Managing Semantic Content for the Web
IEEE Internet Computing
Determining Semantic Similarity among Entity Classes from Different Ontologies
IEEE Transactions on Knowledge and Data Engineering
Ρ-Queries: enabling querying for semantic associations on the semantic web
WWW '03 Proceedings of the 12th international conference on World Wide Web
A hybrid approach for searching in the semantic web
Proceedings of the 13th international conference on World Wide Web
Ranking Complex Relationships on the Semantic Web
IEEE Internet Computing
On off-topic access detection in information systems
Proceedings of the 14th ACM international conference on Information and knowledge management
Altering document term vectors for classification: ontologies as expectations of co-occurrence
Proceedings of the 16th international conference on World Wide Web
SPARQLeR: Extended Sparql for Semantic Association Discovery
ESWC '07 Proceedings of the 4th European conference on The Semantic Web: Research and Applications
Journal of Biomedical Informatics
Improving classification based off-topic search detection via category relationships
Proceedings of the 2009 ACM symposium on Applied Computing
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Informed recognition in software watermarking
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
BRAHMS: a workbench RDF store and high performance memory system for semantic association discovery
ISWC'05 Proceedings of the 4th international conference on The Semantic Web
Semantic analytics visualization
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Cost-Sensitive access control for illegitimate confidential access by insiders
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Covering based granular computing for conflict analysis
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Guest editorial: A brief overview of data leakage and insider threats
Information Systems Frontiers
Hi-index | 0.00 |
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the research and prototyping of a system that takes an ontological approach, and is primarily targeted for use by the intelligence community. Our approach utilizes the notion of semantic associations and their discovery among a collection of heterogeneous documents. We highlight our contributions in (graphically) capturing the scope of the investigation assignment of an intelligence analyst by referring to classes and relationships of an ontology; in computing a measure of the relevance of documents accessed by an analyst with respect to his/her assignment; and by describing the components of our system that have provided early yet promising results, and which will be further evaluated more extensively based on domain experts and sponsor inputs.