{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T03:09:05Z","timestamp":1769310545423,"version":"3.49.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/codit.2017.8102628","type":"proceedings-article","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T11:15:31Z","timestamp":1511867731000},"page":"0421-0426","source":"Crossref","is-referenced-by-count":6,"title":["Protect healthcare system based on intelligent techniques"],"prefix":"10.1109","author":[{"given":"Mohamed Adel","family":"Al-Shaher","sequence":"first","affiliation":[]},{"given":"Rasha Talal","family":"Hameed","sequence":"additional","affiliation":[]},{"given":"Nicolae","family":"Tapus","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"skoudis","year":"2003","journal-title":"Malware Fighting Malicious Code"},{"key":"ref11","author":"joarder","year":"2006","journal-title":"Neural networks in finance and manufacturing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738566"},{"key":"ref13","article-title":"Improving intrusion detection performance using keyword selection and neural networks","author":"cunningham","year":"2002","journal-title":"Proceedings of the International Symposium on Recent Advances in Intrusion Detection"},{"key":"ref14","article-title":"How To Guide-Implementing a Network Based Intrusion Detection System","author":"laing","year":"0","journal-title":"Sovereign Reading RG1 8BT UK"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2000.876573"},{"key":"ref4","author":"frahim","year":"2006","journal-title":"Cisco Network Admission Control Volume II NAC Network Deployment and Troubleshooting"},{"key":"ref3","first-page":"286","article-title":"Cloud Based Healthcare Application Architecture and Electronic Medical Record Mining: An Integrated Approach to Improve Healthcare System","author":"anisuzzaman","year":"2014","journal-title":"Proceeding of 17th IEEE International Conference on Computer and Information Technology (ICCIT)"},{"key":"ref6","article-title":"The application of artificial neural networks to misuse detection: initial results","author":"cannady","year":"2000","journal-title":"Proc of the Third International Workshop on Recent Advances in Intrusion Detection (RAID 2000)"},{"key":"ref5","first-page":"692","article-title":"Implementation of a Security Access Control Model for InterOrganizational Healthcare Information Systems","author":"chi","year":"2008","journal-title":"IEEE International Conference Asia-Pacific Services Computing Conference"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.264"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTIDE.2016.7725373"},{"key":"ref2","article-title":"Proposal of a Cloud Computing System for Management of Health Data","volume":"114","author":"chandeep","year":"2015","journal-title":"International Journal of Computer Applications (0975 - 8887)"},{"key":"ref1","article-title":"An Overview of Electronic Health Record (HER) Implementation Framework and Impact On Health Care Organizations In Malaysia. A Case Study","author":"abual karim","year":"2010","journal-title":"IEEE (ICMIT)"},{"key":"ref9","first-page":"73","article-title":"High-Level Security Services based on a Hardware NoC Firewall Module","author":"grammatikakis","year":"2015","journal-title":"12th International Workshop on Intelligent Solutions in Embedded systems (WISES)"}],"event":{"name":"2017 4th International Conference on Control, Decision and Information Technologies (CoDIT)","location":"Barcelona","start":{"date-parts":[[2017,4,5]]},"end":{"date-parts":[[2017,4,7]]}},"container-title":["2017 4th International Conference on Control, Decision and Information Technologies (CoDIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8091148\/8102545\/08102628.pdf?arnumber=8102628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T18:29:44Z","timestamp":1515695384000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8102628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/codit.2017.8102628","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}