Add icons to this collection by clicking the heart icon.
Data Mining icon - also known as computer, security, protection, secure, attack, illegal, cyber security, data mining, cyber, and inference. Created in a clean basic outline style, perfect for web, apps, and UI projects. Available in SVG and PNG, with multiple style variants.
<svg
xmlns="http://www.w3.org/2000/svg"
width="512"
height="512"
viewBox="0 0 32 32"
>
<path
d="m29.707 9.293-2-2A.996.996 0 0 0 27 7h-2a1 1 0 0 0-1 1v2.586l-8.542 8.542a.987.987 0 0 0-1.165.165l-1 1c-.039.039-.057.09-.089.134-1.068-.633-2.534-.507-3.433.392l-1.733 1.733A3.518 3.518 0 0 0 7 25.059V29a1 1 0 0 0 1 1h3.941a3.52 3.52 0 0 0 2.507-1.038l1.733-1.733a2.794 2.794 0 0 0 .398-3.437c.042-.03.09-.047.128-.085l1-1a.987.987 0 0 0 .165-1.165L26.414 13H29a1 1 0 0 0 1-1v-2a.996.996 0 0 0-.293-.707zM15 21.414l.586.586-.293.293c-.017.017-.023.04-.038.057l-.605-.605c.018-.016.041-.021.057-.038zm-.232 4.4-1.733 1.733a1.556 1.556 0 0 1-1.094.453h-1.527l1.293-1.293a.999.999 0 1 0-1.414-1.414L9 26.586v-1.527c0-.407.165-.806.452-1.093l1.733-1.733a.815.815 0 0 1 1.123 0l2.459 2.459c.31.309.31.813.001 1.122zM28 11h-1.586L26 10.586V9h.586L28 10.414z"
/>
<path
d="M5 28H4V4h11.586L20 8.414V11a1 1 0 1 0 2 0V8a.996.996 0 0 0-.293-.707l-5-5A.996.996 0 0 0 16 2H3a1 1 0 0 0-1 1v26a1 1 0 0 0 1 1h2a1 1 0 1 0 0-2zM21 20a1 1 0 0 0-1 1v7h-3a1 1 0 1 0 0 2h4a1 1 0 0 0 1-1v-8a1 1 0 0 0-1-1z"
/>
<path
d="M13.756 6.345A1.003 1.003 0 0 0 13 6h-2a1.003 1.003 0 0 0-.99 1.142l1 7a1 1 0 0 0 1.98 0l1-7a1.002 1.002 0 0 0-.234-.797zM12.03 16h-.01c-.552 0-.994.447-.994 1s.452 1 1.005 1a1 1 0 1 0-.001-2z"
/>
</svg>
More icons in the same style and category