A data mining technique in which an attacker infers data from related known data without actually accessing a database containing the inferred data.
A data mining technique in which an attacker infers data from related known data without actually accessing a database containing the inferred data.