Publications

Displaying publications 41 through 60 out of 764.

Refereed Publications

2017

  1. K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 226 downloads.
  2. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity Challenges to American Local Governments", InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017, 282 downloads.
  3. K. Chopra, R. Bose, and A. Joshi, "Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model", InProceedings, 12th Annual Symposium On Information Assurance (ASIA’17), May 2017, 250 downloads.
  4. S. Saha, K. P. Joshi, and A. Gupta, "A Deep Learning Approach to Understanding Cloud Service Level Agreements ", InProceedings, Fifth International IBM Cloud Academy Conference, May 2017, 640 downloads.
  5. P. K. Das, A. Joshi, and T. Finin, "App behavioral analysis using system calls", InProceedings, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): MobiSec 2017: Security, Privacy, and Digital Forensics of Mobile Systems and Networks, May 2017, 688 downloads.
  6. C. Grasso, "A Semantically Rich Cognitive Search Assistant For Clinical Notes", PhdThesis, UMBC, April 2017, 354 downloads.
  7. M. M. Rahman, "Understanding the Logical and Semantic Structure of Large Documents", Proceedings, SDM 2016 Doctoral Forum, SIAM International Conference on Data Mining , April 2017, 247 downloads.
  8. J. Sleeman, M. Halem, T. Finin, and M. Cane, "Modeling the Evolution of Climate Change Assessment Research Using Dynamic Topic Models and Cross-Domain Divergence Maps", InProceedings, AAAI Spring Symposium on AI for Social Good, March 2017, 1036 downloads.
  9. K. Chopra, R. Bose, and A. Joshi, "Secrecy Outage of Cooperative Relay Network With and Without Eavesdropper's Direct Link", InProceedings, 23rd National Conference on Communications (NCC), March 2017, 217 downloads.
  10. K. Chopra, R. Bose, and A. Joshi, "Secrecy Performance of Threshold-Based Decode-and-Forward Cooperative Cognitive Radio Network", Article, IET Communications 2017, February 2017, 243 downloads.

2016

  1. K. Khanna and A. Joshi, "Bid Modification Attack in Smart Grid for Monetary Benefits", InProceedings, 2016 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), December 2016, 189 downloads.
  2. J. Sleeman, M. Halem, T. Finin, and M. Cane, "Advanced Large Scale Cross Domain Temporal Topic Modeling Algorithms to Infer the Influence of Recent Research on IPCC Assessment Reports", InProceedings, American Geophysical Union Fall Meeting 2016, December 2016, 843 downloads.
  3. A. Padia, K. Kalpakis, and T. Finin, "Inferring Relations in Knowledge Graphs with Tensor Decompositions", InProceedings, IEEE International Conference on Big Data , December 2016, 731 downloads.
  4. J. Sleeman, M. Halem, T. Finin, and M. Cane, "Dynamic Topic Modeling to Infer the Influence of Research Citations on IPCC Assessment Reports", InProceedings, Big Data Challenges, Research, and Technologies in the Earth and Planetary Sciences Workshop, IEEE Int. Conf. on Big Data, December 2016, 629 downloads.
  5. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "Semantic Approach to Automating Management of Big Data Privacy Policies", InProceedings, IEEE BigData 2016, December 2016, 1081 downloads.
  6. K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 217 downloads.
  7. K. Chopra, R. Bose, and A. Joshi, "Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining", InProceedings, IEEE 2nd International Conference on Signal and Image Processing (ICSIP’17), November 2016, 334 downloads.
  8. T. Finin, D. Lawrie, J. Mayfield, P. McNamee, J. Laspesa, and M. Latman, "HLTCOE Participation in TAC KBP 2016: Cold Start and EDL", InProceedings, Proceedings of the 2016 Text Analysis Workshop, November 2016, 603 downloads.
  9. T. W. Satyapanich and T. Finin, "Event Nugget Detection Task: UMBC systems", InProceedings, Proceedings of the 9th Text Analysis Worksho, November 2016, 525 downloads.

Non-Refereed Publications

2017

  1. , " UMBC/ICMA Survey of Local Government Cybersecurity Practices", TechReport, ICMA and UMBC, April 2017, 107 downloads.