Author:
Alassery Fawaz,Alzahrani Ahmed,Irshad Khan Asif,Sharma Kanika,Ahmad Masood,Ahmad Khan Raees
Publisher
Computers, Materials and Continua (Tech Science Press)
Subject
General Computer Science,Theoretical Computer Science,Control and Systems Engineering
Reference39 articles.
1. Analyzing the implications of healthcare data breaches through computational technique;Almulihi;Intelligent Automation & Soft Computing,2022
2. Multicenter patient records research: Security policies and tools;Behlen;Journal of the American Medical Informatics Association,2018
3. RSA based encryption approach for preserving confidentiality of big data;Sharma;Journal of King Saud University-Computer and Information Sciences,2019
4. A hierarchical fuzzy logic systems frame work for data security;Mohammadian;International Journal of Information Technology,2017
5. Privacy preserving data mining;Agrawal;Journal of Data Management,2000
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献