Author of the publication

A k-anonymous approach to privacy preserving collaborative filtering.

, , , , and . J. Comput. Syst. Sci., 81 (6): 1000-1011 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

s-health as a driver towards better emergency response systems in urban environments., , , and . MeMeA, page 214-218. IEEE, (2015)A survey on mobile affective computing., , and . Comput. Sci. Rev., (2017)Promoting smart tourism personalised services via a combination of deep learning techniques., , and . Expert Syst. Appl., (2022)NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation., , , , and . J. Inf. Secur. Appl., (2021)Who Watches the New Watchmen? The Challenges for Drone Digital Forensics Investigations., and . CoRR, (2021)AiCEF: An AI-assisted Cyber Exercise Content Generation Framework Using Named Entity Recognition., and . CoRR, (2022)Profiling tax and financial behaviour with big data under the GDPR., , and . Comput. Law Secur. Rev., 35 (3): 306-329 (2019)Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents., , , , , , , and . Comput. Secur., (2022)Unearthing malicious campaigns and actors from the blockchain DNS ecosystem., , , and . Comput. Commun., (2021)Who watches the new watchmen? The challenges for drone digital forensics investigations., and . Array, (2022)