{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:14:48Z","timestamp":1763810088465,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030314996"},{"type":"electronic","value":"9783030315009"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31500-9_3","type":"book-chapter","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T23:26:53Z","timestamp":1568935613000},"page":"39-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Data Anonymization in Data Mining via Meta-heuristic Approaches"],"prefix":"10.1007","author":[{"given":"Fatemeh","family":"Amiri","sequence":"first","affiliation":[]},{"given":"Gerald","family":"Quirchmayr","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Kieseberg","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]},{"given":"Alessio","family":"Bertone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,20]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.knosys.2012.02.013","volume":"33","author":"C Kaleli","year":"2012","unstructured":"Kaleli, C., Polat, H.: Privacy-preserving SOM-based recommendations on horizontally distributed data. Knowl.-Based Syst. 33, 124\u2013135 (2012)","journal-title":"Knowl.-Based Syst."},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"Shui Yu","year":"2016","unstructured":"Yu, S.J.I.a.: Big privacy: challenges and opportunities of privacy, study in the age of big data. IEEE Access 4, 2751\u20132763 (2016)","journal-title":"IEEE Access"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1109\/ACCESS.2014.2362522","volume":"2","author":"L Xu","year":"2014","unstructured":"Xu, L., Yung, J., Ren, Y.: Information security in big data: privacy and data mining. IEEE Access 2, 1149\u20131176 (2014)","journal-title":"IEEE Access"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Amiri, F., Quirchmayr, G.: A comparative study on innovative approaches for privacy-preserving in knowledge discovery. In: ICIME. ACM (2017)","DOI":"10.1145\/3149572.3149586"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Dua, S., Du, X.: Data Mining and Machine Learning in Cybersecurity. Auerbach Publications (2016)","DOI":"10.1201\/b10867"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-540-73190-0_7","volume-title":"Introduction to Genetic Algorithms","author":"S Sivanandam","year":"2008","unstructured":"Sivanandam, S., Deepa, S.: Genetic algorithm optimization problems. In: Sivanandam, S., Deepa, S. (eds.) Introduction to Genetic Algorithms, pp. 165\u2013209. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-73190-0_7"},{"issue":"6","key":"3_CR7","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/2.294849","volume":"27","author":"M Srinivas","year":"1994","unstructured":"Srinivas, M., Patnaik, L.M.: Genetic algorithms a survey. IEEE Comput. 27(6), 17\u201326 (1994)","journal-title":"IEEE Comput."},{"key":"3_CR8","unstructured":"Amiri, F., Quirchmayr, G.: Sensitive data anonymization using genetic algorithms for SOM-based clustering. In: Secureware (2018)"},{"key":"3_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-56927-2","volume-title":"Self-Organizing Maps","author":"T Kohonen","year":"2001","unstructured":"Kohonen, T.: Self-Organizing Maps. Springer, Berlin (2001). https:\/\/doi.org\/10.1007\/978-3-642-56927-2"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Kiviluoto, K.: Topology preservation in self-organizing maps. In: International Conference on Neural Networks, pp. 294\u2013299 (1996)","DOI":"10.1109\/ICNN.1996.548907"},{"key":"3_CR11","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1090.001.0001","volume-title":"Adaptation in Artificial and Natural Systems","author":"J Holland","year":"1992","unstructured":"Holland, J.: Adaptation in Artificial and Natural Systems. MIT Press Cambridge, Cambridge (1992)"},{"key":"3_CR12","unstructured":"Dheeru, D.K.T.: UCI Machine Learning Repository. University of California: Irvine, School of Information and Computer Sciences (2017)"},{"key":"3_CR13","unstructured":"Moler, C.: MATLAB User\u2019s Guide. The Mathworks Inc. (1980)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31500-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:01:54Z","timestamp":1726790514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-31500-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030314996","9783030315009"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31500-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Data Privacy Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dpm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2019.uni.lu\/workshops\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}