2018
DOI: 10.1007/978-3-030-05063-4_49
|View full text |Cite
|
Sign up to set email alerts
|

Sensitive Data Detection Using NN and KNN from Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…If we are able to identify criminal activities, as described in [10,11], it will help in controlling the negative impact on the economy, and in fighting terrorist activity at national and international levels. This will also restrict the establishment of relationships among terrorist groups.…”
Section: Five-node Clustermentioning
confidence: 99%
See 3 more Smart Citations
“…If we are able to identify criminal activities, as described in [10,11], it will help in controlling the negative impact on the economy, and in fighting terrorist activity at national and international levels. This will also restrict the establishment of relationships among terrorist groups.…”
Section: Five-node Clustermentioning
confidence: 99%
“…Although there are several studies [38,[40][41][42] that implemented Singular Value Decomposition to prove its importance in related fields, we executed SVD with annotation and annotators, Lemmatization, StopWord Remover, and TF-IDF to retrieve criminal information in a distributed computing environment and proved its importance. Furthermore, in [10], the researchers only considered evaluation as a performance measure, while we also considered the efficiency and accuracy of the work in demonstrating its significance.…”
Section: For K = 6 and Numterms = 5000mentioning
confidence: 99%
See 2 more Smart Citations
“…As all these computers have been connected to one another by means of the network, the distributed file system has been identified to be very complex compared to its regular system. Thus, it becomes necessary to ensure rectification of problems that are connected to the network and manage the computer within the cluster [3].…”
Section: Introductionmentioning
confidence: 99%