{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:52:59Z","timestamp":1725511979798},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540717027"},{"type":"electronic","value":"9783540717034"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71703-4_19","type":"book-chapter","created":{"date-parts":[[2007,8,2]],"date-time":"2007-08-02T00:31:22Z","timestamp":1186014682000},"page":"201-212","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Preserving Data Mining of Sequential Patterns for Network Traffic Data"],"prefix":"10.1007","author":[{"given":"Seung-Woo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Sanghyun","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jung-Im","family":"Won","sequence":"additional","affiliation":[]},{"given":"Sang-Wook","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Mining Sequential Patterns. In: Proceedings of the 11th IEEE International Conference on Data Engineering, pp. 3\u201314 (1995)","DOI":"10.1109\/ICDE.1995.380415"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R., Thomas, D.: Privacy Preserving OLAP. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 251\u2013262 (2005)","DOI":"10.1145\/1066157.1066187"},{"key":"19_CR4","unstructured":"Clifton, C., Marks, D.: Security and Privacy Implication of Data Mining. In: Proceedings of the 1996 ACM Workshop on Data Mining and Knowledge Discovery, pp. 15\u201319 (1996)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy Preserving Mining of Association Rules. In: Proceedings of the 2002 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 217\u2013228 (2002)","DOI":"10.1145\/775047.775080"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1007\/978-3-540-28651-6_47","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2004","author":"T. Fukasawa","year":"2004","unstructured":"Fukasawa, T., Wang, J., Takata, T., Miyazaki, M.: An Effective Distributed Privacy-Preserving Data Mining Algorithm. In: Yang, Z.R., Yin, H., Everson, R.M. (eds.) IDEAL 2004. LNCS, vol.\u00a03177, pp. 320\u2013325. Springer, Heidelberg (2004)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Hu, Y., Panda, B.: A Data Mining Approach for Database Intrusion Detection. In: Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 711\u2013716 (2004)","DOI":"10.1145\/967900.968048"},{"key":"19_CR8","unstructured":"Kantarcioglu, M., Clifton, C.: Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data. In: Proceedings of the 2002 ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, pp. 24\u201331 (2002)"},{"key":"19_CR9","unstructured":"Lee, W., Stolfo, S., Mok, K.: A Data Mining Framework for Building Intrusion Detection Models. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 120\u2013132 (1999)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"Y. Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 36\u201354. Springer, Heidelberg (2000)"},{"issue":"8","key":"19_CR11","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1002\/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X","volume":"15","author":"J. Luo","year":"2000","unstructured":"Luo, J., Bridges, S.: Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection. International Journal of Intelligent Systems\u00a015(8), 687\u2013704 (2000)","journal-title":"International Journal of Intelligent Systems"},{"issue":"2","key":"19_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/772862.772865","volume":"4","author":"B. Pinkas","year":"2002","unstructured":"Pinkas, B.: Cryptographic techniques for privacy-preserving data mining. ACM SIGKDD Explorations Newsletter\u00a04(2), 12\u201315 (2002)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Haritsa, J.: Maintaining Data Privacy in Association Rule Mining. In: Proceedings of the 28th International Conference on Very Large Data Bases, pp. 682\u2013693 (2002)","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Zhan, J., Chang, L., Matwin, S.: Privacy-Preserving Collaborative Sequential Pattern Mining. In: Proceedings of SIAM International Workshop on Link Analysis, Counter-terrorism, and Privacy, pp. 61\u201372 (2004)","DOI":"10.21236\/ADA464602"}],"container-title":["Lecture Notes in Computer Science","Advances in Databases: Concepts, Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71703-4_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:54:31Z","timestamp":1619517271000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71703-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540717027","9783540717034"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71703-4_19","relation":{},"subject":[]}}