Mining frequent itemsets in the presence of malicious participants.
Yoones Asgharzadeh SekhavatMohammad FathianPublished in: IET Inf. Secur. (2010)
Keyphrases
- mining frequent itemsets
- uncertain data
- frequent itemsets
- data streams
- mining association rules
- mining frequent patterns
- itemsets
- transaction databases
- association rules mining
- mining of frequent itemsets
- fp tree
- mining algorithm
- frequent itemset mining
- malicious behavior
- distributed environment
- data distribution
- association rules
- real world
- databases
- data sets