共 50 条
[22]
A Cryptographic Approach for Achieving Privacy in Data Mining
[J].
2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015),
2015,
[25]
Data Acquisition Techniques in Mobile Forensics
[J].
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018),
2018,
:280-286
[26]
Survey and Analysis of Cryptographic Techniques for Privacy Protection in Recommender Systems
[J].
CLOUD COMPUTING AND SECURITY, PT III,
2018, 11065
:691-706
[28]
Emerging Trends in Smart Home Security, Privacy, and Digital Forensics
[J].
AMCIS 2016 PROCEEDINGS,
2016,
[29]
IoT Forensics Pitfalls for Privacy and a Model for Providing Safeguards
[J].
2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019),
2019,
:172-178
[30]
Big Data Management in Digital Forensics
[J].
2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE),
2014,
:238-243