Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy preserving data publishing: a coalitional game theory perspective., and . Int. J. Comput. Intell. Stud., 3 (2/3): 196-220 (2014)A Novel Lattice Based Research Frame Work for Identifying Web User's Behavior with Web Usage Mining., and . ICT, volume 101 of Communications in Computer and Information Science, page 90-99. Springer, (2010)Analysis of Network IO Performance in Hadoop Cluster Environments Based on Docker Containers., , , and . SocProS (2), volume 437 of Advances in Intelligent Systems and Computing, page 227-237. Springer, (2015)Analysis of a Network IO Bottleneck in Big Data Environments Based on Docker Containers., , , and . Big Data Res., (2016)Minimum Spanning Tree Based k-Anonymity., , and . SocProS (1), volume 130 of Advances in Intelligent and Soft Computing, page 405-413. Springer, (2011)Policy Based Controlled Migration of Mobile Agents to Untrusted Hosts., , , , and . IIH-MSP, page 550-553. IEEE Computer Society, (2007)Credibility Based Reputation Calculation in P2P Networks., , , and . ICDCIT, volume 5375 of Lecture Notes in Computer Science, page 188-195. Springer, (2008)An Efficient and Dynamic Concept Hierarchy Generation for Data Anonymization., and . ICDCIT, volume 7753 of Lecture Notes in Computer Science, page 488-499. Springer, (2013)Attribute Based Anonymity for Preserving Privacy., and . ACC (4), volume 193 of Communications in Computer and Information Science, page 572-579. Springer, (2011)Study of Visitor Behavior by Web Usage Mining., , and . BAIP, volume 70 of Communications in Computer and Information Science, page 181-187. Springer, (2010)