메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Host-based anomaly detection for pervasive medical systems

Author keywords

Data Mining; Intrusion Detection Systems; Pervasive Medical Systems; Security

Indexed keywords

ANOMALOUS ACTIVITY; ANOMALY DETECTION; COMPUTING INFRASTRUCTURES; DATA MINING TECHNIQUES; DEGREE OF MOBILITY; DETECTION APPROACH; EXPERIMENTAL SETUP; HEALTHCARE DOMAINS; HEALTHCARE SERVICES; HOST-BASED; INTRUSION DETECTION SYSTEMS; MEDICAL RECORD; MEDICAL SYSTEMS; NORMAL USAGE PROFILE; PERVASIVE DEVICES; PERVASIVE HEALTHCARE; PERVASIVE HEALTHCARE APPLICATION; PERVASIVE MEDICAL SYSTEMS; SAMPLE DATA; SECURITY; SECURITY PROBLEMS; WIRELESS COMMUNICATIONS;

EID: 79957620499     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CRISIS.2010.5764923     Document Type: Conference Paper
Times cited : (12)

References (32)
  • 1
    • 33745907062 scopus 로고    scopus 로고
    • The Trouble with Login: On Usability and Computer Security in Ubiquitous Computing
    • E. Bardram, "The Trouble with Login: On Usability and Computer Security in Ubiquitous Computing," Personal Ubiquitous Comput., vol. 9, no. 6, pp. 357-367, 2005.
    • (2005) Personal Ubiquitous Comput. , vol.9 , Issue.6 , pp. 357-367
    • Bardram, E.1
  • 2
    • 35248861348 scopus 로고    scopus 로고
    • Dependability Issues of Pervasive Computing in a Healthcare Environment
    • Springer Berlin / Heidelberg
    • Jürgen Bohn, Felix Gärtner and Harald Vogt, "Dependability Issues of Pervasive Computing in a Healthcare Environment," in Security in Pervasive Computing. Springer Berlin / Heidelberg, 2004.
    • (2004) Security in Pervasive Computing
    • Bohn, J.1    Gärtner, F.2    Vogt, H.3
  • 4
    • 0023294428 scopus 로고
    • Intrusion-Detection Model
    • D. E. Denning, "Intrusion-Detection Model," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, 1987.
    • (1987) IEEE Trans. Software Eng. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 5
    • 24944433030 scopus 로고    scopus 로고
    • Security for Ubiquitous Computing
    • ICISC, C. Park and S. Chee, Eds., Springer
    • F. Stajano, "Security for Ubiquitous Computing," in ICISC, ser. Lecture Notes in Computer Science, C. Park and S. Chee, Eds., vol. 3506. Springer, 2004, p. 2.
    • (2004) Ser. Lecture Notes in Computer Science , vol.3506 , pp. 2
    • Stajano, F.1
  • 6
    • 79957614136 scopus 로고    scopus 로고
    • NetHost-Sensor: A Novel Concept in Intrusion Detection Systems
    • Washington, DC, USA: IEEE Computer Society
    • A. Abimbola, Q. Shi, and M. Merabti, "NetHost-Sensor: A Novel Concept in Intrusion Detection Systems," in ISCC '03. Washington, DC, USA: IEEE Computer Society, 2003, p. 232.
    • (2003) ISCC '03 , pp. 232
    • Abimbola, A.1    Shi, Q.2    Merabti, M.3
  • 7
    • 0023294428 scopus 로고
    • An Intrusion-Detection Model
    • D. E. Denning, "An Intrusion-Detection Model," IEEE Trans. Softw. Eng., vol. 13, no. 2, pp. 222-232, 1987.
    • (1987) IEEE Trans. Softw. Eng. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 8
    • 85090433665 scopus 로고    scopus 로고
    • Snort - Lightweight Intrusion Detection for Networks
    • Berkeley, CA, USA: USENIX Association
    • M. Roesch, "Snort - Lightweight Intrusion Detection for Networks," in LISA. Berkeley, CA, USA: USENIX Association, 1999, pp. 229-238.
    • (1999) LISA , pp. 229-238
    • Roesch, M.1
  • 9
    • 1542286890 scopus 로고    scopus 로고
    • Designing and Implementing a Family of Intrusion Detection Systems
    • New York, NY, USA: ACM
    • G. Vigna, F. Valeur, and R. A. Kemmerer, "Designing and Implementing a Family of Intrusion Detection Systems," in ESEC/FSE-11. New York, NY, USA: ACM, 2003, pp. 88-97.
    • (2003) ESEC/FSE-11 , pp. 88-97
    • Vigna, G.1    Valeur, F.2    Kemmerer, R.A.3
  • 10
    • 2442449499 scopus 로고    scopus 로고
    • Applications of Context-Aware Computing in Hospital Work - Examples and Design Principles
    • ACM Press
    • J. E. Bardram, "Applications of Context-Aware Computing in Hospital Work - Examples and Design Principles," in Proceedings of the 2004 ACM Symposium on Applied Computing. ACM Press, 2004, pp. 1574-1579.
    • (2004) Proceedings of the 2004 ACM Symposium on Applied Computing , pp. 1574-1579
    • Bardram, J.E.1
  • 12
    • 0002973626 scopus 로고    scopus 로고
    • Using Pervasive Computing to Deliver Elder Care
    • V. Stanford, "Using Pervasive Computing to Deliver Elder Care," IEEE Pervasive Computing, vol. 1, no. 1, pp. 10-13, 2002.
    • (2002) IEEE Pervasive Computing , vol.1 , Issue.1 , pp. 10-13
    • Stanford, V.1
  • 14
    • 0348011360 scopus 로고    scopus 로고
    • Pervasive Healthcare
    • U. Varshney, "Pervasive Healthcare," IEEE Computer, vol. 36, no. 12, pp. 138-140, 2003.
    • (2003) IEEE Computer , vol.36 , Issue.12 , pp. 138-140
    • Varshney, U.1
  • 16
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • RIAD, Springer
    • Ke Wang and Salvatore J. Stolfo, "Anomalous payload-based network intrusion detection," in RIAD, ser. Lecture Notes in Computer Science. Springer, 2004, pp. 203-222.
    • (2004) Ser. Lecture Notes in Computer Science , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 17
    • 27144475340 scopus 로고    scopus 로고
    • A comparative evaluation of two algorithms for Windows Registry Anomaly Detection
    • Salvatore J. Stolfo and Frank Apap and Eleazar Eskin and Katherine Heller and Shlomo Hershkop and Andrew Honig and Krysta Marie Svore, "A comparative evaluation of two algorithms for Windows Registry Anomaly Detection," Journal of Computer Security, vol. 13, no. 4, pp. 659-693, 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.4 , pp. 659-693
    • Stolfo, S.J.1    Apap, F.2    Eskin, E.3    Heller, K.4    Hershkop, S.5    Honig, A.6    Svore, K.M.7
  • 18
    • 84940110274 scopus 로고    scopus 로고
    • Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)
    • IEEE Computer Society
    • U. Lindqvist and P. A. Porras, "Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)," in S & P. IEEE Computer Society, 1999.
    • (1999) S & P
    • Lindqvist, U.1    Porras, P.A.2
  • 22
    • 33644780888 scopus 로고    scopus 로고
    • A process-mining Framework for the Detection of Healthcare Fraud and Abuse
    • W.-S. Yang, , and S.-Y. Hwang, "A process-mining Framework for the Detection of Healthcare Fraud and Abuse," Expert Systems with Applications, vol. 31, pp. 56-68, 2006.
    • (2006) Expert Systems with Applications , vol.31 , pp. 56-68
    • Yang, W.-S.1    Hwang, S.-Y.2
  • 25
    • 0002784345 scopus 로고    scopus 로고
    • Algorithms for association rule mining - A general survey and comparison
    • Hipp, Jochen and Güntzer, Ulrich and Nakhaeizadeh, Gholamreza, "Algorithms for association rule mining - a general survey and comparison," SIGKDD Explor. News, vol. 2, no. 1, pp. 58-64, 2000.
    • (2000) SIGKDD Explor. News , vol.2 , Issue.1 , pp. 58-64
    • Hipp, J.1    Güntzer, U.2    Nakhaeizadeh, G.3
  • 27
    • 2942735553 scopus 로고    scopus 로고
    • Odam: An optimized distributed association rule mining algorithm
    • March
    • K. S. Mafruz Zaman Ashrafi, David Taniar, "Odam: An optimized distributed association rule mining algorithm," IEEE Distributed Systems Online, vol. 5, no. 3, March 2004.
    • (2004) IEEE Distributed Systems Online , vol.5 , Issue.3
    • Mafruz Zaman Ashrafi, K.S.1    Taniar, D.2
  • 28
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee and S. J. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 227-261, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 30
    • 84958033935 scopus 로고    scopus 로고
    • Integrating classification and association rule mining: A concept lattice framework
    • London, UK: Springer-Verlag
    • K. Hu, Y. Lu, L. Zhou, and C. Shi, "Integrating classification and association rule mining: A concept lattice framework," in RSFDGrC'99. London, UK: Springer-Verlag, 1999, pp. 443-447.
    • (1999) RSFDGrC'99 , pp. 443-447
    • Hu, K.1    Lu, Y.2    Zhou, L.3    Shi, C.4
  • 31
    • 0029716418 scopus 로고    scopus 로고
    • A Sense of Self for Unix Processes
    • Washington, DC, USA: IEEE Computer Society
    • S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A Sense of Self for Unix Processes," in SP '96. Washington, DC, USA: IEEE Computer Society, 1996, p. 120.
    • (1996) SP '96 , pp. 120
    • Forrest, S.1    Hofmeyr, S.A.2    Somayaji, A.3    Longstaff, T.A.4
  • 32
    • 79957596413 scopus 로고    scopus 로고
    • A Dynamic Data Mining Technique for Intrusion Detection Systems
    • New York, NY, USA: ACM
    • B. D. Caulkins, J. Lee, and M. Wang, "A Dynamic Data Mining Technique for Intrusion Detection Systems," in ACMSE 43. New York, NY, USA: ACM, 2005, pp. 148-153.
    • (2005) ACMSE 43 , pp. 148-153
    • Caulkins, B.D.1    Lee, J.2    Wang, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.