{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:09Z","timestamp":1740099249220,"version":"3.37.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030050627"},{"type":"electronic","value":"9783030050634"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05063-4_49","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T19:23:45Z","timestamp":1544124225000},"page":"628-642","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Sensitive Data Detection Using NN and KNN from Big Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9655-7238","authenticated-orcid":false,"given":"Binod Kumar","family":"Adhikari","sequence":"first","affiliation":[]},{"given":"Wan Li","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Maharjan","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"issue":"5","key":"49_CR1","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MIC.2013.100","volume":"17","author":"W Tan","year":"2013","unstructured":"Tan, W., Blake, M.B., Saleh, I., Dustdar, S.: Social-network-sourced big data analytics. IEEE Internet Comput. 17(5), 62\u201369 (2013)","journal-title":"IEEE Internet Comput."},{"key":"49_CR2","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2014.01.015","volume":"275","author":"CP Chen","year":"2014","unstructured":"Chen, C.P., Zhang, C.-Y.: Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf. Sci. 275, 314\u2013347 (2014)","journal-title":"Inf. Sci."},{"issue":"12","key":"49_CR3","doi-asserted-by":"publisher","first-page":"2032","DOI":"10.14778\/2367502.2367572","volume":"5","author":"A Labrinidis","year":"2012","unstructured":"Labrinidis, A., Jagadish, H.V.: Challenges and opportunities with big data. Proc. VLDB Endow. 5(12), 2032\u20132033 (2012)","journal-title":"Proc. VLDB Endow."},{"issue":"7","key":"49_CR4","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.1016\/j.jpdc.2014.01.003","volume":"74","author":"K Kambatla","year":"2014","unstructured":"Kambatla, K., Kollias, G., Kumar, V., Grama, A.: Trends in big data analytics. J. Parallel Distrib. Comput. 74(7), 2561\u20132573 (2014)","journal-title":"J. Parallel Distrib. Comput."},{"key":"49_CR5","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.2307\/41703503","volume":"36","author":"H Chen","year":"2012","unstructured":"Chen, H., Chiang, R.H., Storey, V.C.: Business intelligence and analytics: from big data to big impact. MIS Q. 36, 1165\u20131188 (2012)","journal-title":"MIS Q."},{"key":"49_CR6","unstructured":"Rivinius, J.: Majority of 2013 terrorist attacks occurred in just a few countries, pp. 1\u20132. Press Release (2014)"},{"issue":"1","key":"49_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijrcm.2015010101","volume":"4","author":"KD Strang","year":"2015","unstructured":"Strang, K.D., Alamieyeseigha, S.: What and where are the risks of international terrorist attacks: a descriptive study of the evidence. Int. J. Risk Conting. Manag. (IJRCM) 4(1), 1\u201320 (2015)","journal-title":"Int. J. Risk Conting. Manag. (IJRCM)"},{"issue":"5","key":"49_CR8","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.elerap.2011.07.005","volume":"11","author":"M Jayo","year":"2012","unstructured":"Jayo, M., Diniz, E.H., Zambaldi, F., Christopoulos, T.P.: Groups of services delivered by Brazilian branchless banking and respective network integration models. Electron. Commer. Res. Appl. 11(5), 504\u2013517 (2012)","journal-title":"Electron. Commer. Res. Appl."},{"key":"49_CR9","unstructured":"Kwapien, A.: How big data helps to fight crime. https:\/\/www.datapine.com\/blog\/big-data-helps-to-fight-crime\/"},{"issue":"4","key":"49_CR10","first-page":"101","volume":"85","author":"M Herbert","year":"2005","unstructured":"Herbert, M.: Understanding terror networks. Mil. Rev. 85(4), 101 (2005)","journal-title":"Mil. Rev."},{"key":"49_CR11","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.jclepro.2015.01.005","volume":"92","author":"A Mascarenhas","year":"2015","unstructured":"Mascarenhas, A., Nunes, L.M., Ramos, T.B.: Selection of sustainability indicators for planning: combining stakeholders participation and data reduction techniques. J. Clean. Prod. 92, 295\u2013307 (2015)","journal-title":"J. Clean. Prod."},{"key":"49_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.neucom.2017.08.076","volume":"280","author":"S Ougiaroglou","year":"2017","unstructured":"Ougiaroglou, S., Diamantaras, K.I., Evangelidis, G.: Exploring the effect of data reduction on neural network and support vector machine classification. Neurocomputing 280, 101\u2013110 (2017)","journal-title":"Neurocomputing"},{"issue":"3","key":"49_CR13","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.1109\/SURV.2013.102913.00020","volume":"16","author":"E Bou-Harb","year":"2014","unstructured":"Bou-Harb, E., Debbabi, M., Assi, C.: Cyber scanning: a comprehensive survey. IEEE Commun. Surv. Tutor. 16(3), 1496\u20131519 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"49_CR14","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.eswa.2017.11.041","volume":"95","author":"V Herrera-Semenets","year":"2018","unstructured":"Herrera-Semenets, V., P\u00e9rez-Garc\u00eda, O.A., Hern\u00e1ndez-Le\u00f3n, R., van den Berg, J., Doerr, C.: A data reduction strategy and its application on scan and backscatter detection using rule-based classifiers. Expert Syst. Appl. 95, 272\u2013279 (2018)","journal-title":"Expert Syst. Appl."},{"key":"49_CR15","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.neucom.2017.01.059","volume":"238","author":"J Wang","year":"2017","unstructured":"Wang, J., Yue, S., Yu, X., Wang, Y.: An efficient data reduction method and its application to cluster analysis. Neurocomputing 238, 234\u2013244 (2017)","journal-title":"Neurocomputing"},{"key":"49_CR16","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.compind.2018.01.020","volume":"97","author":"LB Amor","year":"2018","unstructured":"Amor, L.B., Lahyani, I., Jmaiel, M.: Data accuracy aware mobile healthcare applications. Comput. Ind. 97, 54\u201366 (2018)","journal-title":"Comput. Ind."},{"key":"49_CR17","volume-title":"Hadoop in Action","author":"C Lam","year":"2010","unstructured":"Lam, C.: Hadoop in Action. Manning Publications Co., New York (2010)"},{"key":"49_CR18","doi-asserted-by":"crossref","unstructured":"Shvachko, K., Kuang, H., Radia, S., Chansler, R.: The hadoop distributed file system In: 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp. 1\u201310. IEEE (2010)","DOI":"10.1109\/MSST.2010.5496972"},{"key":"49_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-540-69389-5_38","volume-title":"Computational Science \u2013 ICCS 2008","author":"M Laclav\u00edk","year":"2008","unstructured":"Laclav\u00edk, M., \u0160eleng, M., Hluch\u00fd, L.: Towards large scale semantic annotation built on MapReduce architecture. In: Bubak, M., van Albada, G.D., Dongarra, J., Sloot, Peter M.A. (eds.) ICCS 2008. LNCS, vol. 5103, pp. 331\u2013338. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-69389-5_38"},{"key":"49_CR20","doi-asserted-by":"crossref","unstructured":"Thakur, S., Dharavath, R.: Artificial neural network based prediction of malaria abundances using big data: a knowledge capturing approach. Clin. Epidemiol. Glob. Health (2018)","DOI":"10.1016\/j.cegh.2018.03.001"},{"issue":"6","key":"49_CR21","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1016\/S0305-0548(02)00037-0","volume":"30","author":"A-S Chen","year":"2003","unstructured":"Chen, A.-S., Leung, M.T., Daouk, H.: Application of neural networks to an emerging financial market: forecasting and trading the taiwan stock index. Comput. Oper. Res. 30(6), 901\u2013923 (2003)","journal-title":"Comput. Oper. Res."},{"key":"49_CR22","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.inffus.2017.10.006","volume":"42","author":"Q Zhang","year":"2018","unstructured":"Zhang, Q., Yang, L.T., Chen, Z., Li, P.: A survey on deep learning for big data. Inf. Fusion 42, 146\u2013157 (2018)","journal-title":"Inf. Fusion"},{"key":"49_CR23","doi-asserted-by":"crossref","unstructured":"Maillo, J., Triguero, I., Herrera, F.: A MapReduce-based k-nearest neighbor approach for big data classification. In: Trustcom\/BigDataSE\/ISPA, 2015 IEEE, pp. 167\u2013172. IEEE February 2015","DOI":"10.1109\/Trustcom.2015.577"},{"issue":"10","key":"49_CR24","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1109\/TSMC.1979.4310090","volume":"9","author":"JK Dixon","year":"1979","unstructured":"Dixon, J.K.: Pattern recognition with partly missing data. IEEE Trans. Syst. Man Cybern. B Cybern. 9(10), 617\u2013621 (1979)","journal-title":"IEEE Trans. Syst. Man Cybern. B Cybern."},{"key":"49_CR25","doi-asserted-by":"crossref","unstructured":"Inyaem, U., Meesad, P., Haruechaiyasak, C.: Named-entity techniques for terrorism event extraction and classification. In: 2009 Eighth International Symposium on Natural Language Processing SNLP 2009, pp. 175\u2013179. IEEE (2009)","DOI":"10.1109\/SNLP.2009.5340924"},{"issue":"1","key":"49_CR26","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1353\/sais.2004.0020","volume":"24","author":"TM Sanderson","year":"2004","unstructured":"Sanderson, T.M.: Transnational terror and organized crime: blurring the lines. SAIS Rev. Int. Aff. 24(1), 49\u201361 (2004)","journal-title":"SAIS Rev. Int. Aff."},{"key":"49_CR27","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1111\/j.1467-8659.2008.01225.x","volume":"27","author":"X Wang","year":"2008","unstructured":"Wang, X., Miller, E., Smarick, K., Ribarsky, W., Chang, R.: Investigative visual analysis of global terrorism. Comput. Graph. Forum 27, 919\u2013926 (2008)","journal-title":"Comput. Graph. Forum"},{"key":"49_CR28","unstructured":"How to Detect Criminal Gangs Using Mobile Phone Data (2014). https:\/\/www.technologyreview.com\/s\/526471\/how-to-detect-criminal-gangs-using-mobile-phone-data\/"},{"key":"49_CR29","unstructured":"Data Protection Act (1998). https:\/\/www.huntonprivacyblog.com\/wp-content\/uploads\/sites\/28\/2016\/11\/big-data-and-data-protection.pdf"},{"issue":"4","key":"49_CR30","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s41019-016-0022-0","volume":"1","author":"MH ur Rehman","year":"2016","unstructured":"ur Rehman, M.H., Liew, C.S., Abbas, A., Jayaraman, P.P., Wah, T.Y., Khan, S.U.: Big data reduction methods: a survey. Data Science and Engineering 1(4), 265\u2013284 (2016)","journal-title":"Data Science and Engineering"},{"key":"49_CR31","unstructured":"Yalagandula, P., Nath, S., Yu, H., Gibbons, P.B., Seshan, S.: Beyond availability: towards a deeper understanding of machine failure characteristics in large distributed systems. In: WORLDS (2004)"},{"issue":"1","key":"49_CR32","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"issue":"1","key":"49_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X Wu","year":"2008","unstructured":"Wu, X., Kumar, V., Quinlan, J.R., Ghosh, J., Yang, Q., Motoda, H., et al.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1\u201337 (2008)","journal-title":"Knowl. Inf. Syst."},{"issue":"7","key":"49_CR34","doi-asserted-by":"publisher","first-page":"2038","DOI":"10.1016\/j.patcog.2006.12.019","volume":"40","author":"M-L Zhang","year":"2007","unstructured":"Zhang, M.-L., Zhou, Z.-H.: ML-KNN: A lazy learning approach to multi-label learning. Pattern Recogn. 40(7), 2038\u20132048 (2007)","journal-title":"Pattern Recogn."},{"key":"49_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-540-28647-9_60","volume-title":"Advances in Neural Networks \u2013 ISNN 2004","author":"Y Jiang","year":"2004","unstructured":"Jiang, Y., Zhou, Z.-H.: Editing Training Data for kNN Classifiers with Neural Network Ensemble. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3173, pp. 356\u2013361. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28647-9_60"},{"key":"49_CR36","doi-asserted-by":"crossref","unstructured":"Bagheri, B., Ahmadi, H., Labbafi, R.: Application of data mining and feature extraction on intelligent fault diagnosis by artificial neural network and k-nearest neighbor. In: 2010 XIX International Conference on Electrical Machines (ICEM). IEEE, pp. 1\u20137 (2010)","DOI":"10.1109\/ICELMACH.2010.5607984"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05063-4_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T18:20:10Z","timestamp":1573064410000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05063-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030050627","9783030050634"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05063-4_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2018\/authors.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"407","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"141","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"7.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}