Skip to search formSkip to main contentSkip to account menu

Data dredging

Known as: Data dredge, Data snooping, P-hacking 
Data dredging (also data fishing, data snooping, and p-hacking) is the use of data mining to uncover patterns in data that can be presented as… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Now-a-days, hackers are using many techniques to steal passwords such as shoulder surfing, guessing, snooping, sniffing, etc… 
2016
2016
Tor is a widely used anonymity network that protects users’ privacy and identity from corporations, agencies and governments… 
2015
2015
This research was funded by the Illinois Sustainable Technology Center (ISTC), a division of the Prairie Research Institute at… 
2004
2004
ZusammenfassungEinführungDer Zusammenhang zwischen Arbeitslosigkeit und riskantem Alkoholkonsum ist eine häufig untersuchte… 
2004
2004
Internet applications such as the HTTP-Web, audio-video streaming and file sharing depend on wide-area data dissemination… 
2002
2002
K ey-logging—a technique that lets users spy on other people by recording their keystrokes —is an old technology getting a lot of… 
2002
2002
Gao and Sarkar have proposed Location Consistency (LC), the weakest memory model described in the literature to date for shared… 
2001
2001
The story of Pandora's voyage and the ensuing archaeological investigation has been told by Peter Gesner in his report on the… 
1996
1996
A read-out controller (ROCK) has been developed for the Data Acquisition System of the KLOE High Energy Physics experiment, based…