-
1
-
-
80053554516
-
CDC Early Aberration Reporting System (EARS)
-
Center for Disease Control and Prevention, Available at, Accessed August 15
-
Center for Disease Control and Prevention. CDC Early Aberration Reporting System (EARS). Available at http://www.bt, cdc.gov/surveillance/ears/. Accessed August 15, 2006.
-
(2006)
-
-
-
2
-
-
84889311612
-
-
World Wide Web Consortium, Available at, Accessed August 15
-
World Wide Web Consortium. Available at http://www.w3.org/. Accessed August 15, 2006.
-
(2006)
-
-
-
3
-
-
84889279485
-
-
Sun Developer Network, AJAX Developer Resource Center, Available at, Accessed August 15
-
Sun Developer Network, AJAX Developer Resource Center. Available at http://developers. sun.com/ajax/index. j sp?cid=216424. Accessed August 15, 2006.
-
(2006)
-
-
-
4
-
-
84889448942
-
Adaptive Path. Ajax: a new approach to web applications
-
Available at, Accessed August 15
-
Adaptive Path. Ajax: a new approach to web applications. Available at http://adaptivepath.com/publications/essays/archives/OOO385.php. Accessed August 15, 2006.
-
(2006)
-
-
-
5
-
-
84889434803
-
Three-tier (computing)
-
Wikipedia, Available at, Accessed August 16
-
Wikipedia. Three-tier (computing). Available at http://en. wikipedia.org/wiki/Three-t ier-%28computing%29. Accessed August 16, 2006.
-
(2006)
-
-
-
6
-
-
84889422383
-
-
Microsoft Corporation, Available at, Accessed July 31
-
Microsoft Corporation. Available at http://www.microsoft.com/. Accessed July 31, 2006.
-
(2006)
-
-
-
7
-
-
84889361322
-
-
Corel, Available at, Accessed July 31
-
Corel. Available at http://www.corel.com/. Accessed July 31, 2006.
-
(2006)
-
-
-
8
-
-
84889367497
-
-
dBASE. Welcome to dBASE, Available at, Accessed July 3 1
-
dBASE. Welcome to dBASE. Available at http://www.dbase.com/. Accessed July 3 1, 2006.
-
(2006)
-
-
-
9
-
-
84889340182
-
-
Oracle. Database log, Available at, Accessed July 31
-
Oracle. Database log. Available at http://www.oracle.com/database/. Accessed July 31, 2006.
-
(2006)
-
-
-
10
-
-
84889428700
-
-
IBM. IBM software: DB2 product family, Available at, Accessed July 3 1
-
IBM. IBM software: DB2 product family. Available at http://www.ibm.com/db2. Accessed July 3 1, 2006.
-
(2006)
-
-
-
11
-
-
84889352292
-
-
MySQL. MySQL AB, Available at, Accessed July 31
-
MySQL. MySQL AB. Available at http://www.mysql.com/. Accessed July 31, 2006.
-
(2006)
-
-
-
12
-
-
84889287470
-
-
PostgreSQL, Available at, Accessed July 3 1
-
PostgreSQL. Available at http://www.postgresql.org/. Accessed July 3 1, 2006.
-
(2006)
-
-
-
13
-
-
84889296626
-
Advanced Micro Devices
-
Available at, Accessed July 3 1
-
Advanced Micro Devices. Available at http://www.amd.com/us-en/. Accessed July 3 1, 2006.
-
(2006)
-
-
-
14
-
-
84889453344
-
-
Intel, Available at, Accessed July 31
-
Intel. Available at http://www.intel.com/. Accessed July 31, 2006.
-
(2006)
-
-
-
15
-
-
84889472169
-
-
Wikipedia. RAID, Available at, Accessed July 31
-
Wikipedia. RAID. Available at http://en. wikipedia.org/wiki/RAID. Accessed July 31, 2006.
-
(2006)
-
-
-
16
-
-
84889394196
-
-
GNU Project. Free Software Foundation, GNU general public license, Available at, Accessed September 5
-
GNU Project. Free Software Foundation, GNU general public license. Available at http://www.gnu.org/copyleft/gpl.html. Accessed September 5, 2006.
-
(2006)
-
-
-
17
-
-
84865410052
-
Open Source Initiative. The BSD license
-
Available at, Accessed September 5
-
Open Source Initiative. The BSD license. Available at http://www.opensource.org/licenses/bsd-license.php. Accessed September 5, 2006.
-
(2006)
-
-
-
18
-
-
5444269374
-
The Apache HTTP server project
-
Apache, Available at, Accessed July 31
-
Apache. The Apache HTTP server project. Available at http://httpd. apache.org/. Accessed July 31, 2006.
-
(2006)
-
-
-
19
-
-
84889350622
-
-
Open Geospatial Consortium, Inc, Available at, Accessed July 31
-
Open Geospatial Consortium, Inc. Available at http://www.opengeospatial.org/. Accessed July 31, 2006.
-
(2006)
-
-
-
20
-
-
84889350795
-
-
Environmental Systems Research Institute, Available at, Accessed July 3 1
-
Environmental Systems Research Institute. Available at http://www.esri.com/. Accessed July 3 1, 2006.
-
(2006)
-
-
-
21
-
-
84889361433
-
-
GRASS GIs, Available at, Accessed July 31
-
GRASS GIs. Available at http://grass. itc. it/. Accessed July 31, 2006.
-
(2006)
-
-
-
22
-
-
84889475383
-
Business intelligence and analytics software
-
SAS, Available at, Accessed September 8
-
SAS. Business intelligence and analytics software. Available at http://www.sas.com/. Accessed September 8, 2006.
-
(2006)
-
-
-
23
-
-
84889354741
-
-
MapInfo Corporation, September 8, Available at, Accessed
-
MapInfo Corporation. September 8, 2006. Available at http://www.mapinfo.com/. Accessed
-
(2006)
-
-
-
24
-
-
84889357994
-
PHIN: BioSense
-
Centers for Disease Control and Prevention, Available at, Accessed August 15
-
Centers for Disease Control and Prevention. PHIN: BioSense. Available at http://www.cdc.gov/phin/component-initiatives/biosense/index.html. Accessed August 15, 2006.
-
(2006)
-
-
-
25
-
-
84889305864
-
The ESSENCE I1 Disease Surveillance Test Bed for the National Capital Area
-
Available at, Accessed September 8
-
The ESSENCE I1 Disease Surveillance Test Bed for the National Capital Area. Available at http://www.j huapl.edu/techdigest/td2404/Lombardo.pdf. Accessed September 8, 2006.
-
(2006)
-
-
-
26
-
-
84889391828
-
Realtime outbreak and disease surveillance
-
RODS Laboratory, Available at, Accessed September 8
-
RODS Laboratory. Realtime outbreak and disease surveillance. Available at http://rods.health.pitt.edu/. Accessed September 8, 2006.
-
(2006)
-
-
-
27
-
-
84889316177
-
-
New York City Syndromic Surveillance Systems, Available at, Accessed September 8
-
New York City Syndromic Surveillance Systems. Available at http://www.syndromic.org/syndromicconference/2003/mmwr/mm53suOI-027-to-029.pdf. Accessed September 8, 2006.
-
(2006)
-
-
-
28
-
-
38349164272
-
Syndrome definitions for diseases associated with critical bioterrorism-associated agents
-
Version of October 23, Available at
-
Syndrome definitions for diseases associated with critical bioterrorism-associated agents. Version of October 23, 2003. Available at http://www.bt.cdc.gov/surveillance/syndromedef/index.asp.
-
(2003)
-
-
-
29
-
-
84889473985
-
Annotated bibliography for syndromic surveillance: data sources and case definitions
-
Available at
-
Annotated bibliography for syndromic surveillance: data sources and case definitions. Available at http://www.cdc.gov/epo/dphsi/syndromic/analytic.htm.
-
-
-
-
30
-
-
0004255908
-
Machine learning
-
Boston, MA: The McGraw-Hill Companies
-
Mitchell TM. Machine learning. Boston, MA: The McGraw-Hill Companies; 1997.
-
(1997)
-
-
Mitchell, T.M.1
-
31
-
-
27144441097
-
An evaluation of statistical approaches to text categorization
-
Yang YM. An evaluation of statistical approaches to text categorization. J Inf Retriev. 1999; 1: 67-88.
-
(1999)
J Inf Retriev
, vol.1
, pp. 67-88
-
-
Yang, Y.M.1
-
32
-
-
85024373635
-
A re-examination of text categorization methods
-
Yang YM, Liu X. A re-examination of text categorization methods. Proc ACM SIGIR. 1999: 42-49.
-
(1999)
Proc ACM SIGIR.
, pp. 42-49
-
-
Yang, Y.M.1
Liu, X.2
-
33
-
-
0041569151
-
Bayesian classification of triage diagnoses for the early detection of epidemics
-
In: Recent Advances in Artificial Intelligence: Proceedings of the 16th International FLAIRS Conference, 2003. Menlo Park, CA: AAAI Press
-
Olszewski RT. Bayesian classification of triage diagnoses for the early detection of epidemics. In: Recent Advances in Artificial Intelligence: Proceedings of the 16th International FLAIRS Conference, 2003. Menlo Park, CA: AAAI Press. 2003: 412-416.
-
(2003)
, pp. 412-416
-
-
Olszewski, R.T.1
-
34
-
-
0028955263
-
Unlocking clinical data from narrative reports: a study of natural language processing
-
Hripsak G, Friedman C, Alderson PO, DuMouchel W, Johnson SB, Clayton PD. Unlocking clinical data from narrative reports: a study of natural language processing. Ann Intern Med. 1995; 122: 681-688.
-
(1995)
Ann Intern Med
, vol.122
, pp. 681-688
-
-
Hripsak, G.1
Friedman, C.2
Alderson, P.O.3
DuMouchel, W.4
Johnson, S.B.5
Clayton, P.D.6
-
35
-
-
0347840292
-
A natural language parsing system for encoding admitting diagnoses
-
In: Proceedings of the AMIA Annual Fall Symposium
-
Haug PJ, Christensen L, Gundersen M, Clemons B, Koehler S, Bauer K. A natural language parsing system for encoding admitting diagnoses. In: Proceedings of the AMIA Annual Fall Symposium 1997; 814-818.
-
(1997)
, pp. 814-818
-
-
Haug, P.J.1
Christensen, L.2
Gundersen, M.3
Clemons, B.4
Koehler, S.5
Bauer, K.6
-
36
-
-
11144321495
-
Classifying free-text triage chief complaints into syndromic categories with natural language processing
-
Chapman WW, Christensen LM, Wagner MM, Haug PJ, Ivanov O, Dowling JN, Olszewski RT. Classifying free-text triage chief complaints into syndromic categories with natural language processing. Artif Intel1 Med. 2005; 33: 1-10.
-
(2005)
Artif Intel1 Med
, vol.33
, pp. 1-10
-
-
Chapman, W.W.1
Christensen, L.M.2
Wagner, M.M.3
Haug, P.J.4
Ivanov, O.5
Dowling, J.N.6
Olszewski, R.T.7
-
37
-
-
2142818048
-
Syndromic surveillance in public health practice
-
New York City. Emerg Infect Dis [serial on the Internet]. May, Available at
-
Heffernan R, Mostashari F, Das D, Karpati A, Kulldorff M, Weiss D. Syndromic surveillance in public health practice, New York City. Emerg Infect Dis [serial on the Internet]. May 2004. Available at http://www.cdc.gov/ncidod/EID/vo110no5/03--0646.htm.
-
(2004)
-
-
Heffernan, R.1
Mostashari, F.2
Das, D.3
Karpati, A.4
Kulldorff, M.5
Weiss, D.6
-
38
-
-
8344230747
-
Automated syndromic classification of chief complaint records
-
Sniegoski CA. Automated syndromic classification of chief complaint records. Johns Hopkins APL Tech Dig. 2004; 25(1).
-
(2004)
Johns Hopkins APL Tech Dig.
, vol.25
, Issue.1
-
-
Sniegoski, C.A.1
-
39
-
-
13844297004
-
Taming variability in free text: application to health surveillance
-
In: Syndromic Surveillance: Reports from a National Conference, MMWR, Available at
-
Shapiro AR. Taming variability in free text: application to health surveillance. In: Syndromic Surveillance: Reports from a National Conference 2003. MMWR. 2004; 53(suppl): 95-100. Available at http://www.cdc.gov/mmwr/PDF/wk/mm53SUOI.pdf.
-
(2003)
, vol.53
, Issue.SUPPL.
, pp. 95-100
-
-
Shapiro, A.R.1
-
40
-
-
0035741485
-
A simple algorithm for identifying negated findings and diseases in discharge summaries
-
doi: 10.1006/jbin.2001.1029
-
Chapman WW, Bridewell W, Hanbury P, Cooper GF, Buchanan BG. A simple algorithm for identifying negated findings and diseases in discharge summaries. J Bio Inf. 2001; 34: 301-310. doi: 10.1006/jbin.2001.1029.
-
(2001)
J Bio Inf.
, vol.34
, pp. 301-310
-
-
Chapman, W.W.1
Bridewell, W.2
Hanbury, P.3
Cooper, G.F.4
Buchanan, B.G.5
-
41
-
-
0035180309
-
Use of general-purpose negation detection to augment concept indexing of medical documents: a quantitative study using the UMLS
-
November-December
-
Mutalik PG, Deshpande A, Nadkarni PM. Use of general-purpose negation detection to augment concept indexing of medical documents: a quantitative study using the UMLS. J Am Med Inf. November-December; 8(6): 598-609.
-
J Am Med Inf.
, vol.8
, Issue.6
, pp. 598-609
-
-
Mutalik, P.G.1
Deshpande, A.2
Nadkarni, P.M.3
-
42
-
-
0035755279
-
Evaluation of negation phrases in narrative clinical reports
-
Chapman WW, Bridewell W, Hanbury P, Cooper GF, Buchanan BG. Evaluation of negation phrases in narrative clinical reports. Proc AMIA Symp. 2001: 105-109.
-
(2001)
Proc AMIA Symp.
, pp. 105-109
-
-
Chapman, W.W.1
Bridewell, W.2
Hanbury, P.3
Cooper, G.F.4
Buchanan, B.G.5
-
43
-
-
84889493948
-
45 CFR Parts 160, 162, and 164 Health Insurance Reform: Security Standards; Final Rule
-
US Department of Health and Human Services, Office of the Secretary, Available at, Accessed June 22
-
US Department of Health and Human Services, Office of the Secretary. 45 CFR Parts 160, 162, and 164 Health Insurance Reform: Security Standards; Final Rule. Available at http://www.cms.hhs.gov/SecurityStandard/Downloads/securityf inalrule.pdf. Accessed June 22, 2006.
-
(2006)
-
-
-
44
-
-
84889371355
-
Data standards in public health informatics
-
In: O'Carroll PW, et al., gen. eds. Public Health Informatics and Information Systems. New York: Springer-Verlag, Chap 10
-
Jernigan DB, et al. Data standards in public health informatics. In: O'Carroll PW, et al., gen. eds. Public Health Informatics and Information Systems. New York: Springer-Verlag; 2003, Chap 10.
-
(2003)
-
-
Jernigan, D.B.1
-
45
-
-
84889497654
-
GAO report says FAA still has cyber security problems to address
-
September 26, September 28, 2005
-
Schneier B, Shpantzer G. GAO report says FAA still has cyber security problems to address (September 26, 2005). SANS NewsBites. September 28, 2005; 7(39).
-
(2005)
SANS NewsBites.
, vol.7
, Issue.39
-
-
Schneier, B.1
Shpantzer, G.2
-
46
-
-
58349097312
-
Design guidelines for secure web applications
-
In: Improving Web Application Security, Chap 4, Available at, Accessed April 19
-
Meier JD, et al. Design guidelines for secure web applications. In: Improving Web Application Security, Chap 4. Available at http://msdn. microsof t.com/library/default.asp?url=/library/en-us/dnnetsec/htm~/thcmch04.asp. Accessed April 19, 2006.
-
(2006)
-
-
Meier, J.D.1
-
47
-
-
84889312835
-
Architecture and design review for security
-
In: Improving Web Application Security, Chap 5, Available at, Accessed April 19
-
Meier JD, et al. Architecture and design review for security. In: Improving Web Application Security, Chap 5. Available at http://msdn. microsof t.com/library/default.asp?url=/library/en-us/dnnetsec/html/thcmch05.asp. Accessed April 19, 2006.
-
(2006)
-
-
Meier, J.D.1
-
48
-
-
0003970344
-
Public-key cryptography
-
Wikipedia, Available at, Accessed April 19
-
Wikipedia. Public-key cryptography. Available at http://en. wikipedia.org/wiki/Public-key. Accessed April 19, 2006.
-
(2006)
-
-
-
49
-
-
33847753565
-
Transport layer security
-
Wikipedia, Available at, Accessed April 19
-
Wikipedia. Transport layer security. Available at http://en. wikipedia.org/wiki/Transport-Layer-Security. Accessed April 19, 2006.
-
(2006)
-
-
-
50
-
-
0004256091
-
Computer security
-
Wikipedia, Available at, Accessed April 19
-
Wikipedia. Computer security. Available at http://en. wikipedia.org/wiki/Computer-security. Accessed April 19, 2006.
-
(2006)
-
-
-
51
-
-
84889489317
-
Always on, always vulnerable: securing broadband connections
-
March 26, Available at, Accessed June 24
-
Tanase M. Always on, always vulnerable: securing broadband connections. March 26, 2003. Available at http://www.securityfocus.com/infocus/l560. Accessed June 24, 2006.
-
(2003)
-
-
Tanase, M.1
-
52
-
-
84889496727
-
Barbarians at the gate: an introduction to distributed denial of service attacks
-
December 3, Available at, Accessed June 24
-
Tanase M. Barbarians at the gate: an introduction to distributed denial of service attacks. December 3, 2002. Available at http://www.securityfocus.com/infocus/1647. Accessed June 24, 2006.
-
(2002)
-
-
Tanase, M.1
-
53
-
-
84889387881
-
Al: Unvalidated input
-
Open Web Application Security Project, Available at, Accessed April 19
-
Open Web Application Security Project. Al: Unvalidated input. 2005. Available at http://www.owasp.org/documentation/topten/al. h t m l. Accessed April 19, 2006.
-
(2005)
-
-
-
54
-
-
84889316924
-
A4: Cross site scripting
-
Open Web Application Security Project, Available at, Accessed April 19
-
Open Web Application Security Project. A4: Cross site scripting. 2005. Available at http://www.owasp.org/documentation/topten/a4.html. Accessed April 19, 2006.
-
(2005)
-
-
-
55
-
-
84889374881
-
Cross site scripting
-
Wikipedia, Available at, Accessed April 19
-
Wikipedia. Cross site scripting. Available at http://en. wikipedia.org/wiki/Cros s-si t e-scr i p t ing. Accessed April 19, 2006.
-
(2006)
-
-
-
56
-
-
84889404149
-
How SSL works
-
AcmeInternet, Available at, Accessed April 19
-
AcmeInternet. How SSL works. Available at http://support. acmeinternet.com/howtof aqs/ecommerce/ssl-howitworks.htm. Accessed April 19, 2006.
-
(2006)
-
-
-
57
-
-
84889437672
-
AppSec FAQ
-
Available at, Accessed April 19
-
Pakala S, et al. AppSec FAQ. Available at http://www.owasp.org/documentation/appsec-f aq.html. Accessed April 19, 2006.
-
(2006)
-
-
Pakala, S.1
-
58
-
-
84889329464
-
White-hat hacker
-
Wikipedia, Available at, Accessed June 24
-
Wikipedia. White-hat hacker. Available at http://en. wikipedia.org/wiki/White-hat-hacker. Accessed June 24, 2006.
-
(2006)
-
-
-
59
-
-
84889485875
-
Computer port (software)
-
Wikipedia, Available at, Accessed June 24
-
Wikipedia. Computer port (software). Available at http://en. wikipedia.org/wiki/Computer-port-%29sof twareX30. Accessed June 24, 2006.
-
(2006)
-
-
-
60
-
-
0345302842
-
Counter Hack
-
Upper Saddle River, NJ; Prentice-Hall; 2002: 289. As quoted in Beverstock D. Passwords are DEAD! (Long live passwords?) [practical paper for SANS GSEC certification], Available at, Accessed June 22
-
Skoudis E. Counter Hack. Upper Saddle River, NJ; Prentice-Hall; 2002: 289. As quoted in Beverstock D. Passwords are DEAD! (Long live passwords?) [practical paper for SANS GSEC certification]. 2003. Available at http://www.sans.org/reading~room/whitepapers/authentication/l144.php. Accessed June 22, 2006.
-
(2003)
-
-
Skoudis, E.1
-
61
-
-
84889277978
-
RSA Security: RSA Secur ID authentication
-
RSA Security Inc, Available at, Accessed April 19
-
RSA Security Inc. RSA Security: RSA Secur ID authentication. Available at http://www.rsasecurity.com/node.asp?id=ii56. Accessed April 19, 2006.
-
(2006)
-
-
-
62
-
-
84989165268
-
Authentication
-
Wikipedia, Available at, Accessed April 19
-
Wikipedia. Authentication. Available at http://en. wikipedia.org/wiki/Authentication. Accessed April 19, 2006.
-
(2006)
-
-
-
63
-
-
84889428096
-
EToken strong authentication and password management
-
Aladdin Knowledge Systems Ltd, Available at, Accessed April 19
-
Aladdin Knowledge Systems Ltd. eToken strong authentication and password management. Available at http://www.aladdin.com/etoken/def ault.asp. Accessed April 19, 2006.
-
(2006)
-
-
-
64
-
-
84889375062
-
Alphabetical list of authentication products
-
Timberline Technologies LLC, Available at, Accessed April 19
-
Timberline Technologies LLC. Alphabetical list of authentication products. Available at http://www.timberlinetechnologies.com/products/authentication.html. Accessed April 19, 2006.
-
(2006)
-
-
-
65
-
-
84889392794
-
Define key fob: a Whatis.com definition
-
searchSecurity.com, Available at, Accessed April 19
-
searchSecurity.com, 2002. Define key fob: a Whatis.com definition. Available at http://searchsecurity.techtarget.com/sDefinition/0, sid14-gci795968, OO.html. Accessed April 19, 2006.
-
(2002)
-
-
-
66
-
-
84889421117
-
-
Wikipedia, SecurID, Available at, Accessed April 19
-
Wikipedia. SecurID. Available at http://en. wikipedia.org/wiki/Securid. Accessed April 19, 2006.
-
(2006)
-
-
-
67
-
-
84889283137
-
Tomcat security overview and analysis
-
CafeSoft LLC, Available at, A ccessed April 19
-
CafeSoft LLC. Tomcat security overview and analysis. Available at http://www.cafesoft.com/products/cams/tomcat-security.html. A ccessed April 19, 2006.
-
(2006)
-
-
-
68
-
-
33947426112
-
Virtual private network
-
Wikipedia, Available at, Accessed June 22
-
Wikipedia. Virtual private network. Available at http://en. wikipedia.org/wiki/Virtual-private-network. Accessed June 22, 2006.
-
(2006)
-
-
-
69
-
-
84889292062
-
After a security breach
-
Network World. October 24
-
Radcliff D. After a security breach. Network World. October 24, 2005: 42-44.
-
(2005)
, pp. 42-44
-
-
Radcliff, D.1
|