Published May 23, 2021 | Version v1
Book chapter Open

The data mining and information security

  • 1. Dr. D. Y. Patil B-School, Pune

Description

This Book chapter deals with the issues around data mining and security. Data-storing and data-searching, for fun and profit. Also, in the military, which relies on discipline and routines to a greater degree, maintaining a stable operational security is a challenge for mining machines. The level of vulnerability affects the likelihood of a security attacks. The security mechanism and type of data mining will differ, since there are no fixed standards in the realm of creativity.

Files

7. The data mining and information security.pdf

Files (14.3 MB)

Name Size Download all
md5:5f931699bf92676489ea8bf2cd89e3ec
14.3 MB Preview Download

Additional details

References

  • Database Security IX Status and Prospects Edited by D. L. Spooner, S. A.Demurjian and J. E. Dobson ISBN 0 41272920 2, 1996, pp. 391-399.
  • Lin, T. Y. (1993), "Rough Patterns in Data-Rough Sets and Intrusion DetectionSystems", Journal of Foundation of Computer Science and Decision Support,Vol.18, No. 3-4, 1993. pp. 225-241. The extended version of "Patterns in Data-Rough Sets and Foundation of Intrusion Detection Systems" presented at the FirstInvitational Workshop on Rough Sets, Poznan-Kiekrz, September 2-4. 1992