dc.contributor.author | Mohammed, Kabiru | |
dc.contributor.author | Ayesh, Aladdin | |
dc.contributor.author | Boiten, Eerke | |
dc.date.accessioned | 2024-05-31T23:11:14Z | |
dc.date.available | 2024-05-31T23:11:14Z | |
dc.date.issued | 2021-09 | |
dc.identifier | 229218659 | |
dc.identifier | 23a50b83-f2e3-4646-b80c-a85ebaa50c1b | |
dc.identifier | 85113407408 | |
dc.identifier.citation | Mohammed , K , Ayesh , A & Boiten , E 2021 , ' Complementing privacy and utility trade-off with self-organising maps ' , Cryptography , vol. 5 , no. 3 , 20 . https://doi.org/10.3390/cryptography5030020 | en |
dc.identifier.issn | 2410-387X | |
dc.identifier.other | ORCID: /0000-0002-5883-6113/work/131351505 | |
dc.identifier.uri | http://aura-test.abdn.ac.uk/handle/2164/20313 | |
dc.description | This research received no external funding. | en |
dc.format.extent | 502765 | |
dc.language.iso | eng | |
dc.relation.ispartof | Cryptography | en |
dc.subject | Clustering | en |
dc.subject | K-anonymity | en |
dc.subject | Privacy preserving data mining | en |
dc.subject | Self-organising map | en |
dc.subject | QA75 Electronic computers. Computer science | en |
dc.subject | Software | en |
dc.subject | Computer Science Applications | en |
dc.subject | Computer Networks and Communications | en |
dc.subject | Computational Theory and Mathematics | en |
dc.subject | Applied Mathematics | en |
dc.subject | Supplementary Data | en |
dc.subject.lcc | QA75 | en |
dc.title | Complementing privacy and utility trade-off with self-organising maps | en |
dc.type | Journal article | en |
dc.description.status | Peer reviewed | en |
dc.identifier.doi | https://doi.org/10.3390/cryptography5030020 | |
dc.identifier.url | http://www.scopus.com/inward/record.url?scp=85113407408&partnerID=8YFLogxK | en |
dc.identifier.url | https://archive.ics.uci.edu/ml/datasets/Adult | en |