Discovering reliable evidence of data misuse by exploiting rule redundancy.
Laura GengaNicola ZannoneAnna Cinzia SquicciariniPublished in: Comput. Secur. (2019)
Keyphrases
- data sets
- database
- synthetic data
- missing data
- data processing
- small number
- data quality
- complex data
- high quality
- data structure
- raw data
- data acquisition
- image data
- original data
- knowledge discovery
- data mining techniques
- clustering algorithm
- data distribution
- data mining algorithms
- sensor data
- personal data
- computer systems
- data collection
- input data
- end users
- prior knowledge
- data analysis
- training data
- data mining
- neural network