Login / Signup
Countering Terrorism through Information and Privacy Protection Technologies.
Robert L. Popp
J. C. Poindexter
Published in:
IEEE Secur. Priv. (2006)
Keyphrases
</>
privacy protection
end users
private information
personal data
data sets
data mining
privacy preserving
raw data
decision trees
information loss