How to Cover up Anomalous Accesses to Electronic Health Records

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fingerprint

Dive into the research topics of 'How to Cover up Anomalous Accesses to Electronic Health Records'. Together they form a unique fingerprint.

Computer Science

Keyphrases