Search Results

There are 20040 results for: content related to: Statistical Disclosure Risk: Separating Potential and Harm

  1. Surveillance using non-stealthy sensors: A new intruder model

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1900–1911, Amitabha Bagchi, Rajshekar Kalayappan and Surabhi Sankhla

    Article first published online : 28 NOV 2013, DOI: 10.1002/sec.904

  2. Synthesis of attack actions using model checking for the verification of security protocols

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 147–161, Stylianos Basagiannis, Panagiotis Katsaros and Andrew Pombortsis

    Article first published online : 12 JUN 2009, DOI: 10.1002/sec.119

  3. The effects of fly-bys on planetary systems

    Monthly Notices of the Royal Astronomical Society

    Volume 411, Issue 2, February 2011, Pages: 859–877, Daniel Malmberg, Melvyn B. Davies and Douglas C. Heggie

    Article first published online : 29 NOV 2010, DOI: 10.1111/j.1365-2966.2010.17730.x

  4. The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

    Journal of the Royal Statistical Society: Series A (Statistics in Society)

    Volume 170, Issue 1, January 2007, Pages: 195–212, C. J. Skinner

    Article first published online : 21 DEC 2006, DOI: 10.1111/j.1467-985X.2006.00457.x

  5. Towards Unrestricted Public Use Business Microdata: The Synthetic Longitudinal Business Database

    International Statistical Review

    Volume 79, Issue 3, December 2011, Pages: 362–384, Satkartar K. Kinney, Jerome P. Reiter, Arnold P. Reznek, Javier Miranda, Ron S. Jarmin and John M. Abowd

    Article first published online : 21 NOV 2011, DOI: 10.1111/j.1751-5823.2011.00153.x

  6. On the optimal detection of an underwater intruder in a channel using unmanned underwater vehicles

    Naval Research Logistics (NRL)

    Volume 58, Issue 8, December 2011, Pages: 804–820, Hoam Chung, Elijah Polak, Johannes O. Royset and Shankar Sastry

    Article first published online : 24 OCT 2011, DOI: 10.1002/nav.20487

  7. Disclosure Control of Business Microdata: A Density-Based Approach

    International Statistical Review

    Volume 77, Issue 2, August 2009, Pages: 196–211, Daniela Ichim

    Article first published online : 22 JUN 2009, DOI: 10.1111/j.1751-5823.2009.00079.x

  8. Discussion

    International Statistical Review

    Volume 80, Issue 3, December 2012, Pages: 373–375, Jerome P. Reiter

    Article first published online : 21 NOV 2012, DOI: 10.1111/j.1751-5823.2012.00191.x

  9. Fine Individual Specialization and Elitism among Workers of the Ant Ectatomma tuberculatum for a Highly Specific Task: Intruder Removal


    Volume 120, Issue 12, December 2014, Pages: 1185–1198, Franklin H. Rocha, Jean-Paul Lachaud, Javier Valle-Mora and Gabriela Pérez-Lachaud

    Article first published online : 11 AUG 2014, DOI: 10.1111/eth.12291

  10. A novel sine-curve mobility model for intrusion detection in wireless sensor networks

    Wireless Communications and Mobile Computing

    Volume 13, Issue 17, 10 December 2013, Pages: 1555–1570, Yun Wang, Yoon Kah Leow and Jun Yin

    Article first published online : 10 NOV 2011, DOI: 10.1002/wcm.1202

  11. Disclosure control using partially synthetic data for large-scale health surveys, with applications to CanCORS

    Statistics in Medicine

    Volume 32, Issue 24, 30 October 2013, Pages: 4139–4161, Bronwyn Loong, Alan M. Zaslavsky, Yulei He and David P. Harrington

    Article first published online : 13 MAY 2013, DOI: 10.1002/sim.5841

  12. Imputation of confidential data sets with spatial locations using disease mapping models

    Statistics in Medicine

    Volume 33, Issue 11, 20 May 2014, Pages: 1928–1945, Thais Paiva, Avishek Chakraborty, Jerry Reiter and Alan Gelfand

    Article first published online : 7 JAN 2014, DOI: 10.1002/sim.6078

  13. Decreased aggression and increased repetitive behavior in Pten haploinsufficient mice

    Genes, Brain and Behavior

    Volume 14, Issue 2, February 2015, Pages: 145–157, A. E. Clipperton-Allen and D. T. Page

    Article first published online : 10 FEB 2015, DOI: 10.1111/gbb.12192

  14. How Similar is the Coordination of Parental Roles Among Different Pairs? An Examination of a Monogamous Fish


    Volume 108, Issue 8, August 2002, Pages: 727–738, M. Itzkowitz, N. Santangelo and M. Richter

    Article first published online : 16 SEP 2008, DOI: 10.1046/j.1439-0310.2002.00805.x

  15. Formation of Kuiper-belt binaries through multiple chaotic scattering encounters with low-mass intruders

    Monthly Notices of the Royal Astronomical Society

    Volume 360, Issue 2, June 2005, Pages: 401–415, Sergey A. Astakhov, Ernestine A. Lee and David Farrelly

    Article first published online : 16 MAY 2005, DOI: 10.1111/j.1365-2966.2005.09072.x

  16. Risk-Utility Paradigms for Statistical Disclosure Limitation: How to Think, But Not How to Act

    International Statistical Review

    Volume 79, Issue 2, August 2011, Pages: 160–183, Lawrence H. Cox, Alan F. Karr and Satkartar K. Kinney

    Article first published online : 9 JUN 2011, DOI: 10.1111/j.1751-5823.2011.00140.x

  17. Female marmosets' behavioral and hormonal responses to unfamiliar intruders

    American Journal of Primatology

    Volume 73, Issue 10, October 2011, Pages: 1072–1081, Corinna N. Ross and Jeffrey A. French

    Article first published online : 11 JUL 2011, DOI: 10.1002/ajp.20975



    Volume 61, Issue 6, June 2007, Pages: 1327–1338, K. S. Peiman and B. W. Robinson

    Article first published online : 17 MAY 2007, DOI: 10.1111/j.1558-5646.2007.00113.x

  19. Complete set of solutions of the generalized Bloch equation

    International Journal of Quantum Chemistry

    Volume 80, Issue 4-5, 2000, Pages: 757–781, K. Kowalski and P. Piecuch

    Article first published online : 20 OCT 2000, DOI: 10.1002/1097-461X(2000)80:4/5<757::AID-QUA25>3.0.CO;2-A

  20. You have free access to this content
    Creating Stories of Hope: A Narrative Approach to Illness, Death and Grief

    Australian and New Zealand Journal of Family Therapy

    Volume 35, Issue 1, March 2014, Pages: 4–19, Lorraine Hedtke

    Article first published online : 28 APR 2014, DOI: 10.1002/anzf.1040