UMBC ebiquity

Results for tags: intrusion detection

Projects

Past Projects

 Distributed Trust Management in Mobile Ad Hoc Networks.
 Intrusion Detection.
 Security in Battlefield MANETs.
 Semantic Situational Awareness for Intrusion Detection.


 
 
Publications

19 Refereed Publications

2016

1. "Detecting Botnets Using a Collaborative Situational-aware IDPS", Second International Conference on Information Systems Security and Privacy, February 2016, 414 downloads.

2013

2. "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Distributed and Parallel Databases, June 2013, 730 downloads.

2012

3. "A Semantic Approach to Situational Awareness for Intrusion Detection", Proceedings of the National Symposium on Moving Target Research, June 2012, 1500 downloads.

4. "A Knowledge-Based Approach To Intrusion Detection Modeling", Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1412 downloads.

2007

5. "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Ad Hoc Networks Journal (ADHOCNET), May 2007, 2436 downloads, 16 citations.

2006

6. "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 2711 downloads, 10 citations.

7. "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", International Journal of Wireless Information Networks, June 2006, 2948 downloads, 5 citations.

8. "Trust in Pervasive Computing", The Handbook of Mobile Middleware , February 2006, 1123 downloads, 1 citation.

9. "Cross-layer Analysis for Detecting Wireless Misbehaviour", IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 3444 downloads, 13 citations.

2005

10. "A Holistic Approach to Secure Sensor Networks", UMBC, August 2005, 2421 downloads.

11. "Secure Routing and Intrusion Detection in Ad Hoc Networks", Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 6332 downloads, 96 citations.

2004

12. "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", University of Maryland, Baltimore County, February 2004, 6450 downloads.

13. "Using DAML+ OIL to classify intrusive behaviours", Knowledge Engineering Review, January 2004, 185 downloads, 3 citations.

2003

14. "Secure Sensor Networks for Perimeter Protection", Computer Networks, November 2003, 2435 downloads, 30 citations.

15. "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 3330 downloads, 44 citations.

16. "Modeling Computer Attacks: An Ontology for Intrusion Detection", The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 3180 downloads, 19 citations.

17. "A Target-Centric Ontology for Intrusion Detection", Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 694 downloads, 50 citations.

18. "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 2365 downloads, 4 citations.

19. "Fuzzy Clustering for Intrusion Detection", Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 51 citations.

1 Non-Refereed Publication

2002

1. "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", University of Maryland, Baltimore County, September 2002, 4727 downloads.


 
 
Additional Resources

Presentation

1. Cross-layer Analysis for Detecting Wireless Misbehavior
2. Cross-layer Analysis for Detecting Wireless Misbehavior

Poster

1. Detecting Misbehavior in MANETs Through Cross-Layer Analysis (May 2006)
 
 
Events

1. Effective Network Security in a Dynamic World
    on Wednesday, September 30, 2009 from 07:30AM to 09:00AM.

2. Research Topics in MANETs
    on Tuesday, October 17, 2006 from 11:15AM to 12:30PM.

3. Cross-layer Analysis for Detecting Wireless Misbehavior
    on Wednesday, October 19, 2005 from 10:30AM to 12:00PM.

4. A Holistic Approach to Secure Sensor Networks
    on Wednesday, November 24, 2004 from 11:00AM.


 
 

Subscribe to RSS feed

Bookmark this page