Tags Archive
cybersecurity incident attribution
- Where is the Equation Group?: Attributing malware to state actors based on compile time.
Benjamin J. Radford
March 14, 2015cybersecurity incident detection
- Anomaly Detection in Cyber Network Data Using a Cyber Language Approach
American Statistical Association's Symposium on Data Science and Statistics 2018
Bartley D. Richardson, Benjamin J. Radford, Shawn E. Davis, Keegan Hines, David Pekarek
Download Paper.September 8, 2018- Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic
American Statistical Association's Symposium on Data Science and Statistics 2018
Benjamin J. Radford, Bartley D. Richardson, Shawn E. Davis
Download Paper.May 9, 2018- Network Traffic Anomaly Detection Using Recurrent Neural Networks
Procedings of the 2017 National Symposium on Sensor and Data Fusion
Benjamin J. Radford, Leonardo M. Apolonio, Antonio J. Trias, and Jim A. Simpson
Download Paper.March 3, 2018- Electiogeddon: Did e-voting swing the 2016 US presidential election?
Benjamin J. Radford
November 24, 2016event extraction
- Automated Dictionary Generation for Political Event Coding
Political Science Research and Methods
Benjamin J. Radford
Download Paper.February 1, 2021- Seeing the Forest and the Trees: Detection and Cross-Document Coreference Resolution of Militarized Interstate Disputes
Proceedings of AESPEN 2020, LREC 2020
Benjamin J. Radford
Download Paper.May 16, 2020- Multitask Models for Supervised Protest Detection in Texts
Working Notes of CLEF 2019
Benjamin J. Radford
Download Paper.July 7, 2019- Comparing GDELT and ICEWS Event Data
Online
Michael D. Ward, Andreas Beger, Josh Cutler, Matthew Dickenson, Cassy Dorff, Benjamin J. Radford
Download Paper.October 15, 2013machine learning
- Automated Dictionary Generation for Political Event Coding
Political Science Research and Methods
Benjamin J. Radford
Download Paper.February 1, 2021- Seeing the Forest and the Trees: Detection and Cross-Document Coreference Resolution of Militarized Interstate Disputes
Proceedings of AESPEN 2020, LREC 2020
Benjamin J. Radford
Download Paper.May 16, 2020- Multitask Models for Supervised Protest Detection in Texts
Working Notes of CLEF 2019
Benjamin J. Radford
Download Paper.July 7, 2019- Anomaly Detection in Cyber Network Data Using a Cyber Language Approach
American Statistical Association's Symposium on Data Science and Statistics 2018
Bartley D. Richardson, Benjamin J. Radford, Shawn E. Davis, Keegan Hines, David Pekarek
Download Paper.September 8, 2018- mmtsne for R on CRAN: An R Package for Multiple Maps t-SNE
Open Source Software
Benjamin J. Radford
Download Paper.July 15, 2018- Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic
American Statistical Association's Symposium on Data Science and Statistics 2018
Benjamin J. Radford, Bartley D. Richardson, Shawn E. Davis
Download Paper.May 9, 2018- Network Traffic Anomaly Detection Using Recurrent Neural Networks
Procedings of the 2017 National Symposium on Sensor and Data Fusion
Benjamin J. Radford, Leonardo M. Apolonio, Antonio J. Trias, and Jim A. Simpson
Download Paper.March 3, 2018- Ordered Probit Regression with Integrated Variable Selection
Benjamin J. Radford
June 18, 2015- Mixtures of Linear Models: With example code in R.
Benjamin J. Radford
April 19, 2015political forecasting
- Comparing GDELT and ICEWS Event Data
Online
Michael D. Ward, Andreas Beger, Josh Cutler, Matthew Dickenson, Cassy Dorff, Benjamin J. Radford
Download Paper.October 15, 2013security studies & war
- Seeing the Forest and the Trees: Detection and Cross-Document Coreference Resolution of Militarized Interstate Disputes
Proceedings of AESPEN 2020, LREC 2020
Benjamin J. Radford
Download Paper.May 16, 2020- Multitask Models for Supervised Protest Detection in Texts
Working Notes of CLEF 2019
Benjamin J. Radford
Download Paper.July 7, 2019- Enemy at the Gates: Variation in Economic Growth from Civil Conflict
Journal of Conflict Resolution
Shahryar Minhas and Benjamin J. Radford
Download Paper.November 1, 2017- Friends and Neighbors in the Arms Trade: Can Illicit Arms Sales to Embargoed States be Inferred from Neighboring State Behaviors?
Online
Benjamin J. Radford
Download Paper.February 25, 2014- Comparing GDELT and ICEWS Event Data
Online
Michael D. Ward, Andreas Beger, Josh Cutler, Matthew Dickenson, Cassy Dorff, Benjamin J. Radford
Download Paper.October 15, 2013 - Multitask Models for Supervised Protest Detection in Texts
- Seeing the Forest and the Trees: Detection and Cross-Document Coreference Resolution of Militarized Interstate Disputes
- Seeing the Forest and the Trees: Detection and Cross-Document Coreference Resolution of Militarized Interstate Disputes
- Seeing the Forest and the Trees: Detection and Cross-Document Coreference Resolution of Militarized Interstate Disputes
- Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic
- Anomaly Detection in Cyber Network Data Using a Cyber Language Approach