<![CDATA[UMBC ebiquity RSS Tag Search]]> <![CDATA[Observation Techniques for Detecting Malicious Behavior in Ad-hoc Networks]]> http://ebiquity.umbc.edu/event/html/id/268/Observation-Techniques-for-Detecting-Malicious-Behavior-in-Ad-hoc-Networks 2008-10-23 <![CDATA[Using semantic policies to manage border gateway route exchanges]]> http://ebiquity.umbc.edu/event/html/id/239/Using-semantic-policies-to-manage-border-gateway-route-exchanges 2008-04-29 <![CDATA[Opportunistic Bartering Of Digital Goods and Services]]> http://ebiquity.umbc.edu/event/html/id/209/Opportunistic-Bartering-Of-Digital-Goods-and-Services 2007-08-03 <![CDATA[Research Topics in MANETs]]> http://ebiquity.umbc.edu/event/html/id/182/Research-Topics-in-MANETs 2006-10-17 <![CDATA[StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's]]> http://ebiquity.umbc.edu/event/html/id/153/StreetSmart-Traffic-Discovering-and-Disseminating-Automobile-Congestion-Using-VANET-s 2006-05-03 <![CDATA[Mobile Peer-to-Peer Traffic Monitoring]]> http://ebiquity.umbc.edu/event/html/id/133/Mobile-Peer-to-Peer-Traffic-Monitoring 2006-02-15 <![CDATA[Looking back at the ebiquity research group's 2006]]> http://ebiquity.umbc.edu/getnews/html/id/38/Looking-back-at-the-ebiquity-research-group-s-2006 2007-01-01 <![CDATA[Mobile Peer-to-Peer Traffic Monitoring]]> http://ebiquity.umbc.edu/project/html/id/73/Mobile-Peer-to-Peer-Traffic-Monitoring 2006-01-01 <![CDATA[Security in Battlefield MANETs]]> http://ebiquity.umbc.edu/project/html/id/77/Security-in-Battlefield-MANETs 2006-09-01 <![CDATA[NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion]]> http://ebiquity.umbc.edu/paper/html/id/898/NAttack-Adversarial-Attacks-to-bypass-a-GAN-based-classifier-trained-to-detect-Network-intrusion 2020-05-26 <![CDATA[A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic]]> http://ebiquity.umbc.edu/paper/html/id/854/A-Policy-based-Framework-for-Privacy-Respecting-Deep-Packet-Inspection-of-High-Velocity-Network-Traffic 2019-05-29 <![CDATA[DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection]]> http://ebiquity.umbc.edu/paper/html/id/838/DAbR-Dynamic-Attribute-based-Reputation-scoring-for-Malicious-IP-Address-Detection 2018-11-08 <![CDATA[Semantic Interpretation of Structured Log Files]]> http://ebiquity.umbc.edu/paper/html/id/749/Semantic-Interpretation-of-Structured-Log-Files 2016-07-28 <![CDATA[A Collaborative Approach to Situational Awareness for CyberSecurity]]> http://ebiquity.umbc.edu/paper/html/id/604/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity 2012-10-14 <![CDATA[A Declarative Approach for Secure and Robust Routing]]> http://ebiquity.umbc.edu/paper/html/id/495/A-Declarative-Approach-for-Secure-and-Robust-Routing 2010-10-04 <![CDATA[Correcting Routing Failures Using Declarative Policies and Argumentation]]> http://ebiquity.umbc.edu/paper/html/id/507/Correcting-Routing-Failures-Using-Declarative-Policies-and-Argumentation 2010-04-28 <![CDATA[Modified Bully Algorithm using Election Commission]]> http://ebiquity.umbc.edu/paper/html/id/790/Modified-Bully-Algorithm-using-Election-Commission 2009-10-30 <![CDATA[Modified Bully Algorithm using Election Commission]]> http://ebiquity.umbc.edu/paper/html/id/789/Modified-Bully-Algorithm-using-Election-Commission 2009-10-09 <![CDATA[Utilizing semantic policies for managing BGP route dissemination]]> http://ebiquity.umbc.edu/paper/html/id/447/Utilizing-semantic-policies-for-managing-BGP-route-dissemination 2008-04-13