Tags: intrusion detection
Publications
2024
- A. Kotal, B. Luton, and A. Joshi, "KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation", TechReport, UMBC, May 2024, 180 downloads.
2016
- P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 1286 downloads.
- M. L. Mathews, A. Joshi, and T. Finin, "Detecting Botnets Using a Collaborative Situational-aware IDPS", InProceedings, Second International Conference on Information Systems Security and Privacy, February 2016, 1765 downloads.
2015
- P. Nimbalkar, "Semantic Interpretation of Structured Log Files", MastersThesis, University of Maryland, Baltimore County, August 2015, 1090 downloads.
2013
- W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1902 downloads.
2012
- M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 2070 downloads.
- S. More, M. L. Mathews, A. Joshi, and T. Finin, "A Semantic Approach to Situational Awareness for Intrusion Detection", InProceedings, Proceedings of the National Symposium on Moving Target Research, June 2012, 3517 downloads.
- S. More, M. L. Mathews, A. Joshi, and T. Finin, "A Knowledge-Based Approach To Intrusion Detection Modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 2395 downloads.
- S. More, "Situation Aware Intrusion Detection Model", MastersThesis, University of Maryland, Baltimore County, May 2012, 241 downloads.
2007
- A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3408 downloads, 16 citations.
2006
- A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", InProceedings, Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 4212 downloads, 10 citations.
- A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4243 downloads, 5 citations.
- J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 2067 downloads, 1 citation.
- J. Parker, A. Patwardhan, and A. Joshi, "Cross-layer Analysis for Detecting Wireless Misbehaviour", Proceedings, IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 4256 downloads, 13 citations.
2005
- S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 3462 downloads.
- A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7534 downloads, 96 citations.
2004
- W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
- J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 5007 downloads, 15 citations.
- , "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 7431 downloads.
- A. Joshi, T. Finin, and J. Pinkston, "Using DAML+ OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, January 2004, 1479 downloads, 3 citations.
2003
- A. Joshi, "Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it", InBook, Next Generation Data Mining, December 2003, 2 citations.
- S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3703 downloads, 30 citations.
- F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4586 downloads, 44 citations.
- A. Joshi and J. Pinkston, "Modeling Computer Attacks: An Ontology for Intrusion Detection", InProceedings, The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 4870 downloads, 19 citations.
- J. Pinkston, A. Joshi, and T. Finin, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 1773 downloads, 50 citations.
- J. Pinkston, "Hidden Processes: The Implication for Intrusion Detection", InProceedings, Proceedings of the IEEE International Workshop on Information Assurance, May 2003, 24 citations.
- A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 3503 downloads, 4 citations.
- A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 132 downloads, 51 citations.
2002
- A. Joshi, "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks", TechReport, UMBC, October 2002.
- F. Perich and C. Nicholas, "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", TechReport, University of Maryland, Baltimore County, September 2002, 5841 downloads.
Source Code
Old Events
- A Collaborative Approach to Situational Awareness for CyberSecurity
April 29, 2013 - Situation Aware Intrusion Detection Model
April 19, 2012 - Securing Cyber-Physical Systems
March 26, 2012 - Effective Network Security in a Dynamic World
September 30, 2009 - Research Topics in MANETs
October 17, 2006 - Cross-layer Analysis for Detecting Wireless Misbehavior
October 19, 2005 - A Holistic Approach to Secure Sensor Networks
November 24, 2004