A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Quantifying the Re-identification Risk of Event Logs for Process Mining
[chapter]
2020
Lecture Notes in Computer Science
In this paper, we show how to quantify the re-identification risk with measures for the individual uniqueness in event logs. ...
We therefore argue that, when publishing event logs, the risk of such re-identification attacks must be considered. ...
We thank Yves-Alexandre de Montjoye for providing his code to estimate data uniqueness, which we used in our evaluation. ...
doi:10.1007/978-3-030-49435-3_16
fatcat:vp5ndlwhm5c7rgxcoszdvyfdui
Proceedings of the British Thoracic Society
1993
Thorax
All of the men were followed up to the time of their departure from mine service, relapse, or 20 December 1992 by the routine mine radiological surveillance for tuberculosis and by a central tuberculosis ...
identification. ...
Sedation for fibreoptic bronchoscopy has recognised risks and the benefit of the active drug in this study may not be sufficient to justify its use. ...
doi:10.1136/thx.48.10.1052
fatcat:72y2odlae5gwzly5hpvmisghay
Differential Privacy: An Exploration of the Privacy-Utility Landscape Differential Privacy: An Exploration of the Privacy-Utility Landscape
2013
unpublished
Facilitating use of sensitive data for research or commercial purposes, in a manner that preserves the privacy of participating entities, is an active area of study. ...
In this dissertation, I examine the often conflicting goals of privacy and utility within the framework of differential privacy. ...
by the empiricial risk of a predictor. ...
fatcat:jsupm4u2tngefaqqe7qorbpg6a
Physically informed runtime verification for cyber physical systems
[article]
2015
I evaluate the tool-set with increasingly complex real CPS applications of smart agent systems. vi ...
Cyber-physical systems (CPS) are an integration of computation with physical processes. ...
Dustminer [101] collects system logs to look for sequences of events responsible for faulty interactions among sensors. ...
doi:10.15781/t2nk5q
fatcat:jfjxim7vdndmhdfyj2jjym5rwu