<![CDATA[UMBC ebiquity RSS Tag Search]]> <![CDATA[Modeling and Extracting information about Cybersecurity Events from Text]]> http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text 2017-05-16 <![CDATA[Are you in control or being controlled in your vehicle?]]> http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle- 2015-10-26 <![CDATA[Semantics for Cybersecurity and Privacy]]> http://ebiquity.umbc.edu/event/html/id/475/Semantics-for-Cybersecurity-and-Privacy 2015-05-01 <![CDATA[Extracting cybersecurity related entities, terms and concepts from text]]> http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text 2013-05-28 <![CDATA[MS defense: Social Media Analytics: Digital Footprints]]> http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints 2013-05-13 <![CDATA[A Collaborative Approach to Situational Awareness for CyberSecurity]]> http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity 2013-04-29 <![CDATA[A multilayer framework to catch data exfiltration]]> http://ebiquity.umbc.edu/event/html/id/452/A-multilayer-framework-to-catch-data-exfiltration 2013-04-08 <![CDATA[Information Extraction of Security related entities and concepts from unstructured text]]> http://ebiquity.umbc.edu/event/html/id/451/Information-Extraction-of-Security-related-entities-and-concepts-from-unstructured-text 2013-04-01 <![CDATA[talk: Self-sustainable Cyber-physical System Design]]> http://ebiquity.umbc.edu/event/html/id/430/talk-Self-sustainable-Cyber-physical-System-Design 2012-03-13 <![CDATA[Accelerated Cybersecurity]]> http://ebiquity.umbc.edu/project/html/id/109/Accelerated-Cybersecurity 2016-09-01 <![CDATA[Automatic Interpretation of Log Files]]> http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files 2013-08-01 <![CDATA[Automatic Interpretation of Log Files]]> http://ebiquity.umbc.edu/project/html/id/104/Automatic-Interpretation-of-Log-Files 2013-08-01 <![CDATA[Data Privacy management using Policy compliant Blockchain structures]]> http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures 2016-02-01 <![CDATA[Semantic Situational Awareness for Intrusion Detection]]> http://ebiquity.umbc.edu/project/html/id/98/Semantic-Situational-Awareness-for-Intrusion-Detection 2011-01-01 <![CDATA[An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains]]> http://ebiquity.umbc.edu/paper/html/id/1073/An-Overview-of-Cybersecurity-Knowledge-Graphs-Mapped-to-the-MITRE-ATT-CK-Framework-Domains 2023-10-03 <![CDATA[Change Management using Generative Modeling on Digital Twins]]> http://ebiquity.umbc.edu/paper/html/id/1135/Change-Management-using-Generative-Modeling-on-Digital-Twins 2023-10-02 <![CDATA[Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy]]> http://ebiquity.umbc.edu/paper/html/id/1104/Knowledge-Enhanced-Neurosymbolic-Artificial-Intelligence-for-Cybersecurity-and-Privacy 2023-09-01 <![CDATA[Knowledge Graphs and Reinforcement Learning: A Hybrid Approach for Cybersecurity Problems]]> http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems 2023-07-19 <![CDATA[Offline RL+CKG: A hybrid AI model for cybersecurity tasks]]> http://ebiquity.umbc.edu/paper/html/id/1053/Offline-RL-CKG-A-hybrid-AI-model-for-cybersecurity-tasks 2023-03-27 <![CDATA[Knowledge guided Two-player Reinforcement Learning for Cyber Attacks and Defenses]]> http://ebiquity.umbc.edu/paper/html/id/1047/Knowledge-guided-Two-player-Reinforcement-Learning-for-Cyber-Attacks-and-Defenses 2022-12-12 <![CDATA[Recognizing and Extracting Cybersecurity Entities from Text]]> http://ebiquity.umbc.edu/paper/html/id/1028/Recognizing-and-Extracting-Cybersecurity-Entities-from-Text 2022-07-17 <![CDATA[CyberEnt: Extracting Domain Specific Entities from Cybersecurity Text]]> http://ebiquity.umbc.edu/paper/html/id/1017/CyberEnt-Extracting-Domain-Specific-Entities-from-Cybersecurity-Text 2022-04-30 <![CDATA[PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data]]> http://ebiquity.umbc.edu/paper/html/id/1014/PriveTAB-Secure-and-Privacy-Preserving-sharing-of-Tabular-Data 2022-04-24 <![CDATA[CyberEnt: A Cybersecurity Domain Specific Dataset for Named Entity Recognition]]> http://ebiquity.umbc.edu/paper/html/id/1022/CyberEnt-A-Cybersecurity-Domain-Specific-Dataset-for-Named-Entity-Recognition 2022-04-18 <![CDATA[Question and Answering (QnA) System]]> http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System 2024-03-28 <![CDATA[A Dynamic Pipeline for Cybersecurity Information Extraction and Understanding]]> http://ebiquity.umbc.edu/resource/html/id/382/A-Dynamic-Pipeline-for-Cybersecurity-Information-Extraction-and-Understanding 2021-10-14 <![CDATA[Annotations of Cybersecurity blogs and articles]]> http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles 2013-05-30 <![CDATA[Cybersecurity embeddings]]> http://ebiquity.umbc.edu/resource/html/id/379/Cybersecurity-embeddings 2018-04-01 <![CDATA[Extracting Cybersecurity related entities, terms and concepts from text.]]> http://ebiquity.umbc.edu/resource/html/id/359/Extracting-Cybersecurity-related-entities-terms-and-concepts-from-text- 2013-05-30 <![CDATA[Extracting Malware Information from Cybersecurity Text]]> http://ebiquity.umbc.edu/resource/html/id/384/Extracting-Malware-Information-from-Cybersecurity-Text <![CDATA[Semantic Knowledge Graphs for Cybersecurity]]> http://ebiquity.umbc.edu/resource/html/id/381/Semantic-Knowledge-Graphs-for-Cybersecurity 2020-06-23 <![CDATA[Semantics for Cybersecurity and Privacy]]> http://ebiquity.umbc.edu/resource/html/id/366/Semantics-for-Cybersecurity-and-Privacy 2015-05-01 <![CDATA[situational awareness for cybersecurity]]> http://ebiquity.umbc.edu/resource/html/id/327/situational-awareness-for-cybersecurity 2011-10-21 <![CDATA[UMBC/ICMA Survey of local government cybersecurity practices]]> http://ebiquity.umbc.edu/resource/html/id/378/UMBC-ICMA-Survey-of-local-government-cybersecurity-practices 2018-04-17 <![CDATA[Understanding Malware Behavior with Reinforcement Learning]]> http://ebiquity.umbc.edu/resource/html/id/383/Understanding-Malware-Behavior-with-Reinforcement-Learning 2021-10-14