Related references
Note: Only part of the references are listed.Data mining for official statistics Challenges and opportunities
Bart Buelens et al.
12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2012) (2012)
Metadata for anomaly-based security protocol attack deduction
T Leckie et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2004)
Privacy-preserving data mining: Why, how, and when
J Vaidya et al.
IEEE SECURITY & PRIVACY (2004)
Data mining -: New challenges for statisticians
DJ Hand
SOCIAL SCIENCE COMPUTER REVIEW (2000)