Rigorously Defining and Analyzing Medical Processes: An Experience Report
Models in Software Engineering
Detection of anomalous insiders in collaborative environments via relational analysis of access logs
Proceedings of the first ACM conference on Data and application security and privacy
Learning relational policies from electronic health record access logs
Journal of Biomedical Informatics
IEEE Security and Privacy
Towards understanding the usage pattern of web-based electronic medical record systems
WOWMOM '11 Proceedings of the 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
A self-adaptive multi-agent system for abnormal behavior detection in maritime surveillance
KES-AMSTA'12 Proceedings of the 6th KES international conference on Agent and Multi-Agent Systems: technologies and applications
Hi-index | 0.01 |