{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:40:21Z","timestamp":1743154821775,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642280467"},{"type":"electronic","value":"9783642280474"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28047-4_5","type":"book-chapter","created":{"date-parts":[[2012,7,21]],"date-time":"2012-07-21T00:04:04Z","timestamp":1342829044000},"page":"51-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Discovering Privacy"],"prefix":"10.1007","author":[{"given":"Chris","family":"Clifton","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,2]]},"reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1023\/A:1021942526896","volume":"18","author":"C Clifton","year":"2003","unstructured":"C. Clifton, Change detection in overhead imagery using neural networks. Int. J. Appl. Intell. 18(2), 215\u2013234 (2003). http:\/\/www.kluweronline.com\/issn\/0924-669X","journal-title":"Int. J. Appl. Intell."},{"issue":"8","key":"5_CR2","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1109\/TKDE.2004.32","volume":"16","author":"C Clifton","year":"2004","unstructured":"C. Clifton, R. Cooley, J. Rennie, TopCat: data mining for topic identification in a text corpus. IEEE Trans. Knowl. Data Eng. 16(8), 949\u2013964 (2004). http:\/\/csdl.computer.org\/comp\/trans\/tk\/2004\/08\/k0949abs.htm","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"5_CR3","unstructured":"C. Clifton, D. Marks, Security and privacy implications of data mining, in Workshop on Data Mining and Knowledge Discovery (ACM SIGMOD, Montreal, Canada, Jun 1996), pp. 15\u201319, http:\/\/www.cs.purdue.edu\/homes\/clifton\/cv\/pubs\/dmkd.pdf"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"W. Jiang, C. Clifton, AC-framework for privacy-preserving collaboration, in SIAM International Conference on Data Mining, Minneapolis, MN, 26\u201328 Apr 2007, http:\/\/www.siam.org\/proceedings\/datamining\/2007\/dm07_005wjiang.pdf","DOI":"10.1137\/1.9781611972771.5"},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/S0169-023X(99)00044-0","volume":"33","author":"WS Li","year":"2000","unstructured":"W.S. Li, C. Clifton, SEMINT: a tool for identifying attribute correspondences in heterogeneous databases using neural networks. Data Knowl. Eng. 33(1), 49\u201384 (2000). http:\/\/dx.doi.org\/10.1016\/S0169-023X(99)00044-0","journal-title":"Data Knowl. Eng."},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"M. Murugesan, C. Clifton, Providing privacy through plausibly deniable search, in 2009 SIAM International Conference on Data Mining, Sparks, NV, 30 Apr\u20132 May 2009, http:\/\/www.siam.org\/proceedings\/datamining\/2009\/dm09_070_murugesanm.pdf","DOI":"10.1137\/1.9781611972795.66"},{"issue":"3","key":"5_CR7","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1016\/j.datak.2007.03.009","volume":"63","author":"ME Nergiz","year":"2007","unstructured":"M.E. Nergiz, C. Clifton, Thoughts on k-anonymization. Data Knowl. Eng. 63(3), 622\u2013645 (2007). http:\/\/dx.doi.org\/10.1016\/j.datak.2007.03.009","journal-title":"Data Knowl. Eng."},{"key":"5_CR8","unstructured":"Topic detection and tracking project TDT (25 Sep 2000), http:\/\/www.nist.gov\/speech\/tests\/tdt\/index.htm"},{"key":"5_CR9","series-title":"Advances in Information Security","volume-title":"Privacy Preserving Data Mining","author":"J Vaidya","year":"2006","unstructured":"J. Vaidya, C. Clifton, M. Zhu, Privacy Preserving Data Mining. Advances in Information Security, vol. 19 (Springer, New York, 2006). http:\/\/www.springeronline.com\/sgw\/cda\/frontpage\/0,11855,4-40356-72-52496494-0,00.html"}],"container-title":["Journeys to Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28047-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T01:52:09Z","timestamp":1674870729000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-28047-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642280467","9783642280474"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28047-4_5","relation":{},"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"2 April 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}