Zardari, Munwar Ali; Jung, Low Tang - In: International Journal of Business Analytics (IJBAN) 3 (2016) 2, pp. 61-78
-confidential (non-sensitive/public) data using K-NN algorithm. After classification phase, the security phase (encryption phase) shall …