2 Questions 58 Answers 0 Followers
Questions related from Sashank Dara
Are there any publicly available real database activity logs for misuse/anomaly/insider threats detection ?
23 May 2016 9,546 3 View
deFinetti's theorem is considered as "final nail in the coffin" for its impact on privacy preserving data mining techniques that are syntactic type. For example k-anonymity, l-diversity,...
09 April 2015 308 1 View