Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: RULE HIDING.

Artykuły w czasopismach na temat „RULE HIDING”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „RULE HIDING”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Verykios, V. S., A. K. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni. "Association rule hiding." IEEE Transactions on Knowledge and Data Engineering 16, no. 4 (2004): 434–47. http://dx.doi.org/10.1109/tkde.2004.1269668.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Khurana, Garvit. "Association Rule Hiding using Hash Tree." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (2019): 787–89. http://dx.doi.org/10.31142/ijtsrd23037.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Quoc Le, Hai, Somjit Arch-int, and Ngamnij Arch-int. "Association Rule Hiding Based on Intersection Lattice." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/210405.

Pełny tekst źródła
Streszczenie:
Association rule hiding has been playing a vital role in sensitive knowledge preservation when sharing data between enterprises. The aim of association rule hiding is to remove sensitive association rules from the released database such that side effects are reduced as low as possible. This research proposes an efficient algorithm for hiding a specified set of sensitive association rules based on intersection lattice of frequent itemsets. In this research, we begin by analyzing the theory of the intersection lattice of frequent itemsets and the applicability of this theory into association rul
Style APA, Harvard, Vancouver, ISO itp.
4

Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.

Pełny tekst źródła
Streszczenie:
The goal of knowledge discovery is to extract hidden or useful unknown knowledge from databases, while the objective of knowledge hiding is to prevent certain confidential data or knowledge from being extracted through data mining techniques. Hiding sensitive association rules is focused. The side-effects of the existing data mining technology are investigated. The problem of sensitive association rule hiding is described formally. The representative sanitizing strategies for sensitive association rule hiding are discussed.
Style APA, Harvard, Vancouver, ISO itp.
5

Mohan, S. Vijayarani, and Tamilarasi Angamuthu. "Association Rule Hiding in Privacy Preserving Data Mining." International Journal of Information Security and Privacy 12, no. 3 (2018): 141–63. http://dx.doi.org/10.4018/ijisp.2018070108.

Pełny tekst źródła
Streszczenie:
This article describes how privacy preserving data mining has become one of the most important and interesting research directions in data mining. With the help of data mining techniques, people can extract hidden information and discover patterns and relationships between the data items. In most of the situations, the extracted knowledge contains sensitive information about individuals and organizations. Moreover, this sensitive information can be misused for various purposes which violate the individual's privacy. Association rules frequently predetermine significant target marketing informa
Style APA, Harvard, Vancouver, ISO itp.
6

Verykios, Vassilios S. "Association rule hiding methods." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 3, no. 1 (2013): 28–36. http://dx.doi.org/10.1002/widm.1082.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Wang, Hui. "Strategies for Sensitive Association Rule Hiding." Applied Mechanics and Materials 336-338 (July 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.

Pełny tekst źródła
Streszczenie:
Data mining technologies are used widely while the side effects it incurred are concerned so seriously. Privacy preserving data mining is so important for data and knowledge security during data mining applications. Association rule extracted from data mining is one kind of the most popular knowledge. It is challenging to hide sensitive association rules extracted by data mining process and make less affection on non-sensitive rules and the original database. In this work, we focus on specific association rule automatic hiding. Novel strategies are proposed which are based on increasing the su
Style APA, Harvard, Vancouver, ISO itp.
8

Öztürk, Ahmet Cumhur, and Belgin Ergenç. "Dynamic Itemset Hiding Algorithm for Multiple Sensitive Support Thresholds." International Journal of Data Warehousing and Mining 14, no. 2 (2018): 37–59. http://dx.doi.org/10.4018/ijdwm.2018040103.

Pełny tekst źródła
Streszczenie:
This article describes how association rule mining is used for extracting relations between items in transactional databases and is beneficial for decision-making. However, association rule mining can pose a threat to the privacy of the knowledge when the data is shared without hiding the confidential association rules of the data owner. One of the ways hiding an association rule from the database is to conceal the itemsets (co-occurring items) from which the sensitive association rules are generated. These sensitive itemsets are sanitized by the itemset hiding processes. Most of the existing
Style APA, Harvard, Vancouver, ISO itp.
9

Wang, Shyue-Liang, Bhavesh Parikh, and Ayat Jafari. "Hiding informative association rule sets." Expert Systems with Applications 33, no. 2 (2007): 316–23. http://dx.doi.org/10.1016/j.eswa.2006.05.022.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

B., Suma, and Shobha G. "Privacy preserving association rule hiding using border based approach." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1137. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1137-1145.

Pełny tekst źródła
Streszczenie:
<div>Association rule mining is a well-known data mining technique used for extracting hidden correlations between data items in large databases. In the majority of the situations, data mining results contain sensitive information about individuals and publishing such data will violate individual secrecy. The challenge of association rule mining is to preserve the confidentiality of sensitive rules when releasing the database to external parties. The association rule hiding technique conceals the knowledge extracted by the sensitive association rules by modifying the database. In this pa
Style APA, Harvard, Vancouver, ISO itp.
11

Gayathiri, P., and B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database." Cybernetics and Information Technologies 17, no. 3 (2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.

Pełny tekst źródła
Streszczenie:
Abstract Association Rule Hiding methodology is a privacy preserving data mining technique that sanitizes the original database by hide sensitive association rules generated from the transactional database. The side effect of association rules hiding technique is to hide certain rules that are not sensitive, failing to hide certain sensitive rules and generating false rules in the resulted database. This affects the privacy of the data and the utility of data mining results. In this paper, a method called Gene Patterned Association Rule Hiding (GPARH) is proposed for preserving privacy of the
Style APA, Harvard, Vancouver, ISO itp.
12

B., Suma, and Shobha G. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (2021): 3451. http://dx.doi.org/10.11591/ijece.v11i4.pp3451-3458.

Pełny tekst źródła
Streszczenie:
<span>Privacy preserving data mining has become the focus of attention of government statistical agencies and database security research community who are concerned with preventing privacy disclosure during data mining. Repositories of large datasets include sensitive rules that need to be concealed from unauthorized access. Hence, association rule hiding emerged as one of the powerful techniques for hiding sensitive knowledge that exists in data before it is published. In this paper, we present a constraint-based optimization approach for hiding a set of sensitive association rules, usi
Style APA, Harvard, Vancouver, ISO itp.
13

Wang, Hui. "Association Rule: From Mining to Hiding." Applied Mechanics and Materials 321-324 (June 2013): 2570–73. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2570.

Pełny tekst źródła
Streszczenie:
Data mining is to discover knowledge which is unknown and hidden in huge database and would be helpful for people understand the data and make decision better. Some knowledge discovered from data mining is considered to be sensitive that the holder of the database will not share because it might cause serious privacy or security problems. Privacy preserving data mining is to hide sensitive knowledge and it is becoming more and more important and attractive. Association rule is one class of the most important knowledge to be mined, so as sensitive association rule hiding. The side-effects of th
Style APA, Harvard, Vancouver, ISO itp.
14

Le, Bac, Lien Kieu, and Dat Tran. "DISTORTION-BASED HEURISTIC METHOD FOR SENSITIVE ASSOCIATION RULE HIDING." Journal of Computer Science and Cybernetics 35, no. 4 (2019): 337–54. http://dx.doi.org/10.15625/1813-9663/35/4/14131.

Pełny tekst źródła
Streszczenie:
In the past few years, privacy issues in data mining have received considerable attention in the data mining literature. However, the problem of data security cannot simply be solved by restricting data collection or against unauthorized access, it should be dealt with by providing solutions that not only protect sensitive information, but also not affect to the accuracy of the results in data mining and not violate the sensitive knowledge related with individual privacy or competitive advantage in businesses. Sensitive association rule hiding is an important issue in privacy preserving data m
Style APA, Harvard, Vancouver, ISO itp.
15

Garg, Vikram, Anju Singh, and Divakar Singh. "A Hybrid Algorithm for Association Rule Hiding using Representative Rule." International Journal of Computer Applications 97, no. 9 (2014): 9–14. http://dx.doi.org/10.5120/17033-7334.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Bonam, Janakiramaiah, and Ramamohan Reddy. "Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment." International Journal of Information Security and Privacy 8, no. 3 (2014): 39–62. http://dx.doi.org/10.4018/ijisp.2014070103.

Pełny tekst źródła
Streszczenie:
Privacy preserving association rule mining protects the sensitive association rules specified by the owner of the data by sanitizing the original database so that the sensitive rules are hidden. In this paper, the authors study a problem of hiding sensitive association rules by carefully modifying the transactions in the database. The algorithm BHPSP calculates the impact factor of items in the sensitive association rules. Then it selects a rule which contains an item with minimum impact factor. The algorithm alters the transactions of the database to hide the sensitive association rule by red
Style APA, Harvard, Vancouver, ISO itp.
17

B.Jadav, Khyati, Jignesh Vania, and Dhiren R. Patel. "A Survey on Association Rule Hiding Methods." International Journal of Computer Applications 82, no. 13 (2013): 20–25. http://dx.doi.org/10.5120/14177-2357.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

S, Kasthuri, and Meyyappan T. "Hiding Sensitive Association Rule Using Heuristic Approach." International Journal of Data Mining & Knowledge Management Process 3, no. 1 (2013): 57–63. http://dx.doi.org/10.5121/ijdkp.2013.3105.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Murthy, T. Satyanarayana, and N. P. Gopalan. "A Novel Algorithm for Association Rule Hiding." International Journal of Information Engineering and Electronic Business 10, no. 3 (2018): 45–50. http://dx.doi.org/10.5815/ijieeb.2018.03.06.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Chaudhari, Chaitrali, and Speril Machado. "Association Rule Hiding for Multi-Relational Database." International Journal of Computer Trends and Technology 30, no. 4 (2015): 187–95. http://dx.doi.org/10.14445/22312803/ijctt-v30p133.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Afshari, Mahtab Hossein, Mohammad Naderi Dehkordi, and Mehdi Akbari. "Association rule hiding using cuckoo optimization algorithm." Expert Systems with Applications 64 (December 2016): 340–51. http://dx.doi.org/10.1016/j.eswa.2016.08.005.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Wang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.

Pełny tekst źródła
Streszczenie:
Data mining technologies are successfully applied in lots of domains such as business, science research, health care, bioinformatics, financial forecasting and so on and so forth. Knowledge can be discovered by data mining and can help people to make better decisions and benefits. Association rule is one kind of the most popular knowledge discovered by data mining. While at the same time, some association rules extracted from data mining can be considered so sensitive for data holders that they will not like to share and really want to hide. Such kind of side effects of data mining is analyzed
Style APA, Harvard, Vancouver, ISO itp.
23

Sharmila, S., and S. Vijayarani. "Heuristic Approach in Association Rule Hiding- A Study." International Journal of Computer Sciences and Engineering 7, no. 5 (2019): 300–305. http://dx.doi.org/10.26438/ijcse/v7i5.300305.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Wette, Philip, and Holger Karl. "Which flows are hiding behind my wildcard rule?" ACM SIGCOMM Computer Communication Review 43, no. 4 (2013): 541–42. http://dx.doi.org/10.1145/2534169.2491710.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Darwish, Saad M., Magda M. Madbouly, and Mohamed A. El-Hakeem. "A Database Sanitizing Algorithm for Hiding Sensitive Multi-Level Association Rule Mining." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 285–93. http://dx.doi.org/10.7763/ijcce.2014.v3.337.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

SCHWINGHAMMER, JAN, LARS BIRKEDAL, FRANÇOIS POTTIER, BERNHARD REUS, KRISTIAN STØVRING, and HONGSEOK YANG. "A step-indexed Kripke model of hidden state." Mathematical Structures in Computer Science 23, no. 1 (2012): 1–54. http://dx.doi.org/10.1017/s0960129512000035.

Pełny tekst źródła
Streszczenie:
Frame and anti-frame rules have been proposed as proof rules for modular reasoning about programs. Frame rules allow the hiding of irrelevant parts of the state during verification, whereas the anti-frame rule allows the hiding of local state from the context.We discuss the semantic foundations of frame and anti-frame rules, and present the first sound model for Charguéraud and Pottier's type and capability system including both of these rules. The model is a possible worlds model based on the operational semantics and step-indexed heap relations, and the worlds are given by a recursively defi
Style APA, Harvard, Vancouver, ISO itp.
27

Mary, A. Geetha, D. P. Acharjya, and N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR." Cybernetics and Information Technologies 14, no. 1 (2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.

Pełny tekst źródła
Streszczenie:
Abstract In the present age of Internet, data is accumulated at a dramatic pace. The accumulated huge data has no relevance, unless it provides certain useful information pertaining to the interest of the organization. But the real challenge lies in hiding sensitive information in order to provide privacy. Therefore, attribute reduction becomes an important aspect for handling such huge database by eliminating superfluous or redundant data to enable a sensitive rule hiding in an efficient manner before it is disclosed to the public. In this paper we propose a privacy preserving model to hide s
Style APA, Harvard, Vancouver, ISO itp.
28

Cheng, Peng, Ivan Lee, Chun-Wei Lin, and Jeng-Shyang Pan. "Association rule hiding based on evolutionary multi-objective optimization." Intelligent Data Analysis 20, no. 3 (2016): 495–514. http://dx.doi.org/10.3233/ida-160817.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Modak, Masooda, and Rizwana Shaikh. "Privacy Preserving Distributed Association Rule Hiding Using Concept Hierarchy." Procedia Computer Science 79 (2016): 993–1000. http://dx.doi.org/10.1016/j.procs.2016.03.126.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Refaat, Mohamed, H. Aboelseoud, Khalid Shafee, and M. Badr. "Privacy Preserving Association Rule Hiding Techniques: Current Research Challenges." International Journal of Computer Applications 136, no. 6 (2016): 11–17. http://dx.doi.org/10.5120/ijca2016908446.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Rajasekaran, M., M. S. Thanabal, and A. Meenakshi. "Association rule hiding using enhanced elephant herding optimization algorithm." Automatika 65, no. 1 (2023): 98–107. http://dx.doi.org/10.1080/00051144.2023.2277998.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Kharwar, Ankit, Chandni Naik, Niyanta Desai, and Nikita Mistree. "Sensitive Association Rule Hiding using Hybrid Algorithm in Incremental Environment." International Journal of Computer Applications 180, no. 28 (2018): 5–9. http://dx.doi.org/10.5120/ijca2018916650.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

kamani, Hiren R. "Improved Association Rule Hiding Algorithm for Privacy Preserving Data Mining." IOSR Journal of Engineering 4, no. 7 (2014): 36–41. http://dx.doi.org/10.9790/3021-04713641.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Gulwani, Padam. "Association Rule Hiding by Positions Swapping of Support and Confidence." International Journal of Information Technology and Computer Science 4, no. 4 (2012): 54–61. http://dx.doi.org/10.5815/ijitcs.2012.04.08.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

R. Ponde, Mr Pravin, and Dr S. M. Jagade. "Privacy Preserving by Hiding Association Rule Mining from Transaction Database." IOSR Journal of Computer Engineering 16, no. 5 (2014): 25–31. http://dx.doi.org/10.9790/0661-16522531.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Rao, K. Srinivasa, Venkata Naresh Mandhala, Debnath Bhattacharyya, and Tai-hoon Kim. "An Association Rule hiding Algorithm for Privacy Preserving Data Mining." International Journal of Control and Automation 7, no. 10 (2014): 393–404. http://dx.doi.org/10.14257/ijca.2014.7.10.36.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Dehkordi, Mohammad Noderi. "A Novel Association Rule Hiding Approach in OLAP Data Cubes." Indian Journal of Science and Technology 6, no. 2 (2013): 1–13. http://dx.doi.org/10.17485/ijst/2013/v6i2.17.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Cheng, Peng, John F. Roddick, Shu-Chuan Chu, and Chun-Wei Lin. "Privacy preservation through a greedy, distortion-based rule-hiding method." Applied Intelligence 44, no. 2 (2015): 295–306. http://dx.doi.org/10.1007/s10489-015-0671-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Krishnamoorthy, Sathiyapriya, G. Sudha Sadasivam, M. Rajalakshmi, K. Kowsalyaa, and M. Dhivya. "Privacy Preserving Fuzzy Association Rule Mining in Data Clusters Using Particle Swarm Optimization." International Journal of Intelligent Information Technologies 13, no. 2 (2017): 1–20. http://dx.doi.org/10.4018/ijiit.2017040101.

Pełny tekst źródła
Streszczenie:
An association rule is classified as sensitive if its thread of revelation is above certain confidence value. If these sensitive rules were revealed to the public, it is possible to deduce sensitive knowledge from the published data and offers benefit for the business competitors. Earlier studies in privacy preserving association rule mining focus on binary data and has more side effects. But in practical applications the transactions contain the purchased quantities of the items. Hence preserving privacy of quantitative data is essential. The main goal of the proposed system is to hide a grou
Style APA, Harvard, Vancouver, ISO itp.
40

Zhang, Chao, and Linling He. "Data Mining Technology in Teaching Evaluation of Colleges and Universities." SHS Web of Conferences 187 (2024): 04030. http://dx.doi.org/10.1051/shsconf/202418704030.

Pełny tekst źródła
Streszczenie:
Data Mining refers to the large amount of data from the database through algorithmic search reveals implicit, previously unknown and potentially valuable process information[1]. Currently, many areas during the application of data mining. Data mining association rules is one of the most important and most mature technology research methods, association rule mining can find the hidden link between the transaction and meaningful rules. The purpose of this study is to evaluate data mining techniques combined with teaching, to extract useful information from a large number of evaluation data hidin
Style APA, Harvard, Vancouver, ISO itp.
41

Qi, Gaoxin, Jichao Li, Xueming Xu, Gang Chen, and Kewei Yang. "An attack–defense game model in infrastructure networks under link hiding." Chaos: An Interdisciplinary Journal of Nonlinear Science 32, no. 11 (2022): 113109. http://dx.doi.org/10.1063/5.0112907.

Pełny tekst źródła
Streszczenie:
Our increasing dependence on infrastructure networks leads to growing concerns over the protection of these networks. Many methods have been proposed to select protective strategies by combining complex network theory and game theory. However, the misleading effect of hidden links is not considered in previous methods. This work creates an information gap between attackers and defenders by partly hiding network links to mislead the attacker in the game. We first introduce the rule of link hiding that depends on the nodes’ property, where the number of hidden links has a maximum value. Addition
Style APA, Harvard, Vancouver, ISO itp.
42

Joshi, Apoorva, and Pratima Gautam. "An optimized algorithm for association rule hiding technique using Hybrid Approach." International Journal of Computer Sciences and Engineering 7, no. 1 (2019): 832–36. http://dx.doi.org/10.26438/ijcse/v7i1.832836.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

R. Ponde, Mr Pravin, Prof Chetan V. Andhare, and Dr S. M. Jagade. "Privacy Preservation by Using AMDSRRC for Hiding Highly Sensitive Association Rule." IOSR Journal of Computer Engineering 16, no. 6 (2014): 60–65. http://dx.doi.org/10.9790/0661-16636065.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Zamani Boroujeni, Farsad, and Doryaneh Hossein Afshari. "An Efficient Rule-Hiding Method for Privacy Preserving in Transactional Databases." Journal of Computing and Information Technology 25, no. 4 (2018): 279–90. http://dx.doi.org/10.20532/cit.2017.1003680.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Le, Hai Quoc, Somjit Arch-int, Huy Xuan Nguyen, and Ngamnij Arch-int. "Association rule hiding in risk management for retail supply chain collaboration." Computers in Industry 64, no. 7 (2013): 776–84. http://dx.doi.org/10.1016/j.compind.2013.04.011.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Verykios, Vassilios S., Emmanuel D. Pontikakis, Yannis Theodoridis, and Liwu Chang. "Efficient algorithms for distortion and blocking techniques in association rule hiding." Distributed and Parallel Databases 22, no. 1 (2007): 85–104. http://dx.doi.org/10.1007/s10619-007-7013-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Krishnamoorthy, Sathiyapriya, and Kaviya Murugesan. "Protecting the Privacy of Cancer Patients Using Fuzzy Association Rule Hiding." Asian Pacific Journal of Cancer Prevention 20, no. 5 (2019): 1437–43. http://dx.doi.org/10.31557/apjcp.2019.20.5.1437.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Telikani, Akbar, and Asadollah Shahbahrami. "Optimizing association rule hiding using combination of border and heuristic approaches." Applied Intelligence 47, no. 2 (2017): 544–57. http://dx.doi.org/10.1007/s10489-017-0906-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Jalid, Alfian Abdul, Agus Harjoko, and Anny Kartika Sari. "Steganographic Model for encrypted messages based on DNA Encoding." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 15, no. 1 (2021): 43. http://dx.doi.org/10.22146/ijccs.61767.

Pełny tekst źródła
Streszczenie:
Information has become an inseparable part of human life. Some information that is considered important, such as state or company documents, require more security to ensure its confidentiality. One way of securing information is by hiding the information in certain media using steganography techniques. Steganography is a method of hiding information into other files to make it invisible. One of the most frequently used steganographic methods is Least Significant Bit (LSB).In this study, the LSB method will be modified using DNA Encoding and Chargaff's Rule. Chargaff's Rule or complementary bas
Style APA, Harvard, Vancouver, ISO itp.
50

Duraiswamy, K., and N. Maheswari. "Sensitive Items in Privacy Preserving — Association Rule Mining." Journal of Information & Knowledge Management 07, no. 01 (2008): 31–35. http://dx.doi.org/10.1142/s0219649208001932.

Pełny tekst źródła
Streszczenie:
Privacy-preserving has recently been proposed in response to the concerns of preserving personal or sensible information derived from data-mining algorithms. For example, through data-mining, sensible information such as private information or patterns may be inferred from non-sensible information or unclassified data. As large repositories of data contain confidential rules that must be protected before published, association rule hiding becomes one of important privacy preserving data-mining problems. There have been two types of privacy concerning data-mining. Output privacy tries to hide t
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!