UMBC ebiquity

Results for tags: cybersecurity


Past Projects

 Automatic Interpretation of Log Files.
 Automatic Interpretation of Log Files.
 Semantic Situational Awareness for Intrusion Detection.


13 Refereed Publications


1. "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", International Symposium on Foundations of Open Source Intelligence and Security Informatics, August 2016, 635 downloads.

2. "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", IEEE Conference on Information Reuse and Integration,, July 2016, 288 downloads.

3. "Semantic Interpretation of Structured Log Files", 17th IEEE International Conference on Information Reuse and Integration, July 2016, 227 downloads.


4. "Cybersecurity Challenges to American State and Local Governments", 15th European Conference on eGovernment, June 2015.


5. "Extracting cybersecurity related linked data from text", Proceedings of the 7th IEEE International Conference on Semantic Computing, September 2013, 972 downloads.

6. "Detecting Data Exfiltration by Integrating Information Across Layers", 14th IEEE International Conference on Information Reuse and Integration, August 2013, 824 downloads.

7. "Linked Data for Software Security Concepts and Vulnerability Descriptions", University of Maryland Baltimore County, July 2013, 773 downloads.


8. "A Collaborative Approach to Situational Awareness for CyberSecurity", 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 994 downloads.

9. "A Semantic Approach to Situational Awareness for Intrusion Detection", Proceedings of the National Symposium on Moving Target Research, June 2012, 1504 downloads.

10. "A Knowledge-Based Approach To Intrusion Detection Modeling", Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1414 downloads.

11. "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 784 downloads.


12. "Extracting Information about Security Vulnerabilities from Web Text", Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 1974 downloads.


13. "A Target-Centric Ontology for Intrusion Detection", Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 695 downloads, 50 citations.

1 Non-Refereed Publication


1. "Supporting Situationally Aware Cybersecurity Systems", University of Maryland Baltimore County, September 2015, 464 downloads.

Additional Resources


1. Annotations of Cybersecurity blogs and articles


1. Extracting Cybersecurity related entities, terms and concepts from text.
2. situational awareness for cybersecurity

1. Are you in control or being controlled in your vehicle?
    on Monday, October 26, 2015 from 10:30AM to 11:30AM.

2. Extracting cybersecurity related entities, terms and concepts from text
    on Tuesday, May 28, 2013 from 10:30AM to 12:30PM.

3. MS defense: Social Media Analytics: Digital Footprints
    on Monday, May 13, 2013 from 10:30AM to 12:00PM.

4. A multilayer framework to catch data exfiltration
    on Monday, April 08, 2013 from 10:30AM to 11:30AM.

5. talk: Self-sustainable Cyber-physical System Design
    on Tuesday, March 13, 2012 from 01:00PM to 01:00PM.


Subscribe to RSS feed

Bookmark this page