Articoli di riviste sul tema "K-Anonymisation"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-22 articoli di riviste per l'attività di ricerca sul tema "K-Anonymisation".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Loukides, Grigorios, e Jian-Hua Shao. "An Efficient Clustering Algorithm for k-Anonymisation". Journal of Computer Science and Technology 23, n. 2 (marzo 2008): 188–202. http://dx.doi.org/10.1007/s11390-008-9121-3.
Natwichai, Juggapong, Xue Li e Asanee Kawtrkul. "Incremental processing and indexing for (k, e)-anonymisation". International Journal of Information and Computer Security 5, n. 3 (2013): 151. http://dx.doi.org/10.1504/ijics.2013.055836.
Stark, Konrad, Johann Eder e Kurt Zatloukal. "Achieving k-anonymity in DataMarts used for gene expressions exploitation". Journal of Integrative Bioinformatics 4, n. 1 (1 marzo 2007): 132–44. http://dx.doi.org/10.1515/jib-2007-58.
de Haro-Olmo, Francisco José, Ángel Jesús Varela-Vaca e José Antonio Álvarez-Bermejo. "Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review". Sensors 20, n. 24 (14 dicembre 2020): 7171. http://dx.doi.org/10.3390/s20247171.
Zhang, Yuliang, Tinghuai Ma, Jie Cao e Meili Tang. "K-anonymisation of social network by vertex and edge modification". International Journal of Embedded Systems 8, n. 2/3 (2016): 206. http://dx.doi.org/10.1504/ijes.2016.076114.
Ganabathi, G. Chitra, e P. Uma Maheswari. "Efficient clustering technique for k-anonymisation with aid of optimal KFCM". International Journal of Business Intelligence and Data Mining 15, n. 4 (2019): 430. http://dx.doi.org/10.1504/ijbidm.2019.102809.
Singh, Amardeep, Monika Singh, Divya Bansal e Sanjeev Sofat. "Optimised K-anonymisation technique to deal with mutual friends and degree attacks". International Journal of Information and Computer Security 14, n. 3/4 (2021): 281. http://dx.doi.org/10.1504/ijics.2021.114706.
Sofat, Sanjeev, Divya Bansal, Monika Singh e Amardeep Singh. "Optimised K-anonymisation technique to deal with mutual friends and degree attacks". International Journal of Information and Computer Security 14, n. 3/4 (2021): 281. http://dx.doi.org/10.1504/ijics.2021.10037248.
Yaji, Sharath, e B. Neelima. "Parallel computing for preserving privacy using k-anonymisation algorithms from big data". International Journal of Big Data Intelligence 5, n. 3 (2018): 191. http://dx.doi.org/10.1504/ijbdi.2018.092659.
Yaji, Sharath, e B. Neelima.B. "Parallel computing for preserving privacy using k-anonymisation algorithms from big data". International Journal of Big Data Intelligence 5, n. 3 (2018): 191. http://dx.doi.org/10.1504/ijbdi.2018.10008733.
Matet, Benoit, Angelo Furno, Marco Fiore, Etienne Côme e Latifa Oukhellou. "Adaptative generalisation over a value hierarchy for the k-anonymisation of Origin–Destination matrices". Transportation Research Part C: Emerging Technologies 154 (settembre 2023): 104236. http://dx.doi.org/10.1016/j.trc.2023.104236.
Solanki, Paresh, Sanjay Garg e Hitesh Chhinkaniwala. "Heuristic-based hybrid privacy-preserving data stream mining approach using SD-perturbation and multi-iterative k-anonymisation". International Journal of Knowledge Engineering and Data Mining 5, n. 4 (2018): 306. http://dx.doi.org/10.1504/ijkedm.2018.095522.
Madan, Suman, e Puneet Goswami. "A privacy preservation model for big data in map-reduced framework based on k-anonymisation and swarm-based algorithms". International Journal of Intelligent Engineering Informatics 8, n. 1 (2020): 38. http://dx.doi.org/10.1504/ijiei.2020.10027094.
Madan, Suman, e Puneet Goswami. "A privacy preservation model for big data in map-reduced framework based on k-anonymisation and swarm-based algorithms". International Journal of Intelligent Engineering Informatics 8, n. 1 (2020): 38. http://dx.doi.org/10.1504/ijiei.2020.105433.
Bartholomäus, Sebastian, Yannik Siegert, Hans Werner Hense e Oliver Heidinger. "Secure Linking of Data from Population-Based Cancer Registries with Healthcare Data to Evaluate Screening Programs". Das Gesundheitswesen 82, S 02 (10 dicembre 2019): S131—S138. http://dx.doi.org/10.1055/a-1031-9526.
Mauw, Sjouke, Yunior Ramírez-Cruz e Rolando Trujillo-Rasua. "Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation". Knowledge and Information Systems 64, n. 4 (27 febbraio 2022): 1077–100. http://dx.doi.org/10.1007/s10115-022-01662-z.
Matet, Benoit, Angelo Furno, Marco Fiore, Etienne Come e Latifa Oukhellou. "Adaptative Generalisation Over a Value Hierarchy for the K-Anonymisation of Origin-Destination Matrices". SSRN Electronic Journal, 2022. http://dx.doi.org/10.2139/ssrn.4273504.
Ren, Wang, Xin Tong, Jing Du, Na Wang, Shancang Li, Geyong Min e Zhiwei Zhao. "Privacy Enhancing Techniques in the Internet of Things Using Data Anonymisation". Information Systems Frontiers, 11 maggio 2021. http://dx.doi.org/10.1007/s10796-021-10116-w.
"Preservation of Privacy using Multidimensional K-Anonymity Method for Non-Relational Data". International Journal of Recent Technology and Engineering 8, n. 2S10 (11 ottobre 2019): 544–47. http://dx.doi.org/10.35940/ijrte.b1096.0982s1019.
Lu, Yang. "Semantic-based Privacy-preserving Record Linkage." International Journal of Population Data Science 7, n. 3 (25 agosto 2022). http://dx.doi.org/10.23889/ijpds.v7i3.1956.
Avraam, Demetris, Elinor Jones e Paul Burton. "A deterministic approach for protecting privacy in sensitive personal data". BMC Medical Informatics and Decision Making 22, n. 1 (28 gennaio 2022). http://dx.doi.org/10.1186/s12911-022-01754-4.
O’Keefe, Christine M. "Privacy, Governance and Public Acceptability in Population Data Linkage for Research". International Journal of Population Data Science 1, n. 1 (12 aprile 2017). http://dx.doi.org/10.23889/ijpds.v1i1.405.