Author:
Alfalayleh Mousa,Brankovic Ljiljana
Publisher
Springer International Publishing
Reference58 articles.
1. Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. 21(4), 515–556 (1989)
2. Ahlswede, R., Aydinian, H.: On security of statistical databases. SIAM J. Discrete Math. 25(4), 1778–1791 (2011)
3. Al-Saggaf, Y., Islam, M.Z.: Privacy in social network sites (SNS) - the threats from data mining. Ethical Space: J. Commun. Ethics 9(4), 32–40 (2012)
4. Al-Saggaf, F., Islam, M.Z.: A malicious use of a clustering algorithm to threaten the privacy of a social networking site user. World J. Comput. Appl. Technol. 1(2), 29–34 (2013)
5. Al-Saggaf, Y., Islam, M.Z.: Data mining and privacy of social network sites users: implications of the data mining problem. Sci. Eng. Ethics (2014)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献