Cite
KD3 Scheme for Privacy Preserving Data Mining.
MLA
Mehrotra, Sharad, et al. “KD3 Scheme for Privacy Preserving Data Mining.” Intelligence & Security Informatics (9783540344780), 2006, pp. 659–61. EBSCOhost, https://doi.org/10.1007/11760146_78.
APA
Mehrotra, S., Zeng, D. D., Chen, H., Thuraisingham, B., Wang, F.-Y., Zhang, P., Tong, Y., Tang, S., & Yang, D. (2006). KD3 Scheme for Privacy Preserving Data Mining. In Intelligence & Security Informatics (9783540344780) (pp. 659–661). https://doi.org/10.1007/11760146_78
Chicago
Mehrotra, Sharad, Daniel D. Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue Wang, Peng Zhang, Yunhai Tong, Shiwei Tang, and Dongqing Yang. 2006. “KD3 Scheme for Privacy Preserving Data Mining.” In Intelligence & Security Informatics (9783540344780), 659–61. doi:10.1007/11760146_78.