Search Results for - Narrowed by: Data Mining and Knowledge Discovery. - Data Encryption.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bMining$002band$002bKnowledge$002bDiscovery.$002509Data$002bMining$002band$002bKnowledge$002bDiscovery.$0026qf$003dSUBJECT$002509Subject$002509Data$002bEncryption.$002509Data$002bEncryption.$0026ps$003d300?2024-06-14T07:54:12ZIntelligence and Security Informatics IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027322024-06-14T07:54:12Z2024-06-14T07:54:12Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69304-8">http://dx.doi.org/10.1007/978-3-540-69304-8</a><br/>Format: Electronic Resources<br/>Privacy-Preserving Data Mining Models and Algorithmsent://SD_ILS/0/SD_ILS:5016612024-06-14T07:54:12Z2024-06-14T07:54:12Zby Aggarwal, Charu C. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-70992-5">http://dx.doi.org/10.1007/978-0-387-70992-5</a><br/>Format: Electronic Resources<br/>Data Warehousing and Data Mining Techniques for Cyber Securityent://SD_ILS/0/SD_ILS:5056472024-06-14T07:54:12Z2024-06-14T07:54:12Zby Singhal, Anoop. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Privacy Preserving Data Miningent://SD_ILS/0/SD_ILS:5049242024-06-14T07:54:12Z2024-06-14T07:54:12Zby Vaidya, Jaideep. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format: Electronic Resources<br/>