-
1
-
-
84863381941
-
Detecting anomalous insiders in collaborative information systems
-
May
-
Y. Chen and B. Malin, "Detecting anomalous insiders in collaborative information systems," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 332-344, May 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 332-344
-
-
Chen, Y.1
Malin, B.2
-
2
-
-
0141607824
-
Latent dirichlet allocation
-
D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation," J. Mach. Learn. Res., vol. 3, pp. 993-1022, 2003.
-
(2003)
J. Mach. Learn. Res.
, vol.3
, pp. 993-1022
-
-
Blei, D.M.1
Ng, A.Y.2
Jordan, M.I.3
-
3
-
-
65449143380
-
Anomaly pattern detection in categorical datasets
-
K. Das, J. Schneider, and N. D., "Anomaly pattern detection in categorical datasets," KDD, pp. 169-176, 2008.
-
(2008)
KDD
, pp. 169-176
-
-
Das, K.1
Schneider, N.D.J.2
-
7
-
-
79959638566
-
Using statistical and machine learning to help institutions detect suspicious access to electronic health records
-
A. Boxwala, J. Kim, J. Grillo, and L. Ohno-Machado, "Using statistical and machine learning to help institutions detect suspicious access to electronic health records," Journal of the American Medical Informatics Association, vol. 18, no. 4, pp. 498-505, 2011.
-
(2011)
Journal of the American Medical Informatics Association
, vol.18
, Issue.4
, pp. 498-505
-
-
Boxwala, A.1
Kim, J.2
Grillo, J.3
Ohno-Machado, L.4
-
8
-
-
84883419093
-
Anomaly and signature filtering improve classifier performance for detection of suspicious access to ehrs
-
J. Kim, J. M. Grillo, A. A. Boxwala, X. Jiang, R. B. Mandelbaum, B. A. Patel, D. Mikels, S. A. Vinterbo, and L. Ohno-Machado, "Anomaly and signature filtering improve classifier performance for detection of suspicious access to ehrs," Journal of the American Medical Informatics Association, p. 723731, 2011.
-
(2011)
Journal of the American Medical Informatics Association
, pp. 723731
-
-
Kim, J.1
Grillo, J.M.2
Boxwala, A.A.3
Jiang, X.4
Mandelbaum, R.B.5
Patel, B.A.6
Mikels, D.7
Vinterbo, S.A.8
Ohno-Machado, L.9
-
10
-
-
80053461711
-
Experience-based access management: A life-cycle framework for identity and access management systems
-
September/October
-
C. A. Gunter, D. M. Liebovitz, and B. Malin, "Experience-based access management: A life-cycle framework for identity and access management systems," IEEE Security & Privacy Magazine, vol. 9, no. 5, September/October 2011.
-
(2011)
IEEE Security & Privacy Magazine
, vol.9
, Issue.5
-
-
Gunter, C.A.1
Liebovitz, D.M.2
Malin, B.3
-
11
-
-
84871865576
-
Explaining accesses to electronic medical records using diagnosis information
-
D. Fabbri and K. LeFevre, "Explaining accesses to electronic medical records using diagnosis information," Journal of the American Medical Informatics Association, vol. 20, no. 1, pp. 52-60, 2013.
-
(2013)
Journal of the American Medical Informatics Association
, vol.20
, Issue.1
, pp. 52-60
-
-
Fabbri, D.1
Lefevre, K.2
-
12
-
-
84883381802
-
-
[Online]. Available: http://www.cdc.gov/nchs/icd.htm
-
-
-
-
13
-
-
84883312997
-
-
[Online]. Available: https://www.nlm.nih.gov/research/umls/rxnorm/
-
-
-
|