Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails