Privacy Preserving Data Mining Privacy Preserving Data Mining
Advances in Information Security

Privacy Preserving Data Mining

Jaideep Vaidya 및 다른 저자
    • US$129.99
    • US$129.99

출판사 설명

Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Act" introduced in the U.S. Senate that would have banned all data-mining programs (including research and development) by the U.S. Department of Defense.

Privacy Preserving Data Mining provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. This book demonstrates how these approaches can achieve data mining, while operating within legal and commercial restrictions that forbid release of data. Furthermore, this research crystallizes much of the underlying foundation, and inspires further research in the area.

Privacy Preserving Data Mining is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science.

장르
컴퓨터 및 인터넷
출시일
2006년
9월 28일
언어
EN
영어
길이
132
페이지
출판사
Springer US
판매자
Springer Nature B.V.
크기
1.1
MB
Privacy and Anonymity in Information Management Systems Privacy and Anonymity in Information Management Systems
2010년
Secure Data Management Secure Data Management
2010년
Privacy and Security Issues in Data Mining and Machine Learning Privacy and Security Issues in Data Mining and Machine Learning
2011년
Privacy in Statistical Databases Privacy in Statistical Databases
2016년
Privacy in Statistical Databases Privacy in Statistical Databases
2010년
Data Privacy Management, Cryptocurrencies and Blockchain Technology Data Privacy Management, Cryptocurrencies and Blockchain Technology
2020년
Information Systems Security Information Systems Security
2017년
Computer Security – ESORICS 2025 Computer Security – ESORICS 2025
2025년
Computer Security – ESORICS 2025 Computer Security – ESORICS 2025
2025년
Computer Security – ESORICS 2025 Computer Security – ESORICS 2025
2025년
Computer Security – ESORICS 2025 Computer Security – ESORICS 2025
2025년
Proceedings of the Tenth International Conference on Mathematics and Computing Proceedings of the Tenth International Conference on Mathematics and Computing
2024년
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009년
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016년
Security for Telecommunications Networks Security for Telecommunications Networks
2008년
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007년
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015년
Network Security Policies and Procedures Network Security Policies and Procedures
2007년