Author of the publication

User Profile Management to protect sensitive data in Warehouses.

, , and . Int. J. Next Gener. Comput., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sécurisation des entrepôts de données contre les inférences en utilisant les réseaux Bayésiens., , , and . EDA, volume B-6 of RNTI, page 35-47. Cépaduès, (2010)Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection, , and . CoRR, (2010)Les Systèmes Multi Agents au Service de la Sécurité des Données Entreposées dans le Cloud., , , and . EDA, volume B-14 of RNTI, page 133-146. Éditions RNTI, (2018)Verification of Security Coherence in Data Warehouse Designs., , , , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 207-213. Springer, (2012)Analyse visuelle pour la détection des intrusions., and . EGC, volume E-28 of Revue des Nouvelles Technologies de l'Information, page 197-202. Hermann-Éditions, (2015)Including Images into Message Veracity Assessment in Social Media., , , and . CoRR, (2020)Calling to CNN-LSTM for Rumor Detection: A Deep Multi-channel Model for Message Veracity Classification in Microblogs., , , , and . ECML/PKDD (5), volume 12979 of Lecture Notes in Computer Science, page 497-513. Springer, (2021)Real detection intrusion using supervised and unsupervised learning., and . SoCPaR, page 321-326. IEEE, (2013)Modeling Conflict of Interest in the Design of Secure Data Warehouses., , , and . KEOD, page 445-448. SciTePress, (2010)User Profile Management to protect sensitive data in Warehouses., , and . Int. J. Next Gener. Comput., (2018)