all InfoSec news
USENIX Security '23 - How to Cover up Anomalous Accesses to Electronic Health Records
Nov. 30, 2023, 8:16 p.m. | USENIX
USENIX www.youtube.com
Xiaojun Xu, Qingying Hao, Zhuolin Yang, and Bo Li, University of Illinois at Urbana-Champaign; David Liebovitz, Northwestern University; Gang Wang and Carl A. Gunter, University of Illinois at Urbana-Champaign
Illegitimate access detection systems in hospital logs perform post hoc detection instead of runtime access restriction to allow widespread access in emergencies. We study the effectiveness of adversarial machine learning strategies against such detection systems on a …
access detection electronic health records gang health illinois records security university usenix usenix security wang
More from www.youtube.com / USENIX
SREcon24 Americas - Meeting the Challenge of Burnout
1 month, 2 weeks ago |
www.youtube.com
SREcon24 Americas - Build vs. Buy in the Midst of Armageddon
1 month, 2 weeks ago |
www.youtube.com
SREcon24 Americas - Triage with Mental Models
1 month, 2 weeks ago |
www.youtube.com
SREcon24 Americas - 99.99% of Your Traces Are (Probably) Trash
1 month, 2 weeks ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC