UMBC ebiquity

Results for tags: cybersecurity

Projects

Past Projects

 Automatic Interpretation of Log Files.
 Automatic Interpretation of Log Files.
 Semantic Situational Awareness for Intrusion Detection.


 
 
Publications

14 Refereed Publications

2016

1. "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", International Symposium on Foundations of Open Source Intelligence and Security Informatics, August 2016, 672 downloads.

2. "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", IEEE Conference on Information Reuse and Integration,, July 2016, 311 downloads.

3. "Semantic Interpretation of Structured Log Files", 17th IEEE International Conference on Information Reuse and Integration, July 2016, 245 downloads.

2015

4. "Cybersecurity Challenges to American State and Local Governments", 15th European Conference on eGovernment, June 2015.

5. "Cybersecurity Challenges to American State and Local Governments", 15th European Conference on eGovernment, June 2015, 31 downloads.

2013

6. "Extracting cybersecurity related linked data from text", Proceedings of the 7th IEEE International Conference on Semantic Computing, September 2013, 1003 downloads.

7. "Detecting Data Exfiltration by Integrating Information Across Layers", 14th IEEE International Conference on Information Reuse and Integration, August 2013, 836 downloads.

8. "Linked Data for Software Security Concepts and Vulnerability Descriptions", University of Maryland Baltimore County, July 2013, 785 downloads.

2012

9. "A Collaborative Approach to Situational Awareness for CyberSecurity", 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1010 downloads.

10. "A Semantic Approach to Situational Awareness for Intrusion Detection", Proceedings of the National Symposium on Moving Target Research, June 2012, 1530 downloads.

11. "A Knowledge-Based Approach To Intrusion Detection Modeling", Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1431 downloads.

12. "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 797 downloads.

2011

13. "Extracting Information about Security Vulnerabilities from Web Text", Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 1994 downloads.

2003

14. "A Target-Centric Ontology for Intrusion Detection", Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 708 downloads, 50 citations.

1 Non-Refereed Publication

2015

1. "Supporting Situationally Aware Cybersecurity Systems", University of Maryland Baltimore County, September 2015, 501 downloads.


 
 
Additional Resources

Dataset

1. Annotations of Cybersecurity blogs and articles

Presentation

1. Extracting Cybersecurity related entities, terms and concepts from text.
2. situational awareness for cybersecurity
 
 
Events

1. Are you in control or being controlled in your vehicle?
    on Monday, October 26, 2015 from 10:30AM to 11:30AM.

2. Extracting cybersecurity related entities, terms and concepts from text
    on Tuesday, May 28, 2013 from 10:30AM to 12:30PM.

3. MS defense: Social Media Analytics: Digital Footprints
    on Monday, May 13, 2013 from 10:30AM to 12:00PM.

4. A multilayer framework to catch data exfiltration
    on Monday, April 08, 2013 from 10:30AM to 11:30AM.

5. talk: Self-sustainable Cyber-physical System Design
    on Tuesday, March 13, 2012 from 01:00PM to 01:00PM.


 
 

Subscribe to RSS feed

Bookmark this page