{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:11Z","timestamp":1742913971272,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319086231"},{"type":"electronic","value":"9783319086248"}],"license":[{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-08624-8_4","type":"book-chapter","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T13:40:10Z","timestamp":1409751610000},"page":"87-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Microfiles as a Potential Source of Confidential Information Leakage"],"prefix":"10.1007","author":[{"given":"Oleg","family":"Chertov","sequence":"first","affiliation":[]},{"given":"Dan","family":"Tavrov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,4]]},"reference":[{"key":"4_CR1","unstructured":"Gantz, J., Reinsel, D.: Big data, bigger digital shadows, and biggest growth in the Far East. http:\/\/www.emc.com\/leadership\/digital-universe\/iview\/executive-summary-a-universe-of.htm (2012)"},{"key":"4_CR2","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, Version v0.34, http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml (2010)"},{"issue":"7","key":"4_CR3","first-page":"1","volume":"8","author":"O Chertov","year":"2010","unstructured":"Chertov, O., Tavrov, D.: Data group anonymity: general approach. Int. J. Comput. Sci. Inf. Secur. 8(7), 1\u20138 (2010)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"volume-title":"Group Methods of Data Processing","year":"2010","key":"4_CR4","unstructured":"Chertov, O. (ed.): Group Methods of Data Processing. Lulu.com, Raleigh (2010)"},{"key":"4_CR5","unstructured":"Sweeney, L.: Computational Disclosure Control: A Primer on Data Privacy. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge (2001)"},{"issue":"2","key":"4_CR6","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/772862.772869","volume":"4","author":"A Evfimievski","year":"2002","unstructured":"Evfimievski, A.: Randomization in privacy preserving data mining. ACM SIGKDD Explor. Newslett. 4(2), 43\u201348 (2002)","journal-title":"ACM SIGKDD Explor. Newslett."},{"issue":"1","key":"4_CR7","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng. 14(1), 189\u2013201 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"4_CR8","series-title":"LNCS","first-page":"14","volume-title":"Privacy in Statistical Databases, PSD 2004","author":"SE Fienberg","year":"2004","unstructured":"Fienberg, S.E., McIntyre, J.: Data swapping: variations on a theme by Dalenius and Reiss. In: Domingo-Ferrer, J., Torra, V. (eds.) Privacy in Statistical Databases, PSD 2004. LNCS, vol. 3050, pp. 14\u201329. Springer, Berlin (2004)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhong, W., Zhang, J.: NNMF-based factorization techniques for high-accuracy privacy protection on non-negative-valued datasets. The 6th IEEE International Conference on Data Mining Workshops. ICDM Workshops 2006, Hong Kong, December 2006, pp. 513\u2013517. IEEE Computer Society Press, Washington (2006)","DOI":"10.1109\/ICDMW.2006.123"},{"issue":"3","key":"4_CR10","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s10115-006-0001-2","volume":"10","author":"S Xu","year":"2006","unstructured":"Xu, S., Zhang, J., Han, D., Wang, J.: Singular value decomposition based data distortion strategy for privacy protection. Knowl. Inf. Syst. 10(3), 383\u2013397 (2006)","journal-title":"Knowl. Inf. Syst."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Liu, L., Wang, J., Zhang, J.: Wavelet-based data perturbation for simultaneous privacy-preserving and statistics-preserving. In: 2008 IEEE International Conference on Data Mining Workshops, Pisa, December 2008, pp. 27\u201335. IEEE Computer Society Press (2008)","DOI":"10.1109\/ICDMW.2008.77"},{"key":"4_CR12","unstructured":"National Institute of Statistics and Economic Studies. Minnesota Population Center. Integrated Public Use Microdata Series, International: Version 6.2 [Machine-readable database]. University of Minnesota, Minneapolis, https:\/\/international.ipums.org\/international\/ (2013)"},{"key":"4_CR13","unstructured":"Nuclear Power in France, World Nuclear Association, http:\/\/www.world-nuclear.org\/info\/inf40.html"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Chertov, O., Tavrov, D.: Group anonymity. In: Hllermeier, E., Kruse, R., Hoffmann, F. (eds.) Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications. CCIS, vol. 81, pp. 592\u2013601. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-14058-7_61"},{"key":"4_CR15","unstructured":"Chertov, O., Tavrov, D.: Group anonymity: problems and solutions. Lviv Polytechnic Natl. Univ. J. Info. Syst. Netw. 673, 3\u201315 (2010)"},{"key":"4_CR16","first-page":"34","volume":"3","author":"O Chertov","year":"2010","unstructured":"Chertov, O., Tavrov, D.: Providing data group anonymity using concentration differences. Mathe. Mach. Syst. 3, 34\u201344 (2010)","journal-title":"Mathe. Mach. Syst."},{"key":"4_CR17","unstructured":"Tishchenko, V., Mladientsev, M.: Dmitrii Ivanovich Miendielieiev, yego zhizn i dieiatielnost. Univiersitietskii pieriod 1861\u20131890 gg. Nauka, Moskva (1993) (In Russian)"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/0020-0255(75)90036-5","volume":"8","author":"LA Zadeh","year":"1975","unstructured":"Zadeh, L.A.: The concept of a linguistic variable and its application to approximate reasoning. Inf. Sci. 8, 199\u2013249 (1975)","journal-title":"Inf. Sci."},{"key":"4_CR19","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-25704-9_5","volume-title":"Data Security and Security Data","author":"O Chertov","year":"2012","unstructured":"Chertov, O., Tavrov, D.: Providing Group Anonymity Using Wavelet Transform. In: MacKinnon, L.M. (ed.) Data Security and Security Data. LNCS, vol. 6121, pp. 25\u201336. Springer, Berlin (2012)"},{"issue":"1","key":"4_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","volume":"7","author":"EH Mamdani","year":"1975","unstructured":"Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man-Mach. Stud. 7(1), 1\u201313 (1975)","journal-title":"Int. J. Man-Mach. Stud."},{"key":"4_CR21","unstructured":"Klir, G.J., Yuan, B.: Fuzzy Sets and Fuzzy Logic: Theory and Applications. Prentice Hall, Upper Saddle River (1995)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Zadeh, L.A.: Outline of a new approach to the analysis of complex systems and decision processes. IEEE Trans. Syst. Man Cybern. SMC-3(1), 28\u201344 (1973)","DOI":"10.1109\/TSMC.1973.5408575"},{"key":"4_CR23","unstructured":"U. S. Census 2000. 5-Percent Public Use Microdata Sample Files, http:\/\/www.census.gov\/main\/www\/cen2000.html"},{"key":"4_CR24","unstructured":"Demographics. Profile of the Military Community. Office of the Deputy under Secretary of Defense (Military Community and Family Policy), http:\/\/www.militaryonesource.mil\/12038\/MOS\/Reports\/2011_Demographics_Report.pdf (2012)"},{"key":"4_CR25","volume-title":"A Wavelet Tour of Signal Processing","author":"S Mallat","year":"1999","unstructured":"Mallat, S.: A Wavelet Tour of Signal Processing. Academic Press, New York (1999)"},{"key":"4_CR26","unstructured":"Chertov, O.R.: Minimizatsiia spotvoren pry formuvanni mikrofailu z zamaskovanymy danymy. Visnyk Skhid-noukrainskoho Natsionalnoho Universytetu imeni Volodymyra Dalia, 8(179), 256\u2013262 (2012) (In Ukrainian)"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Daubechies, I.: Ten lectures on wavelets. Soc. Ind. Appl. Math. (1992)","DOI":"10.1137\/1.9781611970104"}],"container-title":["Studies in Computational Intelligence","Intelligent Methods for Cyber Warfare"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08624-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T10:12:30Z","timestamp":1676887950000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08624-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,4]]},"ISBN":["9783319086231","9783319086248"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08624-8_4","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014,9,4]]},"assertion":[{"value":"4 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}