published in Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop Workshop