Login / Signup
Optimised K-anonymisation technique to deal with mutual friends and degree attacks.
Amardeep Singh
Monika Singh
Divya Bansal
Sanjeev Sofat
Published in:
Int. J. Inf. Comput. Secur. (2021)
Keyphrases
</>
watermarking scheme
databases
countermeasures
statistical data
traffic analysis
artificial intelligence
watermarking method
denial of service attacks
malicious attacks
malicious users
data corruption