Login / Signup
How to Cover up Anomalous Accesses to Electronic Health Records.
Xiaojun Xu
Qingying Hao
Zhuolin Yang
Bo Li
David M. Liebovitz
Gang Wang
Carl A. Gunter
Published in:
USENIX Security Symposium (2023)
Keyphrases
</>
electronic health records
clinical data
health care
anomaly detection
clinical trials
medical records
health data
medical data
health information technology
health records
database
data sets
search engine
decision making
management system
intrusion detection