John Hanley

john_hanley.jpg

https://www.linkedin.com/in/jhanley714/

GMail.com: jhanley714

publications

Supervised and unsupervised methods to detect insider threat from enterprise social and online activity data, G. Gavai, K. Sricharan, D. Gunning, J. Hanley, M. Singhal, R. Rolleston, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 6 no. 4, pp 47-63, 2015

Temporally Coherent Role-Topic Models (TCRTM): Deinterlacing Overlapping Activity Patterns, Evgeniy Bart, Bob Price, John Hanley, Chapter, Machine Learning and Knowledge Discovery in Databases, Volume 9285 of the series Lecture Notes in Computer Science pp 390-405, 29 Aug 2015

Multi-source Anomaly Detection: using across-domain and across-time peer-group consistency checks, Hoda Eldardiry, Kumar Sricharan, Juan Liu, John Hanley, Bob Price, Oliver Brdiczka, Eugene Bart, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 6 June 2014

Multi-domain Information Fusion for Insider Threat Detection, Hoda Eldardiry, Evgeniy Bart, Juan Liu, John Hanley, Bob Price, Oliver Brdiczka, 2013 IEEE Workshop on Research for Insider Threat (WRIT), 24 May 2013

Modeling Attrition in Organizations from Email Communication, Akshay Patil, Juan Liu, Jianqiang Shen, Oliver Brdiczka, Jie Gao, John Hanley, IEEE Conference Publications, 2013 International Conference on Social Computing, pp 331 - 338, DOI: 10.1109/SocialCom.2013.52

Predicting Quitting in the Online Yammer Space, Gaurang Gavai, Sricharan Kumar, Juan Liu, Oliver Brdiczka, John Hanley, 8th SNA-KDD workshop, June 2014

Detecting Employee Churn from Enterprise Social and Online Activity Data, Kumar Sricharan, Gaurang Gavai, Dave Gunning, Rob Rolleston, Mudita Singhal, John Hanley, Juan Julia Liu, Oliver Brdiczka, 2015 ASE Eighth International Conference on Social Computing, 18 Aug 2015

Detecting Insider Threat from Enterprise Social and Online Activity Data, Kumar Sricharan, Gaurang Gavai, Dave Gunning, Rob Rolleston, Mudita Singhal, John Hanley, Juan Julia Liu, Oliver Brdiczka, 7th ACM CCS International Workshop on Managing Insider Security Threats, 12 Oct 2015

Diagnosing Advanced Persistent Threats, Rui Abreu, Daniel G. Bobrow, Hoda Eldardiry, Alexander Feldman, John Hanley, Tomonori Honda, Johan de Kleer, Alexandre Perez, Dave Archer, David Burke, Proceedings of the 26th International Workshop on Principles of Diagnosis, 3 Sep 2015

Challenges for qualitative reasoning for engineering design, Daniel G. Bobrow, Matthew Klenk, Johan de Kleer, Bill Janssen, John Hanley, Proceedings of the 26th International Workshop on Qualitative Reasoning, 16 July 2012.

Placing Qualitative Reasoning in the Design Process, Matthew Klenk, Daniel G. Bobrow, Johan de Kleer, John Hanley, Bill Janssen, 26th International Workshop on Qualitative Reasoning, 16 July 2012

1. Multi-modal sales applications, U.S. patent 7603291

2. Staggering and feathering of demand response and energy supply change in a managed electrical system, U.S. patent 8880235

3. Using planning to control demand response and supply choices in a managed electrical system, U.S. patent 8924035

4. Cover sheets used for diagnosis, U.S. patent 9036174

5. Using model communication as a protocol in a managed electrical system, U.S. patent 9081373

6. Long-term resource provisioning with cascading allocations, U.S. patent 9092265

7. Hierarchical model communication and control in a managed electrical system, U.S. patent 9411329

8. QoS aware balancing in data centers, U.S. patent 9374314

9. Design systems and methods for hybrid vehicles with a high degree of hybridization, U.S. patent 9676382