Cyc: toward programs with common sense
Communications of the ACM
Formal ontology, common sense and cognitive science
International Journal of Human-Computer Studies - Special issue: the role of formal ontology in the information technology
Knowledge representation: logical, philosophical and computational foundations
Knowledge representation: logical, philosophical and computational foundations
Natural language processing for information assurance and security: an overview and implementations
Proceedings of the 2000 workshop on New security paradigms
Understanding ontological engineering
Communications of the ACM - Supporting community and building social capital
Ontology in information security: a useful theoretical foundation and methodological tool
Proceedings of the 2001 workshop on New security paradigms
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
COLING-Roadmap '02 Proceedings of the 2002 COLING workshop: A roadmap for computational linguistics - Volume 13
The genesis of a script for Bankruptcy in ontological semantics
HLT-NAACL-TEXTMEANING '03 Proceedings of the HLT-NAACL 2003 workshop on Text meaning - Volume 9
Position: "insider" is relative
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
Combating the Insider Cyber Threat
IEEE Security and Privacy
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention
Communications of the ACM - The Status of the P versus NP Problem
ELICIT: a system for detecting insiders who violate need-to-know
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Understanding insiders: An analysis of risk-taking behavior
Information Systems Frontiers
Advanced Engineering Informatics
On the Transdisciplinary Field of Humor Research
Journal of Integrated Design & Process Science
Hi-index | 0.00 |
This paper describes a computational system for detecting unintentional inferences in casual unsolicited and unrestricted verbal output of individuals, potentially responsible for leaked classified information to people with unauthorized access. Uses of the system for cases of insider threat and/or social engineering are discussed. Brief introductions to Ontological Semantic Technology and Natural Language Information Assurance and Security are included.