tailieunhanh - Ebook Privacy preserving data mining - Jaideep Vaidya, Chris Clifton, Michael Zhu

This book presents a sampling of work in the field. The primary target is the researcher or student who wishes to work in privacy-preserving data mining; the goal is to give a background on approaches along with details showing how to develop specific solutions within each approach. The book is organized much like a typical data mining text, with discussion of privacy-preserving solutions to particular data mining tasks. | PRIVACY PRESERVING DATA MINING Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax VA 22030-4444 email jajodia @ smu. edu The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are one to establish the state of the art of and set the course for future research in information security and two to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treatment. Researchers as well as developers are encouraged to contact Professor Sushil Jajodia with ideas for books under this series. Additional titles in the series BIOMETRIC USER AUTHENTICATION FOR IT SECURITY From Fundamentals to Handwriting by Claus Vielhauer ISBN-10 0-387-26194-X IMPACTS AND RISK ASSESSMENT OF TECHNOLOGY FOR INTERNET SECURITY Enabled Information Small-Medium Enterprises TEISMES by Charles A. Shoniregun ISBN-10 0-387-24343-7 SECURITY IN E LEARNING by Edgar R. Weippl ISBN 0-387-24341-0 IMAGE AND VIDEO ENCRYPTION From Digital Rights Management to Secured Personal Communication by Andreas Uhl and Andreas Pommer ISBN 0-387-23402-0 INTRUSION DETECTION AND CORRELATION Challenges and Solutions by Christopher Kruegel Fredrik Valeur and Giovanni Vigna ISBN 0-387-23398-9 THE AUSTIN PROTOCOL COMPILER by Tommy M. McGuire and Mohamed G. Gouda ISBN 0-387-23227-3 ECONOMICS OF INFORMATION SECURITY by L. Jean

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.