Project Results

Published, public results from S2ERC-funded research at Georgetown. If you are a S2ERC affiliate, you have access to these and other results well before the general public.

PSTNtransition

Burger, E., comments at the FCC, in re: Rural Call Completion, WC Docket No. 13-39, at https://www.fcc.gov/ecfs/filing/104180548507226

Stohrer, T., Stewart, A., and Burger, E., Issues, Analysis, and Tools For Rural Call Completion Issues, 27 March 2017. [NOTE: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible.]

Burger, E. and Kieserman, J., Next Generation Caller Identification, 23 June 2016.

Sharing and the Law

Klass, G. and Burger, E., Vendor Truth Serum (poster), High Confidence Software and Systems Conference, 9-10 May 2017.

Sullivan, C. and Burger, E., “In the public interest”: The privacy implications of international business-to-business sharing of cyber-threat intelligence, Computer Law & Security Review: The International Journal of Technology Law and Practice, (33) 1, 2017, pp. 14-29.

Klass, G. and Burger, E., Vendor Truth Serum, 22 September 2016.

CyberISE Economic Project

Lange, R. and Burger, E., Market Implications of Data Breaches, 16 December 2016

Stuntz, Joseph, A Review of Return on Investment for Cybersecurity, 6 May 2014

Stuntz, Joseph, An Analysis of US Government Proposed Cyber Incentives, 7 February 2014

Stuntz, Joseph, Cybersecurity and the Financial Sector, 7 February 2014

CyberISE Taxonomy Project

Asgarli, E. and Burger, E., Symantic Ontologies for Cyber Threat Sharing Standards, 2016 IEEE International Symposium on Technologies for Homeland Security (HST 2016), 10 May 2016

Burger, E., Goodman, M., Kampanakis, P., and Zhu, K., Taxonomy Model for Cyber Threat Intelligence Information Exchange Technologies, First ACM Workshop on Information Sharing and Collaborative Security (WISCS 2014), 3 November 2014

Burger, Eric, A Taxonomy for CyberISE Technology Evaluation, 17 February 2014

ISP Privacy

Burger, E., reply comments at the FCC, in re: Petitions for Reconisderation of the Protecting the Privacy of Customers of Broadband and Other Telecommunications Services Report and Order, WC Docket No. 16-106, at https://ecfsapi.fcc.gov/file/103161885302540/S2ERC%20BIAS%20Reconsideration%20Reply%20Comments.pdf

Burger, E., Pavur, J., and Van Laan, M., comments at the FCC, in re: Protecting the Privacy of Customers of Broadband and Other Telecommunications Services, WC Docket No. 16-106, at http://apps.fcc.gov/ecfs/comment/view?id=60001974396

Burger, E. and Pavur, J., reply comments at the FCC, in re: Protecting the Privacy of Customers of Broadband and Other Telecommunications Services, WC Docket No. 16-106, at https://www.fcc.gov/ecfs/filing/10705641704886

Number Database Transition Analysis

Burger, Eric, Issues and Analysis of a Provider Transition for the NPAC, 22 July 2014

Based on the above paper:
Nakahata, J., ex parte filing at the FCC, in re: Telephone Number Portability, et al., CC Docket No. 95-116, WC Docket Nos. 07-149 & 09-109, at http://apps.fcc.gov/ecfs/comment/view?id=60000974613

HoneyMail Project

Vaidya, T., Burger, E., Sherr, M., and Shields, C., Studying the Pervasiveness of Internet Interception with Honey{POP,SMTP,Telnet} (Poster), USENIX Security 2015, 12 August 2015

Medicine and Software Engineering

Soldaini, L., Edman, W., and Goharian, N., Team GU-IRLAB at CLEF eHealth 2016: Task 3, CEUR Vol-1609 (eHealth 2016), pp. 143-146, Oct 2016

Cohan, A., Meurer, K., and Goharian, N., Temporal Information Processing for Clinical Narratives, In Proceedings of the NAACL HLT 10th international workshop on semantic evaluation Semantic Analysis: Clinical TempEval (SemEval’16), June 2016

Information Retrieval and Software Engineering

Yates, A., Joselow, J., and Goharian, N., The News Cycle’s Influence on Social Media Activity, International AAAI Conference on Web and Social Media (ICWSM). May 2016