2004
- F. Perich, J. Undercoffer, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 4776 downloads, 32 citations.
- J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, "On intrusion detection and response for mobile ad hoc networks", InProceedings, IEEE International Conference on Performance, Computing, and Communications, April 2004, 34 downloads.
- J. Undercoffer, "Intrusion detection: Modeling system state to detect and classify anomalous behaviors", PhdThesis, UMBC, February 2004, 90 downloads.
- S. Avancha, J. Undercoffer, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 4016 downloads, 52 citations.
2003
- S. Avancha, J. Undercoffer, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3829 downloads, 30 citations.
- J. Undercoffer, F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4710 downloads, 44 citations.
- J. Undercoffer, A. Joshi, and J. Pinkston, "Modeling Computer Attacks: An Ontology for Intrusion Detection", InProceedings, The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 5023 downloads, 19 citations.
- J. Undercoffer, A. Joshi, T. Finin, and J. Pinkston, "Using DAML+OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, September 2003, 1590 downloads, 3 citations.
- J. Pinkston, J. Undercoffer, A. Joshi, and T. Finin, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Proceedings of the IJCAI-03 Workshop on Ontologies and Distributed Systems, July 2003, 1898 downloads, 150 citations.
- J. Butler, J. Undercoffer, and J. Pinkston, "Hidden processes: the implication for intrusion detection", InProceedings, IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 2003, 60 downloads.
- A. Joshi, J. Undercoffer, and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 257 downloads, 51 citations.
2002
- S. Rajavaram, H. Shah, V. Shanbhag, J. Undercoffer, and A. Joshi, "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks", TechReport, UMBC, October 2002.
- L. Kagal, F. Perich, A. Joshi, T. Finin, and J. Undercoffer, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5867 downloads, 30 citations.
- L. Kagal, J. Undercoffer, F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 5604 downloads, 11 citations.