{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:42Z","timestamp":1750220682008,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T00:00:00Z","timestamp":1600646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,21]]},"DOI":"10.1145\/3384217.3386397","type":"proceedings-article","created":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T04:14:50Z","timestamp":1598415290000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Time series anomaly detection in medical break-the-glass"],"prefix":"10.1145","author":[{"given":"Qais","family":"Tasali","sequence":"first","affiliation":[{"name":"Kansas State University"}]},{"given":"Nikesh","family":"Gyawali","sequence":"additional","affiliation":[{"name":"Kansas State University"}]},{"given":"Eugene Y.","family":"Vasserman","sequence":"additional","affiliation":[{"name":"Kansas State University"}]}],"member":"320","published-online":{"date-parts":[[2020,9,21]]},"reference":[{"volume-title":"ACM Symposium on Applied Computing.","author":"Alizadeh M.","key":"e_1_3_2_1_1_1","unstructured":"M. Alizadeh , S. Peters , S. Etalle , and N. Zannone . 2018. Behavior analysis in the medical sector: Theory and practice . In ACM Symposium on Applied Computing. M. Alizadeh, S. Peters, S. Etalle, and N. Zannone. 2018. Behavior analysis in the medical sector: Theory and practice. In ACM Symposium on Applied Computing."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"V. Chandola A. Banerjee and V. Kumar. 2009. Anomaly detection: A survey. Comput. Surveys 41 3 (2009).  V. Chandola A. Banerjee and V. Kumar. 2009. Anomaly detection: A survey. Comput. Surveys 41 3 (2009).","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Y. Chen and B. Malin. 2011. Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs. In CoDASPY.  Y. Chen and B. Malin. 2011. Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs. In CoDASPY.","DOI":"10.1145\/1943513.1943524"},{"key":"e_1_3_2_1_4_1","unstructured":"V.C. Hu D. Ferraiolo R. Kuhn A. Schnitzer K. Sandlin R. Miller and K. Scarfone. 2014. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication 800--162.  V.C. Hu D. Ferraiolo R. Kuhn A. Schnitzer K. Sandlin R. Miller and K. Scarfone. 2014. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication 800--162."},{"key":"e_1_3_2_1_5_1","unstructured":"Legal Information Institute. 2013. 45 CFR 164.312 - Technical safeguards.  Legal Information Institute. 2013. 45 CFR 164.312 - Technical safeguards."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"D. Povey. 1999. Optimistic security: A new access control paradigm. In NSPW.  D. Povey. 1999. Optimistic security: A new access control paradigm. In NSPW.","DOI":"10.1145\/335169.335188"},{"key":"e_1_3_2_1_7_1","volume-title":"Gaussian Mixture Models. Encyclopedia of Biometrics","author":"Reynolds D.A.","year":"2009","unstructured":"D.A. Reynolds . 2009. Gaussian Mixture Models. Encyclopedia of Biometrics ( 2009 ). D.A. Reynolds. 2009. Gaussian Mixture Models. Encyclopedia of Biometrics (2009)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Q. Tasali C. Chowdhury and E.Y. Vasserman. 2017. A Flexible Authorization Architecture for Systems of Interoperable Medical Devices. In SACMAT.  Q. Tasali C. Chowdhury and E.Y. Vasserman. 2017. A Flexible Authorization Architecture for Systems of Interoperable Medical Devices. In SACMAT.","DOI":"10.1145\/3078861.3078862"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Q. Tasali C. Sublett and E.Y. Vasserman. 2020. Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems. EAI SESA (2020).  Q. Tasali C. Sublett and E.Y. Vasserman. 2020. Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems. EAI SESA (2020).","DOI":"10.4108\/eai.13-7-2018.163213"},{"key":"e_1_3_2_1_10_1","volume-title":"HHS Office for Civil Rights","author":"S.","year":"2013","unstructured":"U. S. HHS Office for Civil Rights . 2013 . HIPAA Administrative Simplification . U.S. HHS Office for Civil Rights. 2013. HIPAA Administrative Simplification."},{"volume-title":"International Conference on Machine Learning.","author":"Weiss G.M.","key":"e_1_3_2_1_11_1","unstructured":"G.M. Weiss and H. Hirsh . 1998. Learning to predict rare events in categorical time-series data . In International Conference on Machine Learning. G.M. Weiss and H. Hirsh. 1998. Learning to predict rare events in categorical time-series data. In International Conference on Machine Learning."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"K. Yamanishi J-I. Takeuchi G. Williams and P. Milne. 2004. On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. Data Mining and Knowledge Discovery 8 3 (2004).  K. Yamanishi J-I. Takeuchi G. Williams and P. Milne. 2004. On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. Data Mining and Knowledge Discovery 8 3 (2004).","DOI":"10.1023\/B:DAMI.0000023676.72185.7c"}],"event":{"name":"HotSoS '20: Hot Topics in the Science of Security","acronym":"HotSoS '20","location":"Lawrence Kansas"},"container-title":["Proceedings of the 7th Symposium on Hot Topics in the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384217.3386397","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3384217.3386397","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:24Z","timestamp":1750197804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384217.3386397"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,21]]},"references-count":12,"alternative-id":["10.1145\/3384217.3386397","10.1145\/3384217"],"URL":"https:\/\/doi.org\/10.1145\/3384217.3386397","relation":{},"subject":[],"published":{"date-parts":[[2020,9,21]]},"assertion":[{"value":"2020-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}