Intelligent threat detection and response systems for safeguarding cloud-hosted electronic health records from cyber attacks (Record no. 22571)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | a |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250403095350.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250403b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | AIKTC-KRRC |
| Transcribing agency | AIKTC-KRRC |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 25770 |
| Author | Akinola, Omolola |
| 245 ## - TITLE STATEMENT | |
| Title | Intelligent threat detection and response systems for safeguarding cloud-hosted electronic health records from cyber attacks |
| 250 ## - EDITION STATEMENT | |
| Volume, Issue number | Vol.14(4), Jul-Aug |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Haryana |
| Name of publisher, distributor, etc. | IOSR - International Organization of Scientific Research |
| Year | 2024 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pagination | 1-10p. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | As more people use cloud-based electronic health record (EHR) systems, they make healthcare better, but they<br/>also make it easier for cybercriminals to attack. This article describes a system that uses artificial intelligence<br/>(AI) and machine learning (ML) to intelligently watch cloud-hosted EHR environments for bad behaviour, find<br/>cyberattacks, and automatically take the right steps to stop them. Using supervised machine learning models that<br/>have been trained on known threat indicators, the suggested framework constantly looks at log and system data.<br/>As soon as an attack is found, established containment and mitigation steps are carried out naturally to lower the<br/>harm. The test results show that the framework can correctly identify common EHR attack methods like<br/>ransomware and data theft, as well as quickly and effectively protect private patient data. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 4619 |
| Topical term or geographic name entry element | EXTC Engineering |
| 773 0# - HOST ITEM ENTRY | |
| Title | IOSR journal of VLSI and signal processing (IOSR-JVSP) |
| Place, publisher, and date of publication | Gurgaon International Organization Of Scientific Research (IOSR) |
| International Standard Serial Number | 2319 – 4197 |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| URL | https://www.iosrjournals.org/iosr-jvlsi/papers/vol14-issue4/A14040110.pdf |
| Link text | Click here |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Articles Abstract Database |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | School of Engineering & Technology | School of Engineering & Technology | Archieval Section | 03/04/2025 | 2025-0511 | 03/04/2025 | 03/04/2025 | Articles Abstract Database |