Privacy, Security, and Trust in KDD: Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers

Author:   Francesco Bonchi ,  Elena Ferrari ,  Wei Jiang ,  Bradley Malin
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2009 ed.
Volume:   5456
ISBN:  

9783642017179


Pages:   127
Publication Date:   25 May 2009
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $171.47 Quantity:  
Add to Cart

Share |

Privacy, Security, and Trust in KDD: Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers


Add your own review!

Overview

Full Product Details

Author:   Francesco Bonchi ,  Elena Ferrari ,  Wei Jiang ,  Bradley Malin
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2009 ed.
Volume:   5456
Dimensions:   Width: 15.50cm , Height: 1.30cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783642017179


ISBN 10:   3642017177
Pages:   127
Publication Date:   25 May 2009
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Invited Paper.- Data Mining for Security Applications and Its Privacy Implications.- Geocode Matching and Privacy Preservation.- Mobility, Data Mining and Privacy the Experience of the GeoPKDD Project.- Contributed Papers.- Data and Structural k-Anonymity in Social Networks.- Composing Miners to Develop an Intrusion Detection Solution.- Malicious Code Detection Using Active Learning.- Maximizing Privacy under Data Distortion Constraints in Noise Perturbation Methods.- Strategies for Effective Shilling Attacks against Recommender Systems.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List