Login / Signup

Detecting Roles and Anomalies in Hospital Access Audit Logs.

Carl A. Gunter
Published in: SafeConfig (2014)
Keyphrases
  • detecting anomalies
  • anomaly detection
  • intrusion detection
  • health care
  • information systems
  • information retrieval
  • medical images
  • access control
  • automatic detection
  • social media
  • high risk
  • anomalous behavior