Sciweavers

3 search results - page 1 / 1
» Two New Techniques for Hiding Sensitive Itemsets and Their E...
Sort
View
DAWAK
2006
Springer
13 years 8 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro
ADC
2006
Springer
125views Database» more  ADC 2006»
13 years 8 months ago
A reconstruction-based algorithm for classification rules hiding
Data sharing between two organizations is common in many application areas e.g. business planing or marketing. Useful global patterns can be discovered from the integrated dataset...
Juggapong Natwichai, Xue Li, Maria E. Orlowska
ICON
2007
IEEE
13 years 11 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...