2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery 2015
DOI: 10.1109/cyberc.2015.103
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Classification Lists (Dirty Word Lists) for Automatic Security Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 11 publications
0
16
0
Order By: Relevance
“…Among different contributions, this paper investigates the effects of topic classification prior to security classification, as only assumed in previous works [11], [12]. To the best of our knowledge, the works in [8], [9] and [10] were the first published papers on automatic security classification and the application of machine learning techniques to this problem.…”
Section: Content Scanning For Automatic Security Labelingmentioning
confidence: 99%
See 4 more Smart Citations
“…Among different contributions, this paper investigates the effects of topic classification prior to security classification, as only assumed in previous works [11], [12]. To the best of our knowledge, the works in [8], [9] and [10] were the first published papers on automatic security classification and the application of machine learning techniques to this problem.…”
Section: Content Scanning For Automatic Security Labelingmentioning
confidence: 99%
“…The Digital National Security Archive contains the most comprehensive collection of declassified US government documents available to the public [21]. We base our analysis on documents from the same collection that were used in [8], [9] and [10]. This collection was originally chosen because it contains a mix of both classified and unclassified documents from three unrelated domains: Years, 1965-1986 Of the 5853 documents available within these three topics, we do not use duplicate documents and documents classes that are very small or have an unsuitable classification [8], [9].…”
Section: A Lexical Corpusmentioning
confidence: 99%
See 3 more Smart Citations