Open Access Open Access  Restricted Access Subscription Access

Network Security and Data Mining : Comprehensive Review

Vipin Kumar, Mrs. DEEPTI SHARMA

Abstract


Information and databases are defined as support systems that play an important role in information retrieval and use. This study presents the results of eight research projects and investigates security-related technologies such as error detection, encryption, and data mining

Full Text:

PDF

References


Kumar, A., et al. (2021). Secure data mining in cloud computing: Techniques and applications. Journal of Cloud Security.

Smith, B. (2022). Anomaly detection in large datasets: Advances and challenges. IEEE Transactions on Knowledge and Data Engineering.

Lee, C., & Kim, D. (2023). Privacy-preserving techniques in data mining. ACM Computing Surveys.

Patel, D., et al. (2020). Homomorphic encryption for secure data mining applications. Journal of Cryptographic Algorithms.

Zhao, H. (2021). Cryptographic protocols for secure multi-party computation in data mining. International Journal of Computer Security.

Gupta, F., & Singh, H. (2021). Differential privacy in data mining: Concepts and techniques. Journal of Information Security.

Brown, G. (2023). Adapting data mining techniques for real-time applications. IEEE Access.

Zhang, E. (2022). Clustering algorithms for anomaly detection: A comprehensive review. Data Science Journal.


Refbacks

  • There are currently no refbacks.