Follow
Bronwyn Woods
Bronwyn Woods
Duo Security
Verified email at duosecurity.com
Title
Cited by
Cited by
Year
Articulatory feature-based methods for acoustic and audio-visual speech recognition: Summary from the 2006 JHU summer workshop
K Livescu, O Cetin, M Hasegawa-Johnson, S King, C Bartels, N Borges, ...
2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007
1622007
Formative essay feedback using predictive scoring models
B Woods, D Adamson, S Miel, E Mayfield
Proceedings of the 23rd ACM SIGKDD international conference on knowledge …, 2017
732017
Data mining for efficient collaborative information discovery
B Woods, SJ Perl, B Lindauer
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative …, 2015
202015
This malware looks familiar: Laymen identify malware run-time similarity with chernoff faces and stick figures
N VanHoudnos, W Casey, D French, B Lindauer, E Kanal, E Wright, ...
10th EAI International Conference on Bio-inspired Information and …, 2017
132017
Effect of network infrastructure factors on information system risk judgments
JA Cowley, FL Greitzer, B Woods
Computers & Security 52, 142-158, 2015
92015
Beyond automated essay scoring: Forecasting and improving outcomes in middle and high school writing
E Mayfield, D Adamson, B Woods, S Miel, S Butler, J Crivelli
Companion proceedings of the 8th international conference on learning …, 2018
72018
MEG, RFFTs, and the hunt for high frequency oscillations
J Wang, B Woods, WF Eddy
2009 2nd International Congress on Image and Signal Processing, 1-5, 2009
72009
Expanding search in the space of empirical ML
B Woods
NeurIPS workshop on Critiquing and Correcting Trends in Machine Learning, 2018
42018
Spatio-temporal patterns in multi-electrode array local field potential recordings
B Woods
arXiv preprint arXiv:1501.00230, 2015
42015
Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis
J Cowley, FL Greitzer, B Woods
Security Informatics 4, 1-16, 2015
32015
Discovering patterns of activity in unstructured incident reports at scale
B Woods, S Perl
2015
Deep Focus: Increasing User" Depth of Field" to Improve Threat Detection (Oxford workshop poster)
WR Claycomb
2014
The system can't perform the operation now. Try again later.
Articles 1–12