-
http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text
2017-05-16
-
http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-
2015-10-26
-
http://ebiquity.umbc.edu/event/html/id/475/Semantics-for-Cybersecurity-and-Privacy
2015-05-01
-
http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text
2013-05-28
-
http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints
2013-05-13
-
http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity
2013-04-29
-
http://ebiquity.umbc.edu/event/html/id/452/A-multilayer-framework-to-catch-data-exfiltration
2013-04-08
-
http://ebiquity.umbc.edu/event/html/id/451/Information-Extraction-of-Security-related-entities-and-concepts-from-unstructured-text
2013-04-01
-
http://ebiquity.umbc.edu/event/html/id/430/talk-Self-sustainable-Cyber-physical-System-Design
2012-03-13
-
http://ebiquity.umbc.edu/project/html/id/109/Accelerated-Cybersecurity
2016-09-01
-
http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files
2013-08-01
-
http://ebiquity.umbc.edu/project/html/id/104/Automatic-Interpretation-of-Log-Files
2013-08-01
-
http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures
2016-02-01
-
http://ebiquity.umbc.edu/project/html/id/98/Semantic-Situational-Awareness-for-Intrusion-Detection
2011-01-01
-
http://ebiquity.umbc.edu/paper/html/id/1073/An-Overview-of-Cybersecurity-Knowledge-Graphs-Mapped-to-the-MITRE-ATT-CK-Framework-Domains
2023-10-03
-
http://ebiquity.umbc.edu/paper/html/id/1135/Change-Management-using-Generative-Modeling-on-Digital-Twins
2023-10-02
-
http://ebiquity.umbc.edu/paper/html/id/1104/Knowledge-Enhanced-Neurosymbolic-Artificial-Intelligence-for-Cybersecurity-and-Privacy
2023-09-01
-
http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems
2023-07-19
-
http://ebiquity.umbc.edu/paper/html/id/1053/Offline-RL-CKG-A-hybrid-AI-model-for-cybersecurity-tasks
2023-03-27
-
http://ebiquity.umbc.edu/paper/html/id/1047/Knowledge-guided-Two-player-Reinforcement-Learning-for-Cyber-Attacks-and-Defenses
2022-12-12
-
http://ebiquity.umbc.edu/paper/html/id/1028/Recognizing-and-Extracting-Cybersecurity-Entities-from-Text
2022-07-17
-
http://ebiquity.umbc.edu/paper/html/id/1017/CyberEnt-Extracting-Domain-Specific-Entities-from-Cybersecurity-Text
2022-04-30
-
http://ebiquity.umbc.edu/paper/html/id/1014/PriveTAB-Secure-and-Privacy-Preserving-sharing-of-Tabular-Data
2022-04-24
-
http://ebiquity.umbc.edu/paper/html/id/1022/CyberEnt-A-Cybersecurity-Domain-Specific-Dataset-for-Named-Entity-Recognition
2022-04-18
-
http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System
2024-03-28
-
http://ebiquity.umbc.edu/resource/html/id/382/A-Dynamic-Pipeline-for-Cybersecurity-Information-Extraction-and-Understanding
2021-10-14
-
http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles
2013-05-30
-
http://ebiquity.umbc.edu/resource/html/id/379/Cybersecurity-embeddings
2018-04-01
-
http://ebiquity.umbc.edu/resource/html/id/359/Extracting-Cybersecurity-related-entities-terms-and-concepts-from-text-
2013-05-30
-
http://ebiquity.umbc.edu/resource/html/id/384/Extracting-Malware-Information-from-Cybersecurity-Text
-
http://ebiquity.umbc.edu/resource/html/id/381/Semantic-Knowledge-Graphs-for-Cybersecurity
2020-06-23
-
http://ebiquity.umbc.edu/resource/html/id/366/Semantics-for-Cybersecurity-and-Privacy
2015-05-01
-
http://ebiquity.umbc.edu/resource/html/id/327/situational-awareness-for-cybersecurity
2011-10-21
-
http://ebiquity.umbc.edu/resource/html/id/378/UMBC-ICMA-Survey-of-local-government-cybersecurity-practices
2018-04-17
-
http://ebiquity.umbc.edu/resource/html/id/383/Understanding-Malware-Behavior-with-Reinforcement-Learning
2021-10-14