Show simple item record

dc.contributor.authorMohammed, Kabiru
dc.contributor.authorAyesh, Aladdin
dc.contributor.authorBoiten, Eerke
dc.date.accessioned2024-05-31T23:11:14Z
dc.date.available2024-05-31T23:11:14Z
dc.date.issued2021-09
dc.identifier229218659
dc.identifier23a50b83-f2e3-4646-b80c-a85ebaa50c1b
dc.identifier85113407408
dc.identifier.citationMohammed , K , Ayesh , A & Boiten , E 2021 , ' Complementing privacy and utility trade-off with self-organising maps ' , Cryptography , vol. 5 , no. 3 , 20 . https://doi.org/10.3390/cryptography5030020en
dc.identifier.issn2410-387X
dc.identifier.otherORCID: /0000-0002-5883-6113/work/131351505
dc.identifier.urihttp://aura-test.abdn.ac.uk/handle/2164/20313
dc.descriptionThis research received no external funding.en
dc.format.extent502765
dc.language.isoeng
dc.relation.ispartofCryptographyen
dc.subjectClusteringen
dc.subjectK-anonymityen
dc.subjectPrivacy preserving data miningen
dc.subjectSelf-organising mapen
dc.subjectQA75 Electronic computers. Computer scienceen
dc.subjectSoftwareen
dc.subjectComputer Science Applicationsen
dc.subjectComputer Networks and Communicationsen
dc.subjectComputational Theory and Mathematicsen
dc.subjectApplied Mathematicsen
dc.subjectSupplementary Dataen
dc.subject.lccQA75en
dc.titleComplementing privacy and utility trade-off with self-organising mapsen
dc.typeJournal articleen
dc.description.statusPeer revieweden
dc.identifier.doihttps://doi.org/10.3390/cryptography5030020
dc.identifier.urlhttp://www.scopus.com/inward/record.url?scp=85113407408&partnerID=8YFLogxKen
dc.identifier.urlhttps://archive.ics.uci.edu/ml/datasets/Adulten


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record