Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
17
Page No.
7187 - 7191
References
Castro, F., A. Vellido, A. Nebot and F. Mugica, 2007. Applying Data Mining Techniques to E-Learning Problems. In: Evolution of Teaching and Learning Paradigms in Intelligent Environment, Jain, L.C., R.A. Tedman and D.K. Tedman (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-71973-1, pp: 183-221.
Chandrakar, I., Y.U. Rani, M. Manasa and K. Renuka, 2010. Hybrid algorithm for privacy preserving association rule mining. J. Comput. Sci., 6: 1494-1498.
Coulouris, G.F., J. Dollimore and T. Kindberg, 2005. Distributed Systems: Concepts and Design. Addison-Wesley, Boston, Massachusetts, USA., ISBN:9780321263544, Pages: 927.
Dwork, C., 2008. Differential Privacy: A Survey of Results. In: Theory and Applications of Models of Computation, Agrawal, M., D. Du, Z. Duan and A. Li (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-79227-7, pp: 1-19.
Hastie, T., R. Tibshirani and J. Friedman, 2009. Unsupervised Learning. In: The Elements of Statistical Learning, Hastie, T., R. Tibshirani and J. Friedman (Eds.). Springer, New York, USA., ISBN:978-0-387-84857-0, pp: 485-585.
Kantarcioglu, M., R. Nix and J. Vaidya, 2009. An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining. In: Advances in Knowledge Discovery and Data Mining, Theeramunkong, T., B. Kijsirikul, N. Cercone and T.B. Ho (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-01306-5, pp: 515-524.
LeMay, M., G. Gross, C.A. Gunter and S. Garg, 2007. Unified architecture for large-scale attested metering. Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS’07), January 3-6, 2007, IEEE, Waikoloa Village, Hawaii, pp: 115-115.
Malkhi, D., N. Nisan, B. Pinkas and Y. Sella, 2004. Fairplay-secure two-party computation system. Proceedings of the 13th Symposium on USENIX Security Vol. 4, August 9-13, 2004, USENIX, San Diego, California, pp: 1-17.
Modi, C.N. and A.R. Patil, 2016. Privacy Preserving Association Rule Mining in Horizontally Partitioned Databases Without Involving Trusted Third Party (TTP). In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, Nagar, A., D. Mohapatra and N. Chaki (Eds.). Springer, India, ISBN:978-81-322-2528-7, pp: 549-555.
Pathak, K., N.S. Chaudhari and A. Tiwari, 2012. Privacy preserving association rule mining by introducing concept of impact factor. Proceedings of the 7th IEEE Conference on Industrial Electronics and Applications (ICIEA’12), July 18-20, 2012, IEEE, Singapore, ISBN:978-1-4577-2118-2, pp: 1458-1461.
Romero, C. and S. Ventura, 2010. Educational data mining: A review of the state of the art. IEEE Trans. Syst. Man Cybernet. Part C: Appl. Rev., 40: 601-618.
CrossRef | Tajbakhsh, A., M. Rahmati and A. Mirzaei, 2009. Intrusion detection using fuzzy association rules. Appl. Soft Comput., 9: 462-469.
Direct Link | Verykios, V.S., A.K. Elmagarmid, E. Bertino, Y. Saygin and E. Dasseni, 2004. Association rule hiding. IEEE. Trans. Knowl. Data Eng., 16: 434-447.
CrossRef | Wu, X., V. Kumar, J.R. Quinlan, J. Ghosh and Q. Yang
et al., 2008. Top 10 algorithms in data mining. Knowledge Inform. Syst., 14: 1-37.
CrossRef | Direct Link | Yi, X., F.Y. Rao, E. Bertino and A. Bouguettaya, 2015. Privacy-preserving association rule mining in cloud computing. Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, April 14, 2015, ACM, Singapore, ISBN:978-1-4503-3245-3, pp: 439-450.
Zhu, J. and Z. Li, 2015. Privacy Preserving Association Rule Mining Algorithm Based on Hybrid Partial Hiding Strategy. In: LISS, Zhang, R., Z. Zhang, K. Liu and J. Zhang (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-40660-7, pp: 1065-1070.
Zissis, D. and D. Lekkas, 2012. Addressing cloud computing security issues. Future Generation Comput. Syst., 28: 583-592.
Direct Link |