Search Results - "Huffer, Kelly M.T."

  • Showing 1 - 2 results of 2
Refine Results
  1. 1

    Situ: Identifying and Explaining Suspicious Behavior in Networks by Goodall, John R., Ragan, Eric D., Steed, Chad A., Reed, Joel W., Richardson, G. David, Huffer, Kelly M.T., Bridges, Robert A., Laska, Jason A.

    “…Despite the best efforts of cyber security analysts, networked computing assets are routinely compromised, resulting in the loss of intellectual property, the…”
    Get full text
    Journal Article
  2. 2

    Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors by Bridges, Robert A., Huffer, Kelly M. T., Jones, Corinne L., Iannacone, Michael D., Goodall, John R.

    “…We address a crucial element of applied information extraction-accurate identification of basic security entities in text--by evaluating previous methods and…”
    Get full text
    Conference Proceeding