Privacy based classification model of public data by utilizing two-steps validation approach
Digital information has become a trend and is integral to modernizing and leveraging various resources in Information Technology (IT). Vast data and information can be obtained anytime and anywhere at our fingertips through ICT facilities. This is considered public data due to its being shared publi...
| Main Authors: | Hussin,, Masnida, Raja Mahmood, Raja Azlina |
|---|---|
| Format: | Article |
| Published: |
Penerbit Universiti Kebangsaan Malaysia (UKM Press)
2023
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/102898/ |
Similar Items
An attribute-based data privacy classification through the Bayesian theorem to raise awareness in public data sharing activity
by: Abdul Aziz, Nur Aziana Azwani, et al.
Published: (2024)
by: Abdul Aziz, Nur Aziana Azwani, et al.
Published: (2024)
Sensor communication model using cyber-physical system approach for green data center
by: Hussin, Masnida, et al.
Published: (2019)
by: Hussin, Masnida, et al.
Published: (2019)
Model klasifikasi berasaskan privasi data awam dengan menggunakan pendekatan pengesahan dua peringkat
by: Masnida Hussin,, et al.
Published: (2022)
by: Masnida Hussin,, et al.
Published: (2022)
Performance evaluation of an adaptive forwarding strategy in Named Data Networking
by: Raja Mahmood, Raja Azlina, et al.
Published: (2019)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2019)
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
Privacy preserving social network data publication
by: Abawajy, Jemal H., et al.
Published: (2016)
by: Abawajy, Jemal H., et al.
Published: (2016)
On discrete event simulation of time-variance defense mechanism against low-rate denial of service
by: Hussin, Masnida, et al.
Published: (2015)
by: Hussin, Masnida, et al.
Published: (2015)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
by: Raja Mahmood, Raja Azlina, et al.
Published: (2021)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2021)
A performance modeling framework for energy-based scheduling in cloud
by: Hussin, Masnida, et al.
Published: (2015)
by: Hussin, Masnida, et al.
Published: (2015)
Dynamic privacy in public surveillance
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
A performance optimization model of task scheduling towards green cloud computing
by: Hussin, Masnida, et al.
Published: (2016)
by: Hussin, Masnida, et al.
Published: (2016)
A hybrid protection method to enhance data utility while preserving the privacy of medical patients data publishing
by: Jeba, Shermina, et al.
Published: (2022)
by: Jeba, Shermina, et al.
Published: (2022)
Impact of ICT on privacy and personal data protection in two Malaysian academic libraries
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
Impact of ICT on privacy and personal data protection in two Malaysian academic libraries
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
Utilizing hippocratic database for personal information privacy protection
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
The two-steps approach in preserving an online examination integrity
by: Aishah, Abu Bakar
Published: (2021)
by: Aishah, Abu Bakar
Published: (2021)
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
by: Raja Mahmood, Raja Azlina, et al.
Published: (2014)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2014)
Impact of node inter-domain movement on MANETs performance
by: Raja Mahmood, Raja Azlina, et al.
Published: (2015)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2015)
Distributed defense scheme for managing DNS reflection attack in network communication systems
by: Ahmed, Dana Hasan, et al.
Published: (2016)
by: Ahmed, Dana Hasan, et al.
Published: (2016)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Should Australian Government websites be taking more steps to protect privacy and security?
by: Thompson, Nik, et al.
Published: (2020)
by: Thompson, Nik, et al.
Published: (2020)
The use of audio-visual aids in recalling plot and characters in Step by Wicked Step / Yegnese Raja
by: Yegnese, Raja
Published: (2017)
by: Yegnese, Raja
Published: (2017)
Malware classification framework for dynamic analysis using Information Theory
by: Moshiri, Ehsan, et al.
Published: (2017)
by: Moshiri, Ehsan, et al.
Published: (2017)
Step by step inputting data to eprints
by: Mohd Faizal, H.
Published: (2012)
by: Mohd Faizal, H.
Published: (2012)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
The robustness of two step estimation against heteroskedasticity and outliers in panel data
Data Privacy And Malaysia E-Commerce
by: Alias, Mohammad Suffian
Published: (2003)
by: Alias, Mohammad Suffian
Published: (2003)
Data pre-processing of website browsing record: An initial step for web page classification
by: Siti Hawa, Apandi, et al.
Published: (2021)
by: Siti Hawa, Apandi, et al.
Published: (2021)
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems
by: Luo, Entao, et al.
Published: (2018)
by: Luo, Entao, et al.
Published: (2018)
Privacy in public spaces: what expectations of privacy do we have in social media intelligence?
by: Edwards, Lilian, et al.
Published: (2016)
by: Edwards, Lilian, et al.
Published: (2016)
Utilization of community pharmacy space to enhance privacy: A qualitative study
by: Hattingh, H. Laetitia, et al.
Published: (2015)
by: Hattingh, H. Laetitia, et al.
Published: (2015)
Two-step procedures for hybrid geoid modelling
by: Sjoeberg, L., et al.
Published: (2004)
by: Sjoeberg, L., et al.
Published: (2004)
Artificial neural network approach in radar target classification
by: Ibrahim, N. K., et al.
Published: (2009)
by: Ibrahim, N. K., et al.
Published: (2009)
Personal data “Up in the air”: A tale of two Malaysian airlines in dealing with consumers online privacy
by: Zulhuda, Sonny, et al.
Published: (2011)
by: Zulhuda, Sonny, et al.
Published: (2011)
Personal data “Up in the Air”: a tale of two Malaysian airlines in dealing with consumers online privacy
by: Zulhuda, Sonny, et al.
Published: (2011)
by: Zulhuda, Sonny, et al.
Published: (2011)
A three-step classification framework to handle complex data distribution for radar UAV detection
by: Ren, Jianfeng, et al.
Published: (2020)
by: Ren, Jianfeng, et al.
Published: (2020)
Hotel data privacy: strategies to reduce customers' emotional violations, privacy concerns, and switching intention
by: Yu, Jongsik, et al.
Published: (2022)
by: Yu, Jongsik, et al.
Published: (2022)
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019)
by: BinJubeir, Mohammed, et al.
Published: (2019)
Big Healthcare Data: Survey of Challenges and Privacy
by: Mohammed, Jubeir, et al.
Published: (2020)
by: Mohammed, Jubeir, et al.
Published: (2020)
Similar Items
-
An attribute-based data privacy classification through the Bayesian theorem to raise awareness in public data sharing activity
by: Abdul Aziz, Nur Aziana Azwani, et al.
Published: (2024) -
Sensor communication model using cyber-physical system approach for green data center
by: Hussin, Masnida, et al.
Published: (2019) -
Model klasifikasi berasaskan privasi data awam dengan menggunakan pendekatan pengesahan dua peringkat
by: Masnida Hussin,, et al.
Published: (2022) -
Performance evaluation of an adaptive forwarding strategy in Named Data Networking
by: Raja Mahmood, Raja Azlina, et al.
Published: (2019) -
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)