on Privacy and Security Aspects of Data Mining, Brighton, UK, 1 November.
-
(2004)
Proc. of the Workshop on Privacy and Security Aspects of Data Mining
-
-
Oliveira, S.R.M.1
Zaiane, O.R.2
-
23
-
-
33846830000
-
A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration
-
Oliveira, S.R.M. and Zaiane, O.R. (2007) ‘A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration’, Journal of Computer and Security, Vol. 26, pp.81–83.
-
(2007)
Journal of Computer and Security
, vol.26
, pp. 81-83
-
-
Oliveira, S.R.M.1
Zaiane, O.R.2
-
24
-
-
0004401956
-
Hybrid classifiers for financial multi-criteria decision making: the case of bankruptcy prediction
-
Olmeda, I. and Fernandez, E. (1997) ‘Hybrid classifiers for financial multi-criteria decision making: the case of bankruptcy prediction’, Computational Economics, Vol. 10, pp.317–335.
-
(1997)
Computational Economics
, vol.10
, pp. 317-335
-
-
Olmeda, I.1
Fernandez, E.2
-
25
-
-
4544312695
-
Cryptographic techniques for privacy-preserving data mining
-
Pinkas, B. (2002) ‘Cryptographic techniques for privacy-preserving data mining’, SIGKDD Explorations, Vol. 4, No. 2, p.12.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 12
-
-
Pinkas, B.1
-
26
-
-
24744450083
-
Bankruptcy prediction by neural network
-
R.R. Trippi and E. Turban (Eds.) Burr Ridge: Irwin Professional Publishing
-
Rahimian, E., Singh, S., Thammachote, T. and Virmani, R. (1996) ‘Bankruptcy prediction by neural network’, in R.R. Trippi and E. Turban (Eds.) Neural Networks in Finance and Investing, Burr Ridge: Irwin Professional Publishing.
-
(1996)
Neural Networks in Finance and Investing
-
-
Rahimian, E.1
Singh, S.2
Thammachote, T.3
Virmani, R.4
-
27
-
-
33846314346
-
Bankruptcy prediction in banks and firms via statistical and intelligent techniques - a review
-
Ravikumar, P. and Ravi, V. (2007) ‘Bankruptcy prediction in banks and firms via statistical and intelligent techniques - a review’, European Journal of Operational Research, Vol. 180, No. 1, pp.1–28.
-
(2007)
European Journal of Operational Research
, vol.180
, Issue.1
, pp. 1-28
-
-
Ravikumar, P.1
Ravi, V.2
-
28
-
-
0036811662
-
k-Anonymity: a model for protecting privacy
-
Sweeney, L. (2002) ‘k-Anonymity: a model for protecting privacy’, Int’l J. Uncertainty, Fuzziness, and Knowledge-Based Systems, Vol. 10, No. 5, pp.557–570.
-
(2002)
Int’l J. Uncertainty, Fuzziness, and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
32
-
-
84882630942
-
Privacy preserving data mining
-
New York: Springer
-
Vaidya, J., Clifton, C. and Zhu, M. (2006) ‘Privacy preserving data mining’, Advances in Information Security, New York: Springer, Vol. 19.
-
(2006)
Advances in Information Security
, vol.19
-
-
Vaidya, J.1
Clifton, C.2
Zhu, M.3
-
33
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
Verykios, V.S., Bertino, E. and Fovino, I.N. (2004) ‘State-of-the-art in privacy preserving data mining’, SIGMOD Record, Vol. 33, pp.50–57.
-
(2004)
SIGMOD Record
, vol.33
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
-
34
-
-
77956198800
-
Random projection and its application to learning
-
Sendai, Japan
-
Watanabe, T., Takimoto, E., Kazuyuki, A. and Maruoka, A. (2005) ‘Random projection and its application to learning’, Randomness and Computation, Joint Workshop ‘New Horizons in Computing’ and ‘Statistical Mechanical Approach to Probabilistic Information Processing’, Sendai, Japan.
-
(2005)
Randomness and Computation, Joint Workshop ‘New Horizons in Computing’ and ‘Statistical Mechanical Approach to Probabilistic Information Processing’
-
-
Watanabe, T.1
Takimoto, E.2
Kazuyuki, A.3
Maruoka, A.4
-
35
-
-
0028444978
-
Bankruptcy prediction using neural networks
-
Wilson, R.L. and Sharda, R. (1994) ‘Bankruptcy prediction using neural networks’, Decision Support Systems, Vol. 11, pp.545–557.
-
(1994)
Decision Support Systems
, vol.11
, pp. 545-557
-
-
Wilson, R.L.1
Sharda, R.2
-
36
-
-
43549116165
-
Privacy preserving data mining algorithms by data distortion
-
Xiao-dan, W.U., Dian-min, Y.U.E., Feng-li, L.I.U., Wang, Y-F. and Chu, C-H. (2006) ‘Privacy preserving data mining algorithms by data distortion’, Management Science and Engineering, pp.223–228.
-
(2006)
Management Science and Engineering
, pp. 223-228
-
-
Xiao-dan, W.U.1
Dian-min, Y.U.E.2
Feng-li, L.I.U.3
Wang, Y.-F.4
Chu, C.-H.5
-
37
-
-
0020312165
-
Protocols for secure computations
-
IEEE Computer Society, Chicago, Illinois, USA
-
Yao, A.C. (1982) ‘Protocols for secure computations’, Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society, Chicago, Illinois, USA, pp.160–164.
-
(1982)
Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science
, pp. 160-164
-
-
Yao, A.C.1
-
38
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE Computer Society, Toronto, Ontario, Canada
-
Yao, A.C. (1986) ‘How to generate and exchange secrets’, Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, IEEE Computer Society, Toronto, Ontario, Canada, pp.162–167.
-
(1986)
Proceedings of the 27th IEEE Symposium on Foundations of Computer Science
, pp. 162-167
-
-
Yao, A.C.1
-
39
-
-
26944448211
-
Performance measurements for privacy preserving data mining
-
Hanoi, Vietnam
-
Zhang, N., Zhao, W. and Chen, J. (2005) ‘Performance measurements for privacy preserving data mining’, Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, Hanoi, Vietnam, Vol. 3518, pp.43–49.
-
(2005)
Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
, vol.3518
, pp. 43-49
-
-
Zhang, N.1
Zhao, W.2
Chen, J.3
-
40
-
-
84948646631
-
-
http://archive.ics.uci.edu/ml/
-
-
-
-
41
-
-
84948645224
-
-
http://sci2s.ugr.es/keel/datasets.php
-
-
-
-
42
-
-
84948647624
-
-
http://www.tbb.org.tr/english/bulten/yillik/2000/ratios.xls
-
-
-
-
43
-
-
84948646668
-
-
http://www.cs.waikato.ac.nz/ml/weka/
-
-
-
|