Citisafe: Adaptive spatial pattern knowledge using fp-growth algorithm for crime situation recognition, IEEE 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pp.551-556, 2013. ,
Protecting business intelligence and customer privacy while outsourcing data mining tasks, Knowledge and Information Systems, vol.17, issue.1, p.99120, 2008. ,
Delay-sensitive approaches for anonymizing numerical streaming data, International Journal of Information Security, pp.1-15, 2013. ,
Fast clustering-based anonymization approaches with time constraints for data streams, 2013. ,
A Usable and Secure Crime Reporting System for Technology Resource Constrained Contexts, Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015. ,
Poisson process with fuzzy rates, Fuzzy Optimization and Decision Making, vol.9, pp.289-305, 2006. ,
A state of the art review of data stream anonymisation schemes, IGI Global, 2014. ,
Adaptive buffer resizing for efficient anonymization of streaming data with minimal information loss, Proceedings of 1st International Conference on Information Systems Security and Privacy (ICISSP), pp.191-201, 2015. ,
User-Defined Privacy Preferences for k-Anonymization in Electronic Crime Reporting Systems for Developing Nations, proceedings of the 1st International Doctoral Symposium on Security and Privacy, 2015. ,
FAST: Fast Anonymization of Big Data Streams, Proceedings of the 2014 International Conference on Big Data Science and Computing, p.23, 2014. ,
When crime reporting goes high-tech: An experimental test of computerized citizen response to crime, Journal of Criminal Justice, vol.23, issue.6, pp.519-529, 1995. ,
Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss, Proceedings of the 1st International Conference on Information Systems Security and Privacy, pp.191-201, 2015. ,
Differential privacy, Automata, languages and programming, pp.1-12, 2006. ,
A state of the art review of data stream anonymisation schemes, 2014. ,
Toward an mPolicing solution for Namibia: leveraging emerging mobile platforms and crime mapping, Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference, pp.196-205, 2012. ,
From t-closeness to differential privacy and vice versa in data anonymization, vol.74, p.151158, 2015. ,
Differential privacy via t-closeness in data publishing, Proceedings of the 11th Annual Conference on Privacy, Security and Trust (PST), p.2735, 2013. ,
k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
Achieving k-anonymity privacy protection using generalization and suppression, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.571-588, 2002. ,
Computational Disclosure Control: A Primer on Data Privacy Protection, 2001. ,
Transforming data to satisfy privacy constraints, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp.279-288, 2002. ,
Castle: Continuously anonymizing data streams, IEEE Transactions on, vol.8, issue.3, pp.337-352, 2011. ,
Fast: fast anonymization of big data streams, Proceedings of the 2014 International Conference on Big Data Science and Computing, p.23, 2014. ,
IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use, International Journal of Human-Computer Interaction, vol.7, issue.1, pp.57-78, 1995. ,
Enabling anonymous crime reporting on mobile phones in the developing world, 2013. ,
Privacy protection on sliding window of data streams, Collaborative Computing: Networking, Applications and Worksharing, 2007. ,
Anonymizing streaming data for privacy protection, IEEE 24th International Conference on, pp.1367-1369, 2008. ,
KIDS: K-anonymization data stream base on sliding window, Future Computer and Communication (ICFCC), 2010 2nd International Conference on, vol.2, pp.2-311, 2010. ,
On the tradeoff between privacy and utility in data publishing, Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.517-526, 2009. ,
l-diversity: Privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data (TKDD), vol.1, issue.1, 2007. ,
t-closeness: Privacy beyond kanonymity and l-diversity, International Conference on Data Engineering (ICDE), p.106115, 2007. ,
Differential privacy via t-closeness in data publishing, Proceedings of the 11th Annual Conference on Privacy, Security and Trust (PST), 2013. ,
Differential privacy via t-closeness in data publishing, 2015. ,