Login / Signup
An approach to custom privacy policy violation detection problems using big social provenance data.
Mohamed Jehad Baeth
Mehmet S. Aktas
Published in:
Concurr. Comput. Pract. Exp. (2018)
Keyphrases
</>
data sets
data analysis
data points
data collection
data distribution
data quality
distributed data
knowledge discovery
input data
fine grained
raw data
anomaly detection
data mining algorithms
original data
privacy requirements