Login / Signup
Detecting fraudulent activity in a cloud using privacy-friendly data aggregates.
Marc Solanas
Julio Hernandez-Castro
Debojyoti Dutta
Published in:
CoRR (2014)
Keyphrases
</>
data sets
database
sensitive information
sensor data
data collection
data structure
data analysis
association rules
data points
knowledge discovery
image data
private data
data privacy
temporal databases
data quality
cloud computing
computer systems
data processing
data management
sensor networks
training data