2021
DOI: 10.1007/978-3-030-91434-9_16
|View full text |Cite
|
Sign up to set email alerts
|

Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…The Drebin dataset, with its vast collection of An-droid applications, has been extensively utilized to benchmark various detection techniques, offering insights into the intricacies of Android malware (Biggio et al, 2013). Similarly, EMBER, with its standardized representation of PE files, has been a cornerstone in several machine learning-based malware detection studies, serving as a consistent platform for evaluations (Al Kinoon, Omar, Mohaisen & Mohaisen, 2021).…”
Section: E Drebin and Ember In Malware Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…The Drebin dataset, with its vast collection of An-droid applications, has been extensively utilized to benchmark various detection techniques, offering insights into the intricacies of Android malware (Biggio et al, 2013). Similarly, EMBER, with its standardized representation of PE files, has been a cornerstone in several machine learning-based malware detection studies, serving as a consistent platform for evaluations (Al Kinoon, Omar, Mohaisen & Mohaisen, 2021).…”
Section: E Drebin and Ember In Malware Researchmentioning
confidence: 99%
“…In this paper, we delve deep into this hypothesis, harnessing the power of GPT-2 to detect malware, employing two of the widely used datasets in the domain: EMBER (Al Kinoon, Omar, Mohaisen & Mohaisen, 2021) and Drebin (Biggio et al, 2013). EMBER offers a collection of features from PE (Portable Executable) files, presenting a standardized representation conducive for ML experimentation.…”
Section: Introductionmentioning
confidence: 99%
“…Myriad studies have unveiled methodologies that employ machine learning techniques for this pursuit. Some concentrate on static analysis, extracting salient features from the code to be input into predictive machine-learning frameworks [1,2], while others hinge on dynamic analysis, running the code and monitoring its behavior to discern vulnerabilities [3,4]. A nascent inclination towards harnessing deep learning models for source code vulnerability detection has been observed.…”
Section: Related Workmentioning
confidence: 99%
“…Static analysis of source code offers one such detection avenue, embracing methodologies ranging from code similarity assessment to pattern-recognition techniques. Notably, while code similarity evaluation can pinpoint vulnerabilities emanating from code replication, it may incur considerable false negatives [1,2,9,10,[15][16][17][18][19][20][21][22][23][24]. In a bid to tackle these vulnerability detection quandaries, the academic sphere has introduced methods such as fuzzing, symbolic scrutiny, and rule-centric testing.…”
Section: Introductionmentioning
confidence: 99%
“…First, in the process of system development, it is necessary to avoid security issues such as patient medical information data leakage. Due to the enormous value of data in the medical field, it is frequently the target of theft by criminal groups who profit from the malicious use of data (48). Medical data leakage will aggravate patient distrust of medical institutions, which will lead to major crises in medical institutions.…”
Section: Machine Learning Technology E Ectively Promotes the Developm...mentioning
confidence: 99%