Published May 23, 2021
| Version v1
Book chapter
Open
The data mining and information security
Description
This Book chapter deals with the issues around data mining and security. Data-storing and data-searching, for fun and profit. Also, in the military, which relies on discipline and routines to a greater degree, maintaining a stable operational security is a challenge for mining machines. The level of vulnerability affects the likelihood of a security attacks. The security mechanism and type of data mining will differ, since there are no fixed standards in the realm of creativity.
Files
7. The data mining and information security.pdf
Files
(14.3 MB)
Name | Size | Download all |
---|---|---|
md5:5f931699bf92676489ea8bf2cd89e3ec
|
14.3 MB | Preview Download |
Additional details
References
- Database Security IX Status and Prospects Edited by D. L. Spooner, S. A.Demurjian and J. E. Dobson ISBN 0 41272920 2, 1996, pp. 391-399.
- Lin, T. Y. (1993), "Rough Patterns in Data-Rough Sets and Intrusion DetectionSystems", Journal of Foundation of Computer Science and Decision Support,Vol.18, No. 3-4, 1993. pp. 225-241. The extended version of "Patterns in Data-Rough Sets and Foundation of Intrusion Detection Systems" presented at the FirstInvitational Workshop on Rough Sets, Poznan-Kiekrz, September 2-4. 1992