UMBC ebiquity

Results for tags: intrusion detection


Past Projects

 Distributed Trust Management in Mobile Ad Hoc Networks.
 Intrusion Detection.
 Security in Battlefield MANETs.
 Semantic Situational Awareness for Intrusion Detection.


19 Refereed Publications


1. "Detecting Botnets Using a Collaborative Situational-aware IDPS", Second International Conference on Information Systems Security and Privacy, February 2016, 479 downloads.


2. "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Distributed and Parallel Databases, June 2013, 759 downloads.


3. "A Semantic Approach to Situational Awareness for Intrusion Detection", Proceedings of the National Symposium on Moving Target Research, June 2012, 1545 downloads.

4. "A Knowledge-Based Approach To Intrusion Detection Modeling", Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1440 downloads.


5. "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Ad Hoc Networks Journal (ADHOCNET), May 2007, 2459 downloads, 16 citations.


6. "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 2755 downloads, 10 citations.

7. "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", International Journal of Wireless Information Networks, June 2006, 2974 downloads, 5 citations.

8. "Trust in Pervasive Computing", The Handbook of Mobile Middleware , February 2006, 1149 downloads, 1 citation.

9. "Cross-layer Analysis for Detecting Wireless Misbehaviour", IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 3486 downloads, 13 citations.


10. "A Holistic Approach to Secure Sensor Networks", UMBC, August 2005, 2441 downloads.

11. "Secure Routing and Intrusion Detection in Ad Hoc Networks", Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 6366 downloads, 96 citations.


12. "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", University of Maryland, Baltimore County, February 2004, 6470 downloads.

13. "Using DAML+ OIL to classify intrusive behaviours", Knowledge Engineering Review, January 2004, 222 downloads, 3 citations.


14. "Secure Sensor Networks for Perimeter Protection", Computer Networks, November 2003, 2460 downloads, 30 citations.

15. "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 3364 downloads, 44 citations.

16. "Modeling Computer Attacks: An Ontology for Intrusion Detection", The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 3212 downloads, 19 citations.

17. "A Target-Centric Ontology for Intrusion Detection", Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 718 downloads, 50 citations.

18. "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 2405 downloads, 4 citations.

19. "Fuzzy Clustering for Intrusion Detection", Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 51 citations.

1 Non-Refereed Publication


1. "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", University of Maryland, Baltimore County, September 2002, 4750 downloads.

Additional Resources


1. Cross-layer Analysis for Detecting Wireless Misbehavior
2. Cross-layer Analysis for Detecting Wireless Misbehavior


1. Detecting Misbehavior in MANETs Through Cross-Layer Analysis (May 2006)

1. Effective Network Security in a Dynamic World
    on Wednesday, September 30, 2009 from 07:30AM to 09:00AM.

2. Research Topics in MANETs
    on Tuesday, October 17, 2006 from 11:15AM to 12:30PM.

3. Cross-layer Analysis for Detecting Wireless Misbehavior
    on Wednesday, October 19, 2005 from 10:30AM to 12:00PM.

4. A Holistic Approach to Secure Sensor Networks
    on Wednesday, November 24, 2004 from 11:00AM.


Subscribe to RSS feed

Bookmark this page