Publications

Refine Results

(Filters Applied) Clear All

BubbleNet: A Cyber Security Dashboard for Visualizing Patterns

Date:
June 6, 2016
Published in:
Proceeding of 2016 Eurographics Conference on Visualization (EuroVis)
Type:
Conference Paper
Topic:

Summary

The field of cyber security is faced with ever-expanding amounts of data and a constant barrage of cyber attacks. Within this space, we have designed BubbleNet as a cyber security dashboard to help network analysts identify and summarize patterns within the data.

A Fun and Engaging Interface for Crowdsourcing Named Entities(275.07 KB)

Date:
May 23, 2016
Published in:
Proceedings of Tenth International Conference on Language Resources and Evaluation (LREC 2016)
Type:
Conference Paper

Summary

In this paper, we provide a case study in using crowd sourcing to curate an in-domain corpus for named entity recognition, a common problem in natural language processing. In particular, we present our use of fun, engaging user interfaces as a way to entice workers to partake in our crowd sourcing task while avoiding inflating our payments in a way that would attract more mercenary workers than conscientious ones.

Operational Assessment of Keyword Search on Oral History(313.43 KB)

Date:
May 23, 2016
Published in:
Proceedings of Tenth International Conference on Language Resources and Evaluation (LREC 2016)
Type:
Conference Paper

Summary

This project assesses the resources necessary to make oral history searchable by means of automatic speech recognition (ASR). We assess the impact of dataset size, word error rate and term-weighted value on human search capability through an information retrieval task on Mechanical Turk, we use English oral history data collected by Story Corps, and we show comparable search performance using a standard speech recognition system.

Feedback-Based Social Media Filtering Tool for Improved Situational Awareness(421.81 KB)

Date:
May 10, 2016
Published in:
Proceedings of IEEE Symposium on Technologies for Homeland Security
Type:
Conference Paper

Summary

This paper describes a feature-rich model of data relevance, designed to aid first responder retrieval of useful information from social media sources during disasters or emergencies. The approach is meant to address the failure of traditional keyword-based methods to sufficiently suppress clutter during retrieval.

Cryptography for Big Data Security(538.97 KB)

Date:
May 3, 2016
Published in:
Chapter in Big Data: Storage, Sharing, and Security, Fei Hu (editor), Auerbach Publications
Type:
Book Chapter
Topic:

Summary

New and improved security tools are needed to protect systems collecting and handling big data to allow applications to reap the benefits of big data analysis without the risk of such catastrophic attacks. Modern cryptography offers many powerful technologies that can help protect big data applications throughout the data lifecycle, as it is being collected, stored in repositories, and processed by analysts. In this chapter, we give a brief survey of several of these technologies and explain how they can help big data security.

A Reverse Approach to Named Entity Extraction and Linking in Microposts(370.29 KB)

Date:
April 11, 2016
Published in:
Proceedings of 6th workshop on Making Sense of Microposts (#Microposts2016)
Type:
Conference Paper

Summary

In this paper, we present a pipeline for named entity extraction and linking that is designed specifically for noisy, grammatically inconsistent domains where traditional named entity techniques perform poorly. Our approach leverages a large knowledge base to improve entity recognition, while maintaining the use of traditional NER to identify mentions that are not co-referent with any entities in the knowledge base.

Named Entity Recognition in 140 Characters or Less(158.84 KB)

Date:
April 11, 2016
Published in:
Proceedings of 6th workshop on Making Sense of Microposts (#Microposts2016)
Type:
Conference Paper

Summary

In this paper, we explore the problem of recognizing named entities in microposts, a genre with notoriously little context surrounding each named entity and inconsistent use of grammar, punctuation, capitalization, and spelling conventions by authors. This paper presents the MIT Information Extraction Toolkit (MITIE) and explores its adaptability to the micropost genre.

Side Channel Authenticity Discriminant Analysis for Device Class Identification(247.57 KB)

Date:
March 16, 2016
Published in:
Proceedings of GOMACTech 2016, Orlando, Fla.
Type:
Conference Paper

Summary

Counterfeit microelectronics present a significant challenge to commercial and defense supply chains. Many modern anti-counterfeit strategies rely on manufacturer cooperation to include additional identification components. We instead propose Side Channel Authenticity Discriminant Analysis (SICADA) to leverage physical phenomena manifesting from device operation to match suspect parts to a class of authentic parts.

2015 Operational Observation of CoSPA and Traffic Flow Impact(4.3 MB)

Date:
March 15, 2016
Published in:
Project Report ATC-429, MIT Lincoln Laboratory
Type:
Project Report
Topic:

Summary

This technical report summarizes the operational observations recorded by MIT Lincoln Laboratory (MIT LL) aviation subject matter experts during the period 13 April to 31 October 2015. Three separate field observations were conducted over four convective weather days across the eastern National Airspace System (NAS) with visits to five separate FAA facilities and five different airline operation centers.

SoK: Privacy on Mobile Devices – It’s Complicated(1.07 MB)

Date:
March 2, 2016
Published in:
Proceedings of2016 Privacy Enhancing Technologies Symposium (PETS)
Type:
Conference Paper
Topic:

Summary

Modern mobile devices place a wide variety of sensors and services within the personal space of their users. As a result, these devices are capable of transparently monitoring many sensitive aspects of these users’ lives (e.g., location, health, or correspondences). Users typically trade access to this data for convenient applications and features, in many cases without a full appreciation of the nature and extent of the information that they are exposing to a variety of third parties.