2010
- P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 2018 downloads, 1 citation.
- P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "A Declarative Approach for Secure and Robust Routing", InProceedings, Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 2370 downloads.
- P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "Correcting Routing Failures Using Declarative Policies and Argumentation", InProceedings, Seventh USENIX Symposium on Networked Systems Design and Implementation, April 2010, 2701 downloads.
2008
- W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2341 downloads, 1 citation.
- P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and F. Perich, "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 1800 downloads.
- P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2611 downloads.
2007
- S. B. Kodeswaran, P. A. Kodeswaran, A. Joshi, and F. Perich, "Utilizing Semantic Policies for Secure BGP Route Dissemination", TechReport, September 2007, 2579 downloads.
- A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3418 downloads, 16 citations.
2006
- A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4259 downloads, 5 citations.
2005
- A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3674 downloads, 11 citations.
- A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7547 downloads, 96 citations.
2004
- D. Chakraborty, "Service Discovery and Compsition in Pervasive Environments", PhdThesis, Ph.D. Thesis, June 2004, 4460 downloads, 8 citations.
- F. Perich, "On Peer-to-Peer Data Management in Pervasive Computing Environments", PhdThesis, UMBC, May 2004, 2009 downloads.
- J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 5019 downloads, 15 citations.
- D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 3883 downloads, 9 citations.
- D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2004, 126 downloads, 26 citations.
2003
- S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3716 downloads, 30 citations.
- S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2915 downloads, 11 citations.
2001
- S. Avancha, D. Chakraborty, L. Kagal, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "An Integrated Architecture for Secure Information Discovery, Composition and Management in Pervasive Environments", TechReport, December 2001, 188 downloads.
- F. Perich, S. Avancha, A. Joshi, Y. Yesha, and K. P. Joshi, "Query Routing and Processing in Mobile Ad-Hoc Environments", TechReport, University of Maryland, Baltimore County, November 2001, 4966 downloads.
- R. S. Cost, T. Finin, S. Kallurkar, H. Majithia, C. Nicholas, Y. Shi, and I. Soboroff, "CARROT II: Collaborative Agent-based Routing and Retrieval of Text", TechReport, UMBC, September 2001, 168 downloads.
Old Events
- Recovering from Internet Routing Failures using Declarative Policies and Argumentation Protocols
April 13, 2010 - Problem Space Analysis for Plan Library Generation and Algorithm Selection in Real-time Systems
August 26, 2009 - Observation Techniques for Detecting Malicious Behavior in Ad-hoc Networks
October 23, 2008 - Gossip-based Outlier Detection for Mobile Ad Hoc Networks
May 6, 2008 - Using semantic policies to manage border gateway route exchanges
April 29, 2008 - Research Topics in MANETs
October 17, 2006 - Exploring Corporate Firm based principles for solving problems in Wireless Sensor Networks
October 12, 2005 - Ph.D. Proposal: TrueBahn - A Trustworthy Data Management Framework for Pervasive Environments
March 4, 2005 - Autonomy and Collaboration in Mobile Data Management
March 2, 2005 - A Model for Decentralized Information Dissemination
September 27, 2004