Publisher
Springer Nature Singapore
Reference12 articles.
1. Jakhar J, Kumar V, Kumar V (2013) Intrusion detection using data mining techniques: a Study through different approach. Int J Appl Sci Technol Res Excell 3(4):1–6
2. Silva J, Cubillos J, Villa JV, Romero L, Solano D, Fernández C (2019) Preservation of confidential information privacy and association rule hiding for data mining: a bibliometric review. Proc Comp Sci 15:1219–1224
3. Mazumdar S (2017) From data integrity to inference integrity. In: 2nd international conference on telecommunication and networks (TEL-NET), pp 1–1
4. Kelley HJ (1969) Entropy of knowledge. Philos Sci 36(2):178–196
5. Goliwale P, Gupta V, Johre A, Bendale S (2018) Intrusion detection system using data mining. Int Res J Eng Technol (IRJET) 05(03):234–238