[{"author":[{"first_name":"Florian","full_name":"Kellner, Florian","last_name":"Kellner"},{"last_name":"Schröder","orcid":"0000-0002-7190-7510","full_name":"Schröder, Nadine","first_name":"Nadine","id":"260490","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-7190-7510/work/178616861"}],"citation":{"ieee":"F. Kellner and N. Schröder, “Data Mining mit unsicheren Daten,” <i>HMD Praxis der Wirtschaftsinformatik</i>, vol. 55, no. 3, pp. 601–613, 2018.","alphadin":"<span style=\"font-variant:small-caps;\">Kellner, Florian</span> ; <span style=\"font-variant:small-caps;\">Schröder, Nadine</span>: Data Mining mit unsicheren Daten. In: <i>HMD Praxis der Wirtschaftsinformatik</i> Bd. 55, Springer Fachmedien Wiesbaden GmbH (2018), Nr. 3, S. 601–613","bibtex":"@article{Kellner_Schröder_2018, title={Data Mining mit unsicheren Daten}, volume={55}, DOI={<a href=\"https://doi.org/10.1365/s40702-018-0419-5\">10.1365/s40702-018-0419-5</a>}, number={3}, journal={HMD Praxis der Wirtschaftsinformatik}, publisher={Springer Fachmedien Wiesbaden GmbH}, author={Kellner, Florian and Schröder, Nadine}, year={2018}, pages={601–613} }","apa":"Kellner, F., &#38; Schröder, N. (2018). Data Mining mit unsicheren Daten. <i>HMD Praxis der Wirtschaftsinformatik</i>, <i>55</i>(3), 601–613. <a href=\"https://doi.org/10.1365/s40702-018-0419-5\">https://doi.org/10.1365/s40702-018-0419-5</a>","short":"F. Kellner, N. Schröder, HMD Praxis der Wirtschaftsinformatik 55 (2018) 601–613.","chicago":"Kellner, Florian, and Nadine Schröder. “Data Mining mit unsicheren Daten.” <i>HMD Praxis der Wirtschaftsinformatik</i> 55, no. 3 (2018): 601–13. <a href=\"https://doi.org/10.1365/s40702-018-0419-5\">https://doi.org/10.1365/s40702-018-0419-5</a>.","mla":"Kellner, Florian, and Nadine Schröder. “Data Mining mit unsicheren Daten.” <i>HMD Praxis der Wirtschaftsinformatik</i>, vol. 55, no. 3, Springer Fachmedien Wiesbaden GmbH, 2018, pp. 601–13, doi:<a href=\"https://doi.org/10.1365/s40702-018-0419-5\">10.1365/s40702-018-0419-5</a>.","ama":"Kellner F, Schröder N. Data Mining mit unsicheren Daten. <i>HMD Praxis der Wirtschaftsinformatik</i>. 2018;55(3):601-613. doi:<a href=\"https://doi.org/10.1365/s40702-018-0419-5\">10.1365/s40702-018-0419-5</a>"},"status":"public","intvolume":"        55","doi":"10.1365/s40702-018-0419-5","page":"601-613","publisher":"Springer Fachmedien Wiesbaden GmbH","date_updated":"2026-03-17T15:29:20Z","year":"2018","_id":"5611","language":[{"iso":"ger"}],"alternative_title":["Fallbeispiel OpenStreetMap"],"department":[{"_id":"4b2dc5c9-bee3-11eb-b75f-ecc80f94fb21"}],"title":"Data Mining mit unsicheren Daten","date_created":"2025-02-14T20:29:41Z","volume":55,"type":"journal_article","publication_identifier":{"eissn":["2198-2775"],"issn":["1436-3011"]},"user_id":"220548","publication":"HMD Praxis der Wirtschaftsinformatik","issue":"3","publication_status":"published"}]
