all InfoSec news
USENIX Security '23 - How to Cover up Anomalous Accesses to Electronic Health Records
Nov. 30, 2023, 8:16 p.m. | USENIX
USENIX www.youtube.com
Xiaojun Xu, Qingying Hao, Zhuolin Yang, and Bo Li, University of Illinois at Urbana-Champaign; David Liebovitz, Northwestern University; Gang Wang and Carl A. Gunter, University of Illinois at Urbana-Champaign
Illegitimate access detection systems in hospital logs perform post hoc detection instead of runtime access restriction to allow widespread access in emergencies. We study the effectiveness of adversarial machine learning strategies against such detection systems on a …
access detection electronic health records gang health illinois records security university usenix usenix security wang
More from www.youtube.com / USENIX
SREcon24 Americas - Meeting the Challenge of Burnout
2 weeks, 1 day ago |
www.youtube.com
SREcon24 Americas - Build vs. Buy in the Midst of Armageddon
2 weeks, 1 day ago |
www.youtube.com
SREcon24 Americas - Triage with Mental Models
2 weeks, 1 day ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
Principal Security Engineer
@ Elsevier | Home based-Georgia
Infrastructure Compliance Engineer
@ NVIDIA | US, CA, Santa Clara
Information Systems Security Engineer (ISSE) / Cybersecurity SME
@ Green Cell Consulting | Twentynine Palms, CA, United States
Sales Security Analyst
@ Everbridge | Bengaluru
Alternance – Analyste Threat Intelligence – Cybersécurité - Île-de-France
@ Sopra Steria | Courbevoie, France
Third Party Cyber Risk Analyst
@ Chubb | Philippines