Login / Signup

Optimised K-anonymisation technique to deal with mutual friends and degree attacks.

Amardeep SinghMonika SinghDivya BansalSanjeev Sofat
Published in: Int. J. Inf. Comput. Secur. (2021)
Keyphrases
  • watermarking scheme
  • databases
  • countermeasures
  • statistical data
  • traffic analysis
  • artificial intelligence
  • watermarking method
  • denial of service attacks
  • malicious attacks
  • malicious users
  • data corruption