[PDF][PDF] A review study on the privacy preserving data mining techniques and approaches

M Sharma, A Chaudhary, M Mathuria… - International Journal of …, 2013 - ijcst.org
With the extensive amount of data stored in databases and other repositories it is very
important to develop a powerful and effective mean for analysis and interpretation of such …

[PDF][PDF] Rise of data mining: current and future application areas

D Kumar, D Bhardwaj - International Journal of Computer Science Issues …, 2011 - Citeseer
Abstract Knowledge has played a significant role on human activities since his development.
Data mining is the process of knowledge discovery where knowledge is gained by analyzing …

[PDF][PDF] Data mining: Past, present and future scenario

A Kapoor - International Journal of Emerging Trends & Technology …, 2014 - academia.edu
Recent advances in computing, communications, and digital storage technologies, together
with development of high throughput data acquisition technologies have made it possible …

The impact of data complexity on privacy management in vehicle to infrastructure applications

A Zierfuss, R Sendag - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
In recent years, privacy management has become one of the most complex processes in the
connected world. Fundamental technologies like GPS, cellular communications, and the …

[PDF][PDF] Can Management Predict Information Security Threats by Utilizing a Data Warehouse?

PS Kim, LJ Steen - Journal of Information Systems Applied Research, 2010 - jisar.org
In many organizations, management has the responsibility of implementing information
security countermeasures to detect, minimize, and defend against information security …

Implementation and Analysis Optimal Flexible Frequency Discretization (OFFD) Method to Minimize Classification Error at Naïve Bayes Classification

DM Pratiwi, W Maharani… - … Komunikasi dan Industri, 2011 - ejournal.uin-suska.ac.id
Naive Bayes is one of the classification techniques in data mining that apply Bayes Theorem
in its processing and provide optimal result when each attributes in dataset is independent …

[PDF][PDF] A Theoretical Framework for Utilizing Data Warehousing to Predict Information Security Threats

LJ Steen, PS Kim - Issues in Information Systems, 2009 - pdfs.semanticscholar.org
Many organizations have implemented information security countermeasures to detect,
minimize, and defend against information security threats, or breaches. Most of these …

Privacy preserving data mining

ΜΕ Σκαρκαλά - 2021 - hellanicus.lib.aegean.gr
Medical, financial, or social databases are analyzed daily for the discovery of pat-terns and
useful information. Privacy concerns have emerged as some database segments contain …

[PDF][PDF] Best Practices to Protect Your Privacy Against Search Engines Data Mining–A Review

FS Nininahazwe, ME Taylor - academia.edu
The internet has revolutionized the way people do things in the twenty first century. Most day
to day activities are been done using the internet via search engines. Search engines are …

The impact of data complexity on privacy management resulting from vehicular (V2X) applications

A Zierfuss - 2013 - digitalcommons.uri.edu
In recent years, privacy management has become one of the most complex processes in the
connected world. Fundamental technologies like GPS, cellular communications, and the …