Login / Signup
Re-identification attacks - A systematic literature review.
Jane Henriksen-Bulmer
Sheridan Jeary
Published in:
Int. J. Inf. Manag. (2016)
Keyphrases
</>
literature review
case study
fuzzy theory
current issues
information systems development
countermeasures
public libraries
design science
knowledge management
ddos attacks