

Network Security and Data Mining : Comprehensive Review
Abstract
References
Kumar, A., et al. (2021). Secure data mining in cloud computing: Techniques and applications. Journal of Cloud Security.
Smith, B. (2022). Anomaly detection in large datasets: Advances and challenges. IEEE Transactions on Knowledge and Data Engineering.
Lee, C., & Kim, D. (2023). Privacy-preserving techniques in data mining. ACM Computing Surveys.
Patel, D., et al. (2020). Homomorphic encryption for secure data mining applications. Journal of Cryptographic Algorithms.
Zhao, H. (2021). Cryptographic protocols for secure multi-party computation in data mining. International Journal of Computer Security.
Gupta, F., & Singh, H. (2021). Differential privacy in data mining: Concepts and techniques. Journal of Information Security.
Brown, G. (2023). Adapting data mining techniques for real-time applications. IEEE Access.
Zhang, E. (2022). Clustering algorithms for anomaly detection: A comprehensive review. Data Science Journal.
Refbacks
- There are currently no refbacks.