Normal view MARC view ISBD view

Privacy and Security Issues in Data Mining and Machine Learning [electronic resource] : International ECML/PKDD Workshop, PSDML 2010, Barcelona, Spain, September 24, 2010. Revised Selected Papers / edited by Christos Dimitrakakis, Aris Gkoulalas-Divanis, Aikaterini Mitrokotsa, Vassilios S. Verykios, Yücel Saygin.

Contributor(s): Dimitrakakis, Christos [editor.] | Gkoulalas-Divanis, Aris [editor.] | Mitrokotsa, Aikaterini [editor.] | Verykios, Vassilios S [editor.] | Saygin, Yücel [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Artificial Intelligence: 6549Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: VII, 141 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642198960.Subject(s): Artificial intelligence | Database management | Electronic data processing -- Management | Computers and civilization | Artificial Intelligence | Database Management | IT Operations | Computers and SocietyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 006.3 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010. The 11 revised full papers presented were carefully reviewed and selected from 21 submissions. The papers range from data privacy to security applications, focusing on detecting malicious behavior in computer systems.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010. The 11 revised full papers presented were carefully reviewed and selected from 21 submissions. The papers range from data privacy to security applications, focusing on detecting malicious behavior in computer systems.

There are no comments for this item.

Log in to your account to post a comment.