Publications
Displaying publications 461 through 480 out of 1099.
Publications
- K. P. Joshi, "DC Proposal: Automation of Service Lifecycle on the Cloud by Using Semantic Technologies", InProceedings, Proceedings of tenth International Semantic Web Conference, Part II, October 2011, 1992 downloads.
- S. K. Singh, K. Khanna, R. Bose, and A. Joshi, "Joint transformation based detection of false data injection attacks in smart grid", Article, IEEE Transactions on Industrial Informatics, June 2017, 1992 downloads.
- R. Schauer and A. Joshi, "A Probabilistic Approach to Distributed System Management", InProceedings, Proceedings of the Seventh International Conference on Autonomic Computing, June 2010, 1988 downloads.
- D. Chapman, K. P. Joshi, Y. Yesha, M. Halem, Y. Yesha, and P. Nguyen, "Scientific Services on the Cloud", InBook, Handbook of Cloud Computing, September 2010, 1975 downloads.
- K. P. Joshi, Y. Yesha, A. Ozok, Y. Yesha, and e., "User-centric Smart Services on the Cloud", InBook, The Smart Internet, October 2010, 1957 downloads.
- L. Han, T. Finin, and A. Joshi, "Schema-Free Structured Querying of DBpedia Data", InProceedings, Proceedings of the 21st ACM Conference on Information and Knowledge Management (CIKM), August 2012, 1956 downloads.
- S. N. Narayanan, S. Mittal, and A. Joshi, "OBD SecureAlert: An Anomaly Detection System for Vehicles", InProceedings, IEEE Workshop on Smart Service Systems (SmartSys 2016), May 2016, 1954 downloads.
- W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1952 downloads.
- M. P. Joshi, S. Mittal, K. P. Joshi, and T. Finin, "Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage", InProceedings, Proceedings of the First IEEE International Conference on Edge Computing, June 2017, 1950 downloads.
- M. desJardins, A. Ciavolino, R. Deloatch, and E. Feasley, "Playing to Program: Towards an Intelligent Programming Tutor for RUR-PLE", InProceedings, Proceedings of the Second Symposium on Educational Advances in Artificial Intelligence, August 2011, 1949 downloads.
- A. Lahane, Y. Yesha, M. A. Grasso, A. Joshi, and e., "Detection of Unsafe Action from Laparoscopic Cholecystectomy Video", InProceedings, Proceedings of ACM SIGHIT International Health Informatics Symposium, January 2012, 1948 downloads.
- P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and F. Perich, "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 1945 downloads.
- J. Pinkston, J. Undercoffer, A. Joshi, and T. Finin, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Proceedings of the IJCAI-03 Workshop on Ontologies and Distributed Systems, July 2003, 1940 downloads, 150 citations.
- S. N. Narayanan, S. Mittal, and A. Joshi, "Using Data Analytics to Detect Anomalous States in Vehicles", TechReport, December 2015, 1940 downloads.
- Z. Syed, T. Finin, A. Padia, and M. L. Mathews, "Supporting Situationally Aware Cybersecurity Systems", TechReport, University of Maryland Baltimore County, September 2015, 1937 downloads.
- L. Elluri, A. Nagar, and K. P. Joshi, "An Integrated Knowledge Graph to Automate GDPR and PCI DSS Compliance", IEEE International Conference on Big Data 2018, December 2018, 1932 downloads.
- V. Narkhede, K. P. Joshi, T. Finin, S. Choi, A. Aviv, and D. S. Roche, "Managing Cloud Storage Obliviously", InProceedings, International Conference on Cloud Computing, June 2016, 1924 downloads.
- M. L. Mathews, A. Joshi, and T. Finin, "Detecting Botnets Using a Collaborative Situational-aware IDPS", InProceedings, Second International Conference on Information Systems Security and Privacy, February 2016, 1921 downloads.
- W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1907 downloads.
- M. Oberoi, P. Jagtap, A. Joshi, T. Finin, and L. Kagal, "Information Integration and Analysis: A Semantic Approach to Privacy", InProceedings, Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust, October 2011, 1903 downloads.