Tags: security

Active Projects

  1. Cloud Security and Privacy

Publications

2021

  1. K. Sane, K. P. Joshi, and S. Mittal, "Semantically Rich Framework to Automate Cyber Insurance Services", Article, IEEE Transactions on Services Computing, November 2021, 69 downloads.
  2. A. Kotal, A. Joshi, and K. P. Joshi, "The Effect of Text Ambiguity on creating Policy Knowledge Graphs", InProceedings, IEEE International Conference on Big Data and Cloud Computing (BDCloud 2021), September 2021, 89 downloads.
  3. R. Walid, K. P. Joshi, and S. Choi, "Secure Cloud EHR with Semantic Access Control, Searchable Encryption and Attribute Revocation", InProceedings, IEEE International Conference on Digital Health (ICDH) 2021 in IEEE World Congress on Services 2021, September 2021, 90 downloads.
  4. R. Razavisousan and K. P. Joshi, "Analyzing GDPR compliance in Cloud Services' privacy policies using Textual Fuzzy Interpretive Structural Modeling (TFISM)", InProceedings, IEEE International Services Computing Conference (SCC) 2021 in IEEE World Congress on Services 2021, September 2021, 73 downloads.
  5. S. Chukkapalli, N. Pillai, S. Mittal, and A. Joshi, "Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2021, August 2021, 71 downloads.
  6. L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 79 downloads.
  7. P. Ranade, A. Piplai, S. Mittal, A. Joshi, and T. Finin, "Generating Fake Cyber Threat Intelligence Using Transformer-Based Models", Proceedings, International Joint Conference on Neural Networks (IJCNN 2021), July 2021, 261 downloads.
  8. J. Sleeman, T. Finin, and M. Halem, "Understanding Cybersecurity Threat Trends through Dynamic Topic Modeling", Article, Frontiers in Big Data, June 2021, 51 downloads.
  9. A. Nagar, L. Elluri, and K. P. Joshi, "Automated Compliance of Mobile Wallet Payments for Cloud Services", InProceedings, 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), May 2021, 127 downloads.

2020

  1. L. Elluri, K. P. Joshi, and A. Kotal, "Measuring Semantic Similarity across EU GDPR Regulation and Cloud Privacy Policies", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 172 downloads.
  2. R. Walid, K. P. Joshi, S. Choi, and D. L. Kim, "Cloud-based Encrypted EHR System with Semantically Rich Access Control and Searchable Encryption", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 191 downloads.
  3. S. Dasgupta, A. Piplai, A. Kotal, and A. Joshi, "A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 495 downloads.
  4. A. Piplai, S. Mittal, A. Joshi, T. Finin, J. Holt, and R. Zak, "Creating Cybersecurity Knowledge Graphs from Malware After Action Reports", Proceedings, IEEE Access Journal, December 2020, 660 downloads.
  5. A. Piplai, P. Ranade, A. Kotal, S. Mittal, S. N. Narayanan, and A. Joshi, "Using Knowledge Graphs and Reinforcement Learning for Malware Analysis", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 452 downloads.
  6. A. Piplai, S. Mittal, M. Abdelsalam, M. Gupta, A. Joshi, and T. Finin, "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2020, November 2020, 239 downloads.
  7. J. Clavin, V. P. Janeja, K. P. Joshi, Y. Yesha, S. Duan, H. Zhang, L. Erickson, and J. D. Li, "Blockchains for Government: Use Cases and Challenges", Article, Digital Government: Research and Practice, November 2020, 212 downloads.
  8. K. P. Joshi, L. Elluri, and A. Nagar, "An Integrated Knowledge Graph to Automate Cloud Data Compliance", Article, IEEE Access, November 2020, 203 downloads.
  9. S. Sontowski, M. Gupta, S. Chukkapalli, M. Abdelsalam, S. Mittal, A. Joshi, and R. Sandhu, "Cyber Attacks on Smart Farming Infrastructure", InProceedings, 6th IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2020), October 2020, 523 downloads.
  10. A. Mahindrakar and K. P. Joshi, "Automating GDPR Compliance using Policy Integrated Blockchain", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 876 downloads.
  11. S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 1260 downloads.
  12. J. Sleeman, T. Finin, and M. Halem, "Temporal Understanding of Cybersecurity Threats", InProceedings, IEEE International Conference on Big Data Security on Cloud, May 2020, 450 downloads.
  13. R. Ayanzadeh, "Leveraging Artificial Intelligence to Advance Problem-Solving with Quantum Annealers", PhdThesis, University of Maryland, Baltimore County, May 2020, 412 downloads.
  14. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 7 downloads.
  15. T. W. Satyapanich, F. Ferraro, and T. Finin, "CASIE: Extracting Cybersecurity Event Information from Text", InProceedings, Proceeding of the 34th AAAI Conference on Artificial Intelligence, February 2020, 1068 downloads.

2019

  1. T. W. Satyapanich, T. Finin, and F. Ferraro, "Extracting Rich Semantic Information about Cybersecurity Events", InProceedings, Second Workshop on Big Data for CyberSecurity, held in conjunction with the IEEE Int. Conf. on Big Data, December 2019, 519 downloads.
  2. T. W. Satyapanich, "Modeling and Extracting Information about Cybersecurity Events from Text", PhdThesis, University of Maryland, Baltimore county, December 2019, 154 downloads.
  3. N. Khurana, S. Mittal, A. Piplai, and A. Joshi, "Preventing Poisoning Attacks on AI based Threat Intelligence Systems", InProceedings, IEEE Machine Learning for Signal Processing, September 2019, 747 downloads.
  4. K. Sane, K. P. Joshi, and S. Mittal, "A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services", InProceedings, IEEE International Conference on Web Services (IEEE ICWS) 2019, July 2019, 726 downloads.
  5. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 346 downloads.
  6. A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 553 downloads.
  7. S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-physical Systems", PhdThesis, University of Maryland, Baltimore County, May 2019, 131 downloads.
  8. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 127 downloads.
  9. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 1013 downloads.
  10. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity", Article, Public Administration Review, February 2019, 459 downloads.

2018

  1. S. N. Narayanan, K. Khanna, B. K. Panigrahi, and A. Joshi, "Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars", InBook, Smart Cities Cybersecurity and Privacy, December 2018, 285 downloads.
  2. L. Elluri, A. Nagar, and K. P. Joshi, "An Integrated Knowledge Graph to Automate GDPR and PCI DSS Compliance", IEEE International Conference on Big Data 2018, December 2018, 1099 downloads.
  3. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 992 downloads.
  4. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems", InProceedings, IEEE International Symposium on Technologies for Homeland Security, October 2018, 519 downloads.
  5. S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 1938 downloads.
  6. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security", Article, Journal of Homeland Security and Emergency Management, September 2018.
  7. L. Neil, S. Mittal, and A. Joshi, "Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, September 2018, 966 downloads.
  8. V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 535 downloads.
  9. M. P. Joshi, K. P. Joshi, and T. Finin, "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems", InProceedings, International Conference on Cloud Computing, July 2018, 1525 downloads.
  10. A. Padia, A. Roy, T. W. Satyapanich, F. Ferraro, S. Pan, Y. Park, A. Joshi, and T. Finin, "UMBC at SemEval-2018 Task 8: Understanding Text about Malware", InProceedings, Proceedings of International Workshop on Semantic Evaluation (SemEval-2018), June 2018, 769 downloads.
  11. A. Nagar and K. P. Joshi, "A Semantically Rich Knowledge Representation of PCI DSS for Cloud Services", InProceedings, 6th International IBM Cloud Academy Conference ICACON 2018, Japan, May 2018, 869 downloads.

2017

  1. S. K. Singh, R. Bose, and A. Joshi, "Entropy Based Electricity Theft Detection in AMI Network", Article, IET Cyber-Physical Systems: Theory and Applications, October 2017, 883 downloads.
  2. P. K. Das, A. Joshi, and T. Finin, "Personalizing context-aware access control on mobile platforms", InProceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017, 1294 downloads.
  3. S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", TechReport, arXiv, August 2017, 1019 downloads.
  4. P. K. Das, "Context-Dependent Privacy and Security Management on Mobile Devices", PhdThesis, Ph.D. Dissertation, August 2017, 834 downloads.
  5. S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", Article, CoRR, August 2017, 767 downloads.
  6. K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 571 downloads.
  7. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity Challenges to American Local Governments", InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017, 860 downloads.
  8. , " UMBC/ICMA Survey of Local Government Cybersecurity Practices", TechReport, ICMA and UMBC, April 2017, 452 downloads.

2016

  1. P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 1049 downloads.
  2. P. K. Das, D. Ghosh, P. Jagtap, A. Joshi, and T. Finin, "Preserving User Privacy and Security in Context-Aware Mobile Platforms", InBook, Mobile Application Development, Usability, and Security, October 2016, 1121 downloads.
  3. P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, "Semantic knowledge and privacy in the physical web", InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 1805 downloads.
  4. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 1209 downloads.
  5. P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", Article, Social Network Analysis and Mining, September 2016, 1071 downloads.
  6. K. Khanna, B. K. Panigrahi, and A. Joshi, "Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit", Article, IET Transactions on Generation, Transmission and Distribution, September 2016, 1180 downloads.
  7. S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", InProceedings, International Symposium on Foundations of Open Source Intelligence and Security Informatics, August 2016, 3015 downloads.
  8. P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 884 downloads.
  9. B. Thuraisingham, M. Kantarcioglu, K. Hamlen, L. Khan, T. Finin, A. Joshi, T. Oates, and E. Bertino, "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", InProceedings, IEEE Conference on Information Reuse and Integration,, July 2016, 1210 downloads.
  10. K. P. Joshi, Y. Yesha, and T. Finin, "An Ontology for a HIPAA compliant cloud service", InProceedings, 4th International IBM Cloud Academy Conference ICACON 2016, June 2016, 1758 downloads.
  11. P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 1555 downloads.
  12. D. S. Roche, A. Aviv, and S. Choi, "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.", InProceedings, IEEE Symposium on Security and Privacy, May 2016, 1137 downloads.
  13. Z. Syed, A. Padia, M. L. Mathews, T. Finin, and A. Joshi, "UCO: A Unified Cybersecurity Ontology", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security, February 2016, 3134 downloads.
  14. N. K. Sharma and A. Joshi, "Representing attribute based access control policies in OWL", InProceedings, Tenth International Conference on Semantic Computing (ICSC), February 2016, 1559 downloads.

2015

  1. Z. Syed, T. Finin, A. Padia, and M. L. Mathews, "Supporting Situationally Aware Cybersecurity Systems", TechReport, University of Maryland Baltimore County, September 2015, 1486 downloads.
  2. W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 1219 downloads.
  3. A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance", InProceedings, 8th International Conference on Cloud Computing (CLOUD), June 2015, 881 downloads.
  4. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015.
  5. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015, 929 downloads.

2014

  1. K. P. Joshi, "Cloud Data Management Policies: Security and Privacy Checklist", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 998 downloads.
  2. K. P. Joshi, M. Halem, Y. Yesha, J. E. Dorband, and e., "USM Community Cloud: VCL-based Academic Cloud", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 1796 downloads.

2013

  1. A. Joshi, R. Lal, T. Finin, and A. Joshi, "Extracting cybersecurity related linked data from text", InProceedings, Proceedings of the 7th IEEE International Conference on Semantic Computing, September 2013, 1971 downloads.
  2. P. Sharma, A. Joshi, and T. Finin, "Detecting Data Exfiltration by Integrating Information Across Layers", InProceedings, 14th IEEE International Conference on Information Reuse and Integration, August 2013, 1626 downloads.
  3. A. Joshi, "Linked Data for Software Security Concepts and Vulnerability Descriptions", MastersThesis, University of Maryland Baltimore County, July 2013, 1564 downloads.
  4. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1549 downloads.
  5. R. Lal, "Information Extraction of Security related entities and concepts from unstructured text.", MastersThesis, University of Maryland Baltimore County, May 2013, 1747 downloads.

2012

  1. M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1738 downloads.
  2. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012.
  3. S. More, M. L. Mathews, A. Joshi, and T. Finin, "A Knowledge-Based Approach To Intrusion Detection Modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 2029 downloads.
  4. D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1278 downloads.
  5. A. Joshi, T. Finin, K. P. Joshi, and M. Oberoi, "A Policy Driven Semantic Approach to Data Usage Management", InProceedings, DUMW Workshop in conjunction with WWW 2012, April 2012, 1306 downloads.
  6. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1365 downloads.

2011

  1. W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1647 downloads.
  2. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1600 downloads.
  3. M. Oberoi, P. Jagtap, A. Joshi, T. Finin, and L. Kagal, "Information Integration and Analysis: A Semantic Approach to Privacy", InProceedings, Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust, October 2011, 1449 downloads.
  4. V. Mulwad, W. Li, A. Joshi, T. Finin, and K. Viswanathan, "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 2887 downloads.
  5. W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1946 downloads.
  6. W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1525 downloads.
  7. A. Mahale, "Group Centric Information Sharing using Hierarchical Models", MastersThesis, UMBC, May 2011, 1332 downloads.
  8. P. Jagtap, "Privacy Preservation in Context Aware Systems", MastersThesis, May 2011, 1341 downloads.
  9. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 1824 downloads.
  10. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 1719 downloads, 1 citation.

2010

  1. P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 1695 downloads, 1 citation.
  2. R. Schauer and A. Joshi, "A Probabilistic Approach to Distributed System Management", InProceedings, Proceedings of the Seventh International Conference on Autonomic Computing, June 2010, 1579 downloads.
  3. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 2791 downloads, 7 citations.

2009

  1. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 2693 downloads, 4 citations.
  2. A. Joshi, Y. Yesha, T. Finin, W. Li, and P. A. Kodeswaran, "A Policy and Trust Driven Framework for Securing Cyber Physical Systems", InProceedings, Workshop on Future Directions in Cyber-physical Systems Security, July 2009, 30 downloads.
  3. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1834 downloads, 7 citations.
  4. W. Jensen and V. Korolev, "A Location-Based Mechanism for Mobile Device Security", InProceedings, Lecture Notes in Artificial Intelligence, March 2009.

2008

  1. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2023 downloads, 1 citation.
  2. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2499 downloads, 1 citation.
  3. J. Martineau and P. A. Kodeswaran, "SecurePass: Guarding sensitive information from untrusted machines", TechReport, September 2008, 1594 downloads.
  4. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 7091 downloads, 61 citations.
  5. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and F. Perich, "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 1494 downloads.
  6. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2210 downloads.
  7. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Role Based Access Control and OWL", InProceedings, Proceedings of the fourth OWL: Experiences and Directions Workshop, April 2008, 2926 downloads.
  8. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 2613 downloads.

2007

  1. , "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability", Proceedings, November 2007, 2438 downloads.
  2. S. B. Kodeswaran, P. A. Kodeswaran, A. Joshi, and F. Perich, "Utilizing Semantic Policies for Secure BGP Route Dissemination", TechReport, September 2007, 2238 downloads.
  3. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3104 downloads, 16 citations.

2006

  1. T. Finin, L. Kagal, and D. Olmedilla, "Report on the Models of Trust for the Web Workshop", Article, SIGMOD Record, December 2006, 688 downloads.
  2. N. Vartak, A. Patwardhan, A. Joshi, and P. Nagy, "Protecting the privacy of RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 3011 downloads.
  3. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 3773 downloads, 5 citations.
  4. P. Kolari, T. Finin, Y. Yesha, K. Lyons, J. Hawkins, and S. Perelgut, "Policy Management of Enterprise Systems: A Requirements Study", InProceedings, Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, June 2006, 5383 downloads, 4 citations.
  5. L. Kagal, T. Finin, A. Joshi, and S. Greenspan, "Security and Privacy Challenges in Open and Dynamic Environments", Article, Computer, June 2006, 2832 downloads.
  6. P. Kolari, Y. Yesha, K. Lyons, S. Perelgut, and J. Hawkins, "Policy Management of Enterprise Systems: A Requirements Study", TechReport, TR-CS-06-02 , March 2006, 2677 downloads.
  7. J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 1697 downloads, 1 citation.

2005

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3271 downloads, 11 citations.
  2. L. Kagal and J. A. Hendler, "Proceedings of the Semantic Web and Policy Workshop", Proceedings, November 2005, 4729 downloads.
  3. S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 3177 downloads.
  4. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for Agents: Theory and Experiences, July 2005, 5859 downloads, 70 citations.
  5. R. Masuoka, M. Chopra, Z. Song, Y. K. Labrou, L. Kagal, and T. Finin, "Policy-based Access Control for Task Computing Using Rei", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 2858 downloads, 15 citations.
  6. M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 2722 downloads.
  7. L. Ding, P. Kolari, T. Finin, A. Joshi, Y. Peng, and Y. Yesha, "On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework", InProceedings, Proceedings of the AAAI SPring Symposium on AI Technologies for Homeland Security, March 2005, 4148 downloads, 32 citations.
  8. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7151 downloads, 96 citations.
  9. G. Denker, L. Kagal, and T. Finin, "Security in the Semantic Web using OWL", Article, Information Security Technical Report, January 2005, 203 downloads.

2004

  1. L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.
  2. H. Chen, T. Finin, A. Joshi, F. Perich, D. Chakraborty, and L. Kagal, "Intelligent Agents Meet the Semantic Web in Smart Spaces", Article, IEEE Internet Computing, November 2004, 5167 downloads, 156 citations.
  3. L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 8193 downloads, 23 citations.
  4. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  5. L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", PhdThesis, University of Maryland Baltimore County, September 2004, 10 citations.
  6. H. Chen, F. Perich, T. Finin, and A. Joshi, "SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 11498 downloads, 342 citations.
  7. A. Patwardhan, V. Korolev, L. Kagal, and A. Joshi, "Enforcing Policies in Pervasive Environments", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 5394 downloads, 30 citations.
  8. D. Khushraj, O. Lassila, and T. Finin, "sTuples: Semantic Tuple Spaces", InProceedings, First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’04), August 2004, 2901 downloads, 73 citations.
  9. H. Chen, F. Perich, D. Chakraborty, T. Finin, and A. Joshi, "Intelligent Agents Meet Semantic Web in a Smart Meeting Room", InProceedings, Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004), July 2004, 5613 downloads, 81 citations.
  10. A. B. Shah, L. Kagal, and A. Joshi, "Policy Development Software for Security Policies", TechReport, DIMACS workshop on Usable Privacy and Security Software, July 2004.
  11. L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", Article, IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2539 downloads, 1 citation.
  12. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 1554 downloads, 70 citations.
  13. L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", InProceedings, First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 9140 downloads, 1 citation.
  14. J. Undercofer, "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 7137 downloads.
  15. D. Khushraj, "Semantic Tuple Spaces: A Coordination", MastersThesis, University of Maryland, Baltimore County, January 2004.
  16. J. Undercofer, A. Joshi, T. Finin, and J. Pinkston, "Using DAML+ OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, January 2004, 1167 downloads, 3 citations.
  17. S. Avancha, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 3589 downloads, 52 citations.

2003

  1. S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3292 downloads, 30 citations.
  2. F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4211 downloads, 44 citations.
  3. D. Khushraj, T. Finin, and A. Joshi, "Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments", InProceedings, Proceedings of the Second International Semantic Web Conference , September 2003, 3 citations.
  4. G. Denker, L. Kagal, T. Finin, K. Sycara, and M. Paoucci, "Security for DAML Web Services: Annotation and Matchmaking", InProceedings, Second International Semantic Web Conference , September 2003, 4130 downloads, 125 citations.
  5. L. Kagal, T. Finin, and A. Joshi, "A Policy Based Approach to Security for the Semantic Web", InProceedings, 2nd International Semantic Web Conference (ISWC2003), September 2003, 11071 downloads, 218 citations.
  6. J. Undercofer, A. Joshi, and J. Pinkston, "Modeling Computer Attacks: An Ontology for Intrusion Detection", InProceedings, The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 4283 downloads, 19 citations.
  7. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003.
  8. J. Undercofer, A. Joshi, T. Finin, and J. Pinkston, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 1311 downloads, 50 citations.
  9. W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
  10. W. Jensen, T. Karygiannis, M. Iorga, S. Gavrila, and V. Korolev, "Security Policy Management for Handheld Devices", InProceedings, Security and Management (SAM'03),, June 2003, 1037 downloads.
  11. L. Kagal, T. Finin, and A. Joshi, "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4761 downloads, 341 citations.
  12. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1341 downloads, 21 citations.
  13. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 691 downloads.
  14. A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 3061 downloads, 4 citations.
  15. A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 51 citations.

2002

  1. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent Agents for Mobile and Embedded Devices", Article, International Journal of Cooperative Information Systems, December 2002, 3644 downloads, 17 citations.
  2. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1241 downloads.
  3. L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5406 downloads, 30 citations.
  4. L. Kagal, "Rei : A Policy Language for the Me-Centric Project", TechReport, HP Labs, September 2002, 3867 downloads.
  5. J. Undercofer, F. Perich, and C. Nicholas, "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", TechReport, University of Maryland, Baltimore County, September 2002, 5500 downloads.
  6. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Information agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 1351 downloads.
  7. L. Kagal, F. Perich, A. Joshi, and Y. Yesha, "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 5176 downloads, 11 citations.
  8. L. Kagal, "An Agent Approach to Security for Pervasive Computing Environments", InProceedings, Doctoral Consortium, The Eighteenth National Conference on Artificial Intelligence (AAAI 02), July 2002.
  9. L. Kagal, T. Finin, and A. Joshi, "Developing Secure Agent Systems Using Delegation Based Trust Management", InProceedings, Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002) , July 2002, 5170 downloads, 38 citations.
  10. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002.
  11. A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, International Workshop on Web Services, E-Business, and the Semantic Web, May 2002, 614 downloads.
  12. L. Kagal, T. Finin, and A. Joshi, "On Security in Open Multi-Agent Systems", TechReport, UMBC, March 2002, 29 downloads.

2001

  1. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 8933 downloads, 214 citations.
  2. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, and V. Korolev, "Information Agents for Mobile and Embedded Devices", InProceedings, Proceedings of the Fifth International Workshop Cooperative Information Agents, September 2001, 4117 downloads, 17 citations.
  3. A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 4233 downloads.
  4. L. Kagal, T. Finin, and Y. Peng, "A Delegation Based Model for Distributed Trust", InProceedings, Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, August 2001, 975 downloads, 69 citations.
  5. L. Kagal, T. Finin, R. S. Cost, and Y. Peng, "A Framework for Distributed Trust Management", InProceedings, Second Workshop on Norms and Institutions in multi-agent systems, June 2001, 3590 downloads, 1 citation.

1998

  1. A. Joshi and V. Subramanyam, "Security in Mobile Systems", InProceedings, Workshop on Security in Large Scale Distributed Systems, IEEE SRDS, October 1998, 6 citations.
  2. Q. He, K. Sycara, and T. Finin, "Personal Security Agent: KQML-based PKI", InProceedings, Proceedings of the 2nd International Conference on Autonomous Agents, May 1998, 2198 downloads, 49 citations.

1995

  1. C. Thirunavukkarasu, T. Finin, and J. Mayfield, "Secret Agents - A Security Architecture for the KQML Agent Communication Language", InProceedings, CIKM'95 Intelligent Information Agents Workshop, October 1995, 183 downloads.

1986

  1. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 1986.