Joel W. Reed
Oak Ridge National Laboratory
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Joel W. Reed.
international conference on machine learning and applications | 2006
Joel W. Reed; Yu Jiao; Thomas E. Potok; Brian A. Klump; Mark T. Elmore; Ali R. Hurson
In this paper, we propose a new term weighting scheme called term frequency-inverse corpus frequency (TF-ICF). It does not require term frequency information from other documents within the document collection and thus, it enables us to generate the document vectors of N streaming documents in linear time. In the context of a machine learning application, unsupervised document clustering, we evaluated the effectiveness of the proposed approach in comparison to five widely used term weighting schemes through extensive experimentation. Our results show that TF-ICF can produce document clusters that are of comparable quality as those generated by the widely recognized term weighting schemes and it is significantly faster than those methods
hawaii international conference on system sciences | 2002
Thomas E. Potok; Mark T. Elmore; Joel W. Reed; Nagiza F. Samatova
How to organize and classify large amounts of heterogeneous information accessible over the Internet is a major problem faced by industry, government, and military organizations. XML is clearly a potential solution to this problem, however, a significant challenge is how to automatically convert information currently expressed in a standard HTML format to an XML format. Within the Virtual Information Processing Agent Research (VIPAR) project, we have developed a process using Internet ontologies and intelligent software agents to perform automatic HTML to XML conversion for Internet newspapers. The VIPAR software is based on a number of significant research breakthroughs. Most notably, the ability for intelligent agents to use a flexible RDF ontology to transform HTML documents to XML tagged documents. The VIPAR system is currently deployed at the USA Pacific Command, Camp Smith, HI, traversing up to 17 Internet newspapers daily.
hawaii international conference on system sciences | 2005
Travis D. Breaux; Joel W. Reed
The tools to analyze and visualize information from multiple, heterogeneous sources have often relied on innovations in statistical methods. The results from purely statistical methods, however, overlook relevant semantic features present within natural language and text-based information. Emerging research in ontology languages (e.g. RDF, RDFS, SUO-KIF, and OWL) offers promising avenues for overcoming these limitations by leveraging existing and future libraries of meta-data and semantic mark-up. Using semantic features (e.g. hypernyms, meronyms, synonyms, etc.) encoded in ontology languages, methods such as keyword search and clustering can be augmented to analyze and visualize documents at conceptually richer levels. We present findings from a hierarchical clustering system modified for ontological indexing and run on a topic-centric test collection of documents each with fewer than 200 words. Our findings show that ontologies can impose a complete interpretation or subjective clustering onto a document set that is at least as good as meta-word search.
arXiv: Cryptography and Security | 2016
Christopher R. Harshaw; Robert A. Bridges; Michael D. Iannacone; Joel W. Reed; John R. Goodall
This paper introduces a novel graph-analytic approach for detecting anomalies in network flow data called GraphPrints. Building on foundational network-mining techniques, our method represents time slices of traffic as a graph, then counts graphlets---small induced subgraphs that describe local topology. By performing outlier detection on the sequence of graphlet counts, anomalous intervals of traffic are identified, and furthermore, individual IPs experiencing abnormal behavior are singled-out. Initial testing of GraphPrints is performed on real network data with an implanted anomaly. Evaluation shows false positive rates bounded by 2.84% at the time-interval level, and 0.05% at the IP-level with 100% true positive rates at both.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research | 2017
Kelly M. T. Huffer; Joel W. Reed
In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server). Using network flow data, already collected by most enterprises, we developed a proof-of-concept tool that discovers the roles of a system using both clustering and categorization techniques. The tools role information would allow cyber analysts to detect consequential changes in the network, initiate incident response plans, and optimize their security posture. The results of this proof-of-concept tool proved to be quite accurate on three real data sets. We will present the algorithms used in the tool, describe the results of preliminary testing, provide visualizations of the results, and discuss areas for future work. Without this kind of situational awareness, cyber analysts cannot quickly diagnose an attack or prioritize remedial actions.
Archive | 2002
Thomas E. Potok; Mark T. Elmore; Joel W. Reed; Jim N. Treadwell; Nagiza F. Samatova
Archive | 2002
Thomas E. Potok; Mark T. Elmore; Joel W. Reed; Jim N. Treadwell; Nagiza F. Samatova
Archive | 2004
Thomas E. Potok; Joel W. Reed; Mark T. Elmore; Jim N. Treadwell
Scientia Forestalis | 2003
Thomas E. Potok; Mark T. Elmore; Joel W. Reed; Frederick T. Sheldon
international conference on big data | 2017
Robert A. Bridges; Jessie D. Jamieson; Joel W. Reed