搜索结果: 1-2 共查到“信息与通信工程 Anonymity”相关记录2条 . 查询时间(0.031 秒)
An Improved Utility Driven Approach Towards K-Anonymity Using Data Constraint Rules
Data Privacy Utility K-Anonymity
2015/5/26
As medical data continues to transition to electronic formats, opportunities arise for researchers to use this microdata to discover patterns and increase knowledge that can improve patient care. Now ...
Since the inception of malware, the primary objective of its authorshas been to either hide or camouflage their identities and locations inthe Internet. To do this, attackers use traditional technique...