Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Joel W. Reed is active.

Publication


Featured researches published by Joel W. Reed.


international conference on machine learning and applications | 2006

TF-ICF: A New Term Weighting Scheme for Clustering Dynamic Data Streams

Joel W. Reed; Yu Jiao; Thomas E. Potok; Brian A. Klump; Mark T. Elmore; Ali R. Hurson

In this paper, we propose a new term weighting scheme called term frequency-inverse corpus frequency (TF-ICF). It does not require term frequency information from other documents within the document collection and thus, it enables us to generate the document vectors of N streaming documents in linear time. In the context of a machine learning application, unsupervised document clustering, we evaluated the effectiveness of the proposed approach in comparison to five widely used term weighting schemes through extensive experimentation. Our results show that TF-ICF can produce document clusters that are of comparable quality as those generated by the widely recognized term weighting schemes and it is significantly faster than those methods


hawaii international conference on system sciences | 2002

An ontology-based HTML to XML conversion using intelligent agents

Thomas E. Potok; Mark T. Elmore; Joel W. Reed; Nagiza F. Samatova

How to organize and classify large amounts of heterogeneous information accessible over the Internet is a major problem faced by industry, government, and military organizations. XML is clearly a potential solution to this problem, however, a significant challenge is how to automatically convert information currently expressed in a standard HTML format to an XML format. Within the Virtual Information Processing Agent Research (VIPAR) project, we have developed a process using Internet ontologies and intelligent software agents to perform automatic HTML to XML conversion for Internet newspapers. The VIPAR software is based on a number of significant research breakthroughs. Most notably, the ability for intelligent agents to use a flexible RDF ontology to transform HTML documents to XML tagged documents. The VIPAR system is currently deployed at the USA Pacific Command, Camp Smith, HI, traversing up to 17 Internet newspapers daily.


hawaii international conference on system sciences | 2005

Using Ontology in Hierarchical Information Clustering

Travis D. Breaux; Joel W. Reed

The tools to analyze and visualize information from multiple, heterogeneous sources have often relied on innovations in statistical methods. The results from purely statistical methods, however, overlook relevant semantic features present within natural language and text-based information. Emerging research in ontology languages (e.g. RDF, RDFS, SUO-KIF, and OWL) offers promising avenues for overcoming these limitations by leveraging existing and future libraries of meta-data and semantic mark-up. Using semantic features (e.g. hypernyms, meronyms, synonyms, etc.) encoded in ontology languages, methods such as keyword search and clustering can be augmented to analyze and visualize documents at conceptually richer levels. We present findings from a hierarchical clustering system modified for ontological indexing and run on a topic-centric test collection of documents each with fewer than 200 words. Our findings show that ontologies can impose a complete interpretation or subjective clustering onto a document set that is at least as good as meta-word search.


arXiv: Cryptography and Security | 2016

GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection

Christopher R. Harshaw; Robert A. Bridges; Michael D. Iannacone; Joel W. Reed; John R. Goodall

This paper introduces a novel graph-analytic approach for detecting anomalies in network flow data called GraphPrints. Building on foundational network-mining techniques, our method represents time slices of traffic as a graph, then counts graphlets---small induced subgraphs that describe local topology. By performing outlier detection on the sequence of graphlet counts, anomalous intervals of traffic are identified, and furthermore, individual IPs experiencing abnormal behavior are singled-out. Initial testing of GraphPrints is performed on real network data with an implanted anomaly. Evaluation shows false positive rates bounded by 2.84% at the time-interval level, and 0.05% at the IP-level with 100% true positive rates at both.


Proceedings of the 12th Annual Conference on Cyber and Information Security Research | 2017

Situational awareness of network system roles (SANSR)

Kelly M. T. Huffer; Joel W. Reed

In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server). Using network flow data, already collected by most enterprises, we developed a proof-of-concept tool that discovers the roles of a system using both clustering and categorization techniques. The tools role information would allow cyber analysts to detect consequential changes in the network, initiate incident response plans, and optimize their security posture. The results of this proof-of-concept tool proved to be quite accurate on three real data sets. We will present the algorithms used in the tool, describe the results of preliminary testing, provide visualizations of the results, and discuss areas for future work. Without this kind of situational awareness, cyber analysts cannot quickly diagnose an attack or prioritize remedial actions.


Archive | 2002

Method for gathering and summarizing internet information

Thomas E. Potok; Mark T. Elmore; Joel W. Reed; Jim N. Treadwell; Nagiza F. Samatova


Archive | 2002

System for gathering and summarizing internet information

Thomas E. Potok; Mark T. Elmore; Joel W. Reed; Jim N. Treadwell; Nagiza F. Samatova


Archive | 2004

Agent-based method for distributed clustering of textual information

Thomas E. Potok; Joel W. Reed; Mark T. Elmore; Jim N. Treadwell


Scientia Forestalis | 2003

VIPAR: Advanced Information Agents discovering knowledge in an open and changing environment

Thomas E. Potok; Mark T. Elmore; Joel W. Reed; Frederick T. Sheldon


international conference on big data | 2017

Setting the threshold for high throughput detectors: A mathematical approach for ensembles of dynamic, heterogeneous, probabilistic anomaly detectors

Robert A. Bridges; Jessie D. Jamieson; Joel W. Reed

Collaboration


Dive into the Joel W. Reed's collaboration.

Top Co-Authors

Avatar

Mark T. Elmore

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Thomas E. Potok

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Jim N. Treadwell

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Nagiza F. Samatova

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

Robert A. Bridges

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

John R. Goodall

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Kelly M. T. Huffer

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Nagiza Faridovna Samatova

United States Department of Energy

View shared research outputs
Top Co-Authors

Avatar

Ali R. Hurson

Missouri University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Brian A. Klump

Oak Ridge National Laboratory

View shared research outputs
Researchain Logo
Decentralizing Knowledge