Tags: cyber security
- K. Khanna and A. Joshi, "AI based approach to identify compromised meters in data integrity attacks on smart grid", Article, IET Generation, Transmission and Distribution, October 2017, 270 downloads.
- K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 230 downloads.
- B. Thuraisingham, M. Kantarcioglu, K. Hamlen, L. Khan, T. Finin, A. Joshi, T. Oates, and E. Bertino, "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", InProceedings, IEEE Conference on Information Reuse and Integration,, July 2016, 787 downloads.
- W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 857 downloads.
- R. Lal, "Information Extraction of Security related entities and concepts from unstructured text.", MastersThesis, University of Maryland Baltimore County, May 2013, 1074 downloads.
- W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1575 downloads.
- Z. Syed, T. Finin, A. Padia, and M. L. Mathews, "Supporting Situationally Aware Cybersecurity Systems", TechReport, University of Maryland Baltimore County, September 2015, 1001 downloads.
- Modeling and Extracting information about Cybersecurity Events from Text
May 16, 2017
- Information Extraction of Security related entities and concepts from unstructured text
April 1, 2013
- Information Extraction of Security related entities, concepts and relations from unstructured text
October 22, 2012
- Cyber Security Situation Awareness and Impact Assessment: Issues, Models and Applications
November 8, 2011
- SAP-LAP Policy Paradigm – Application for Cyber Security
April 12, 2011
- Security of Industrial Control Systems. How Is It Different from IT Cyber Security?
December 10, 2010
- Towards Cooperative Autonomous Resilient Defenses in Cyberspace
October 22, 2010
- Cyber Security and the Weakest Link
October 19, 2004