An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks. Dev, H., Sen, T., Basak, M., & Ali, M. E. In 2012 SC Companion: High Performance Computing, Networking Storage and Analysis, Salt Lake City, UT, USA, November 10-16, 2012, pages 1106–1115, 2012. Paper doi bibtex @inproceedings{DBLP:conf/sc/DevSBA12,
author = {Himel Dev and
Tanmoy Sen and
Madhusudan Basak and
Mohammed Eunus Ali},
title = {An Approach to Protect the Privacy of Cloud Data from Data Mining
Based Attacks},
booktitle = {2012 {SC} Companion: High Performance Computing, Networking Storage
and Analysis, Salt Lake City, UT, USA, November 10-16, 2012},
pages = {1106--1115},
year = {2012},
crossref = {DBLP:conf/sc/2012c},
url = {https://doi.org/10.1109/SC.Companion.2012.133},
doi = {10.1109/SC.Companion.2012.133},
timestamp = {Tue, 23 May 2017 01:00:00 +0200},
biburl = {http://dblp.org/rec/bib/conf/sc/DevSBA12},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"me48LphEBvXTWtMod","bibbaseid":"dev-sen-basak-ali-anapproachtoprotecttheprivacyofclouddatafromdataminingbasedattacks-2012","downloads":0,"creationDate":"2016-12-26T03:33:02.330Z","title":"An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks","author_short":["Dev, H.","Sen, T.","Basak, M.","Ali, M. E."],"year":2012,"bibtype":"inproceedings","biburl":"https://drive.google.com/uc?export=download&id=0BzJfvbMkJOP6Mm80Sng5SnBKUVU","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Himel"],"propositions":[],"lastnames":["Dev"],"suffixes":[]},{"firstnames":["Tanmoy"],"propositions":[],"lastnames":["Sen"],"suffixes":[]},{"firstnames":["Madhusudan"],"propositions":[],"lastnames":["Basak"],"suffixes":[]},{"firstnames":["Mohammed","Eunus"],"propositions":[],"lastnames":["Ali"],"suffixes":[]}],"title":"An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks","booktitle":"2012 SC Companion: High Performance Computing, Networking Storage and Analysis, Salt Lake City, UT, USA, November 10-16, 2012","pages":"1106–1115","year":"2012","crossref":"DBLP:conf/sc/2012c","url":"https://doi.org/10.1109/SC.Companion.2012.133","doi":"10.1109/SC.Companion.2012.133","timestamp":"Tue, 23 May 2017 01:00:00 +0200","biburl":"http://dblp.org/rec/bib/conf/sc/DevSBA12","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@inproceedings{DBLP:conf/sc/DevSBA12,\n author = {Himel Dev and\n Tanmoy Sen and\n Madhusudan Basak and\n Mohammed Eunus Ali},\n title = {An Approach to Protect the Privacy of Cloud Data from Data Mining\n Based Attacks},\n booktitle = {2012 {SC} Companion: High Performance Computing, Networking Storage\n and Analysis, Salt Lake City, UT, USA, November 10-16, 2012},\n pages = {1106--1115},\n year = {2012},\n crossref = {DBLP:conf/sc/2012c},\n url = {https://doi.org/10.1109/SC.Companion.2012.133},\n doi = {10.1109/SC.Companion.2012.133},\n timestamp = {Tue, 23 May 2017 01:00:00 +0200},\n biburl = {http://dblp.org/rec/bib/conf/sc/DevSBA12},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n","author_short":["Dev, H.","Sen, T.","Basak, M.","Ali, M. E."],"key":"DBLP:conf/sc/DevSBA12","id":"DBLP:conf/sc/DevSBA12","bibbaseid":"dev-sen-basak-ali-anapproachtoprotecttheprivacyofclouddatafromdataminingbasedattacks-2012","role":"author","urls":{"Paper":"https://doi.org/10.1109/SC.Companion.2012.133"},"downloads":0},"search_terms":["approach","protect","privacy","cloud","data","data","mining","based","attacks","dev","sen","basak","ali"],"keywords":["clouds","data mining","data privacy","security"],"authorIDs":["5861b00106b027e045000001"],"dataSources":["SepY7ELbEme5XcvhJ"]}