메뉴 건너뛰기




Volumn , Issue , 2013, Pages 100-105

Modeling and detecting anomalous topic access

Author keywords

Access Logs; Anomaly Detection; Data Mining; Electronic Health Records; Healthcare Security; Insider threats

Indexed keywords

ACCESS LOG; ANOMALY DETECTION; ANOMALY DETECTION FRAMEWORKS; DEVELOPING STRATEGY; ELECTRONIC HEALTH RECORD; INSIDER THREAT; K NEAREST NEIGHBOR (K NN) ALGORITHM; LATENT DIRICHLET ALLOCATIONS;

EID: 84883420860     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISI.2013.6578795     Document Type: Conference Paper
Times cited : (19)

References (13)
  • 1
    • 84863381941 scopus 로고    scopus 로고
    • Detecting anomalous insiders in collaborative information systems
    • May
    • Y. Chen and B. Malin, "Detecting anomalous insiders in collaborative information systems," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 332-344, May 2012.
    • (2012) IEEE Transactions on Dependable and Secure Computing , vol.9 , Issue.3 , pp. 332-344
    • Chen, Y.1    Malin, B.2
  • 3
    • 65449143380 scopus 로고    scopus 로고
    • Anomaly pattern detection in categorical datasets
    • K. Das, J. Schneider, and N. D., "Anomaly pattern detection in categorical datasets," KDD, pp. 169-176, 2008.
    • (2008) KDD , pp. 169-176
    • Das, K.1    Schneider, N.D.J.2
  • 7
    • 79959638566 scopus 로고    scopus 로고
    • Using statistical and machine learning to help institutions detect suspicious access to electronic health records
    • A. Boxwala, J. Kim, J. Grillo, and L. Ohno-Machado, "Using statistical and machine learning to help institutions detect suspicious access to electronic health records," Journal of the American Medical Informatics Association, vol. 18, no. 4, pp. 498-505, 2011.
    • (2011) Journal of the American Medical Informatics Association , vol.18 , Issue.4 , pp. 498-505
    • Boxwala, A.1    Kim, J.2    Grillo, J.3    Ohno-Machado, L.4
  • 10
    • 80053461711 scopus 로고    scopus 로고
    • Experience-based access management: A life-cycle framework for identity and access management systems
    • September/October
    • C. A. Gunter, D. M. Liebovitz, and B. Malin, "Experience-based access management: A life-cycle framework for identity and access management systems," IEEE Security & Privacy Magazine, vol. 9, no. 5, September/October 2011.
    • (2011) IEEE Security & Privacy Magazine , vol.9 , Issue.5
    • Gunter, C.A.1    Liebovitz, D.M.2    Malin, B.3
  • 11
    • 84871865576 scopus 로고    scopus 로고
    • Explaining accesses to electronic medical records using diagnosis information
    • D. Fabbri and K. LeFevre, "Explaining accesses to electronic medical records using diagnosis information," Journal of the American Medical Informatics Association, vol. 20, no. 1, pp. 52-60, 2013.
    • (2013) Journal of the American Medical Informatics Association , vol.20 , Issue.1 , pp. 52-60
    • Fabbri, D.1    Lefevre, K.2
  • 12
    • 84883381802 scopus 로고    scopus 로고
    • [Online]. Available: http://www.cdc.gov/nchs/icd.htm
  • 13
    • 84883312997 scopus 로고    scopus 로고
    • [Online]. Available: https://www.nlm.nih.gov/research/umls/rxnorm/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.