<![CDATA[UMBC ebiquity RSS Tag Search]]> <![CDATA[Semantics for Privacy and Context]]> http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context 2014-10-20 <![CDATA[Detecting Comprised Nodes in Wireless Sensor Networks]]> http://ebiquity.umbc.edu/event/html/id/428/Detecting-Comprised-Nodes-in-Wireless-Sensor-Networks 2012-03-08 <![CDATA[A Security Framework to Cope With Node Misbehaviors in Mobile Ad Hoc Networks]]> http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks 2011-06-14 <![CDATA[A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems]]> http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems 2011-03-08 <![CDATA[Architecture and key technologies of the next generation service platform]]> http://ebiquity.umbc.edu/event/html/id/279/Architecture-and-key-technologies-of-the-next-generation-service-platform 2008-12-10 <![CDATA[Observation Techniques for Detecting Malicious Behavior in Ad-hoc Networks]]> http://ebiquity.umbc.edu/event/html/id/268/Observation-Techniques-for-Detecting-Malicious-Behavior-in-Ad-hoc-Networks 2008-10-23 <![CDATA[Generating Libraries for Rapid Wireless Sensor Network Reconfiguration]]> http://ebiquity.umbc.edu/event/html/id/269/Generating-Libraries-for-Rapid-Wireless-Sensor-Network-Reconfiguration 2008-10-21 <![CDATA[Use of Context and Policies in Declarative Networked Systems]]> http://ebiquity.umbc.edu/event/html/id/244/Use-of-Context-and-Policies-in-Declarative-Networked-Systems 2008-05-20 <![CDATA[SSC Dynamic Spectrum Access Technology]]> http://ebiquity.umbc.edu/event/html/id/226/SSC-Dynamic-Spectrum-Access-Technology 2008-02-15 <![CDATA[Research Topics in MANETs]]> http://ebiquity.umbc.edu/event/html/id/182/Research-Topics-in-MANETs 2006-10-17 <![CDATA[UMBC ebiquity group launches four new PhDs]]> http://ebiquity.umbc.edu/getnews/html/id/18/UMBC-ebiquity-group-launches-four-new-PhDs 2004-12-23 <![CDATA[Harry Chen defends dissertation]]> http://ebiquity.umbc.edu/getnews/html/id/17/Harry-Chen-defends-dissertation 2004-12-03 <![CDATA[UMBC Participates in CNSF's 9th Annual Capitol Hill Science Exhibition]]> http://ebiquity.umbc.edu/getnews/html/id/21/UMBC-Participates-in-CNSF-s-9th-Annual-Capitol-Hill-Science-Exhibition 2003-06-19 <![CDATA[agentSpeak]]> http://ebiquity.umbc.edu/project/html/id/44/agentSpeak 2003-12-01 <![CDATA[Anamika: Distributed Service Discovery and Composition for Pervasive Environments]]> http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments 2002-01-01 <![CDATA[CentaurusComm]]> http://ebiquity.umbc.edu/project/html/id/23/CentaurusComm 1999-01-01 <![CDATA[CoCoNet: Content and Context Aware Networking]]> http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking 2005-07-01 <![CDATA[Disconnected Web Browsing]]> http://ebiquity.umbc.edu/project/html/id/18/Disconnected-Web-Browsing 1999-12-01 <![CDATA[Dynamic Negotiation Agents in Mobile Computing]]> http://ebiquity.umbc.edu/project/html/id/11/Dynamic-Negotiation-Agents-in-Mobile-Computing 2002-10-01 <![CDATA[IDE for Rei Policy Language]]> http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language 2003-05-01 <![CDATA[Intrusion Detection]]> http://ebiquity.umbc.edu/project/html/id/33/Intrusion-Detection 2002-05-01 <![CDATA[MagicWeaver: An Agent Based Simulation Framework For Wireless Sensor Networks]]> http://ebiquity.umbc.edu/project/html/id/16/MagicWeaver-An-Agent-Based-Simulation-Framework-For-Wireless-Sensor-Networks 2001-09-01 <![CDATA[mNote: Anywhere, Anytime Classroom]]> http://ebiquity.umbc.edu/project/html/id/28/mNote-Anywhere-Anytime-Classroom 2001-05-01 <![CDATA[Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones]]> http://ebiquity.umbc.edu/paper/html/id/1118/Bewitching-the-Battlefield-Repurposing-the-MouseJack-Attack-for-Crazyflie-Drones 2023-05-20 <![CDATA[Semantics for Privacy and Shared Context]]> http://ebiquity.umbc.edu/paper/html/id/677/Semantics-for-Privacy-and-Shared-Context 2014-10-20 <![CDATA[CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies]]> http://ebiquity.umbc.edu/paper/html/id/522/CARE-CPS-Context-Aware-tRust-Evaluation-for-Wireless-Networks-in-Cyber-Physical-System-Using-Policies 2011-06-06 <![CDATA[A Framework for Secure Knowledge Management in Pervasive Computing]]> http://ebiquity.umbc.edu/paper/html/id/415/A-Framework-for-Secure-Knowledge-Management-in-Pervasive-Computing 2008-11-03 <![CDATA[Accuracy of the suspected blood indicator in detecting red lesions during wireless capsule endoscopy]]> http://ebiquity.umbc.edu/paper/html/id/435/Accuracy-of-the-suspected-blood-indicator-in-detecting-red-lesions-during-wireless-capsule-endoscopy 2007-05-30 <![CDATA[StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANETs]]> http://ebiquity.umbc.edu/paper/html/id/354/StreetSmart-Traffic-Discovering-and-Disseminating-Automobile-Congestion-Using-VANETs 2007-04-22 <![CDATA[Handheld computer application for medical disaster management]]> http://ebiquity.umbc.edu/paper/html/id/433/Handheld-computer-application-for-medical-disaster-management 2006-11-30 <![CDATA[Protecting the privacy of passive RFID tags]]> http://ebiquity.umbc.edu/paper/html/id/341/Protecting-the-privacy-of-passive-RFID-tags 2006-09-01 <![CDATA[StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's]]> http://ebiquity.umbc.edu/paper/html/id/350/StreetSmart-Traffic-Discovering-and-Disseminating-Automobile-Congestion-Using-VANET-s 2006-08-01 <![CDATA[Cross-layer Analysis for Detecting Wireless Misbehaviour]]> http://ebiquity.umbc.edu/paper/html/id/267/Cross-layer-Analysis-for-Detecting-Wireless-Misbehaviour 2006-01-06 <![CDATA[Cross-layer Analysis for Detecting Wireless Misbehavior]]> http://ebiquity.umbc.edu/resource/html/id/150/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior 2005-10-19 <![CDATA[Cross-layer Analysis for Detecting Wireless Misbehavior]]> http://ebiquity.umbc.edu/resource/html/id/151/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior 2005-10-19 <![CDATA[Semantics for Privacy and Context]]> http://ebiquity.umbc.edu/resource/html/id/364/Semantics-for-Privacy-and-Context 2014-10-20