Skip to main content

Showing 1–2 of 2 results for author: Chow, C E

.
  1. arXiv:1703.02248  [pdf, other

    cs.CR

    Automated U.S Diplomatic Cables Security Classification: Topic Model Pruning vs. Classification Based on Clusters

    Authors: Khudran Alzhrani, Ethan M. Rudd, C. Edward Chow, Terrance E. Boult

    Abstract: The U.S Government has been the target for cyber-attacks from all over the world. Just recently, former President Obama accused the Russian government of the leaking emails to Wikileaks and declared that the U.S. might be forced to respond. While Russia denied involvement, it is clear that the U.S. has to take some defensive measures to protect its data infrastructure. Insider threats have been th… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

    Comments: Pre-print of camera-ready copy accepted to the 2017 IEEE Homeland Security Technologies (HST) conference

  2. arXiv:1610.06856  [pdf, other

    cs.CR cs.AI cs.CL cs.CY

    Automated Big Text Security Classification

    Authors: Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow

    Abstract: In recent years, traditional cybersecurity safeguards have proven ineffective against insider threats. Famous cases of sensitive information leaks caused by insiders, including the WikiLeaks release of diplomatic cables and the Edward Snowden incident, have greatly harmed the U.S. government's relationship with other governments and with its own citizens. Data Leak Prevention (DLP) is a solution f… ▽ More

    Submitted 21 October, 2016; originally announced October 2016.

    Comments: Pre-print of Best Paper Award IEEE Intelligence and Security Informatics (ISI) 2016 Manuscript

    Journal ref: 2016 IEEE International Conference on Intelligence and Security Informatics (ISI)