Author:
Tomashchuk Oleksandr,Van Landuyt Dimitri,Pletea Daniel,Wuyts Kim,Joosen Wouter
Publisher
Springer International Publishing
Reference36 articles.
1. ISO/IEC 29100 Information technology - Security techniques - Privacy framework (2011)
2. ISO 25237 - Health informatics - Pseudonymization (2017)
3. ISO/IEC 20889 - Privacy enhancing data de-identification terminology and classification of techniques (2018)
4. Abdou Hussien, A., Ramadan, N., Hefny, H.A.: Utility-based anonymization using generalization boundaries to protect sensitive attributes. J. Inf. Secur. 6(03), 179–196 (2015).
https://doi.org/10.4236/jis.2015.63019
5. Acharya, M.S.: Graduate admissions.
https://www.kaggle.com/mohansacharya/graduate-admissions
. Accessed 18 Apr 2019
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献