Login / Signup
Vulnerability of Complementary Cell Suppression to Intruder Attack.
Lawrence H. Cox
Published in:
J. Priv. Confidentiality (2010)
Keyphrases
</>
sensitive data
cell suppression
data confidentiality
attack graphs
attack graph
data storage
buffer overflow
tabular data
data sharing
data privacy
penetration testing
secret key
data quality
statistical agencies
dos attacks
database
simulated annealing
optimal solution
data mining