2024
- A. Kotal, B. Luton, and A. Joshi, "KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation", TechReport, UMBC, May 2024, 176 downloads.
- R. Walid, K. P. Joshi, and S. Choi, "Leveraging semantic context to establish access controls for secure cloud-based electronic health records", Article, International Journal of Information Management Data Insights, April 2024, 522 downloads.
- R. Walid, K. P. Joshi, and S. Choi, "Comparison of attribute‑based encryption schemes in securing healthcare systems", Article, Scientific Reports, Nature, March 2024, 476 downloads.
- R. Walid, K. P. Joshi, and L. Elluri, "Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations", 10th International Conference on Mathematics and Computing ICMC 2024, January 2024, 320 downloads.
2023
- A. Kotal, L. Elluri, D. Gupta, V. Mandalapu, and A. Joshi, "Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis", InProceedings, IEEE International Conference on Big Data (BigData), December 2023, 359 downloads.
- K. Echenim and K. P. Joshi, "IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance", InProceedings, IEEE Big Data 2023, 3rd Workshop on Knowledge Graphs and Big Data, December 2023, 334 downloads.
- J. Bolton, L. Elluri, and K. P. Joshi, "An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains", Proceedings, IEEE International conference on Intelligence and Security Informatics (ISI 2023), October 2023, 732 downloads.
- N. Das, A. Kotal, D. Roseberry, and A. Joshi, "Change Management using Generative Modeling on Digital Twins", InProceedings, International Conference on Intelligence and Security Informatics (ISI), October 2023, 221 downloads.
- A. Piplai, A. Kotal, S. Mohseni, M. Gaur, S. Mittal, and A. Joshi, "Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy", Article, IEEE Internet Computing, September 2023, 269 downloads.
- A. Kotal, N. Das, and A. Joshi, "Knowledge Infusion in Privacy Preserving Data Generation", InProceedings, KDD Workshop on Knowledge-infused Learning, 29TH ACM SIGKDD,, August 2023, 311 downloads.
- A. Piplai, "Knowledge Graphs and Reinforcement Learning: A Hybrid Approach for Cybersecurity Problems", PhdThesis, July 2023, 337 downloads.
- N. M. Gowrishetty, S. Chukkapalli, and A. Joshi, "Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones", InProceedings, INFOCOM Workshop on Security, Privacy, and Digital Forensics of Mobile Systems and Networks, May 2023, 277 downloads.
- R. Walid, K. P. Joshi, and S. Choi, "Semantically Rich Differential Access to Secure Cloud EHR", InProceedings, 9th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2023), May 2023, 390 downloads.
- A. Piplai, A. Joshi, and T. Finin, "Offline RL+CKG: A hybrid AI model for cybersecurity tasks", InProceedings, AAAI Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering, March 2023, 360 downloads.
2022
- A. Piplai, M. Anoruo, K. Fasaye, A. Joshi, T. Finin, and A. Ridley, "Knowledge guided Two-player Reinforcement Learning for Cyber Attacks and Defenses", InProceedings, International Conference on Machine Learning and Applications, December 2022, 812 downloads.
- C. Hanks and R. M. Verma, "Data Quality and Linguistic Cues for Domain-independent Deception Detection", InProceedings, IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT), December 2022, 209 downloads.
- C. Hanks, M. Maiden, P. Ranade, T. Finin, and A. Joshi, "Recognizing and Extracting Cybersecurity Entities from Text", InProceedings, Workshop on Machine Learning for Cybersecurity, International Conference on Machine Learning, July 2022, 1368 downloads.
- C. Hanks, M. Maiden, P. Ranade, T. Finin, and A. Joshi, "CyberEnt: Extracting Domain Specific Entities from Cybersecurity Text", InProceedings, Mid-Atlantic Student Colloquium on Speech, Language and Learning, April 2022, 1006 downloads.
- A. Kotal, A. Piplai, S. Chukkapalli, and A. Joshi, "PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data", InProceedings, ACM International Workshop on Security and Privacy Analytics, April 2022, 482 downloads.
- C. Hanks and M. Maiden, "CyberEnt: A Cybersecurity Domain Specific Dataset for Named Entity Recognition", Misc, UMBC Undergraduate Research and Creative Achievement Day, April 2022, 624 downloads.
- A. Chio, D. Jiang, P. Gupta, G. Bouloukakis, R. Yus, S. Dixit, and N. Venkatasubramanian, "SmartSPEC: Customizable Smart Space Datasets via Event-driven Simulations", InProceedings, IEEE International Conference on Pervasive Computing and Communications (PerCom), March 2022, 251 downloads.
- S. Mitra, A. Piplai, S. Mittal, and A. Joshi, "Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs", IEEE International Conference on Big Data 2021, January 2022, 882 downloads.
2021
- P. Ranade, A. Piplai, A. Joshi, and T. Finin, "CyBERT: Contextualized Embeddings for the Cybersecurity Domain", InProceedings, IEEE International Conference on Big Data, December 2021, 1693 downloads.
- S. Dasgupta, A. Piplai, P. Ranade, and A. Joshi, "Cybersecurity Knowledge Graph Improvement with Graph Neural Networks", InProceedings, International Conference on Big Data, December 2021, 567 downloads.
- D. L. Kim, L. Elluri, and K. P. Joshi, "Trusted Compliance Enforcement Framework for Sharing Health Big Data", InProceedings, IEEE BigData 2021 4th Special Session on HealthCare Data, December 2021, 551 downloads.
- P. Schubel, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases", InProceedings, IEEE International Conference on Bioinformatics and Biomedicine (BIBM) 2021, December 2021, 348 downloads.
- G. Shan, B. Zhao, J. Clavin, H. Zhang, and S. Duan, "Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System", Article, IEEE Transactions on Information Forensics and Security, November 2021.
- K. Sane, K. P. Joshi, and S. Mittal, "Semantically Rich Framework to Automate Cyber Insurance Services", Article, IEEE Transactions on Services Computing, November 2021, 577 downloads.
- A. Kotal, A. Joshi, and K. P. Joshi, "The Effect of Text Ambiguity on creating Policy Knowledge Graphs", InProceedings, IEEE International Conference on Big Data and Cloud Computing (BDCloud 2021), September 2021, 617 downloads.
- R. Walid, K. P. Joshi, and S. Choi, "Secure Cloud EHR with Semantic Access Control, Searchable Encryption and Attribute Revocation", InProceedings, IEEE International Conference on Digital Health (ICDH) 2021 in IEEE World Congress on Services 2021, September 2021, 656 downloads.
- R. Razavisousan and K. P. Joshi, "Analyzing GDPR compliance in Cloud Services' privacy policies using Textual Fuzzy Interpretive Structural Modeling (TFISM)", InProceedings, IEEE International Services Computing Conference (SCC) 2021 in IEEE World Congress on Services 2021, September 2021, 546 downloads.
- S. Chukkapalli, N. Pillai, S. Mittal, and A. Joshi, "Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2021, August 2021, 600 downloads.
- L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 457 downloads.
- P. Ranade, A. Piplai, S. Mittal, A. Joshi, and T. Finin, "Generating Fake Cyber Threat Intelligence Using Transformer-Based Models", Proceedings, International Joint Conference on Neural Networks (IJCNN 2021), July 2021, 797 downloads.
- P. Ranade, A. Joshi, and T. Finin, "Study shows AI-generated fake cybersecurity reports fool experts", Article, The Conversation, June 2021, 512 downloads.
- J. Sleeman, T. Finin, and M. Halem, "Understanding Cybersecurity Threat Trends through Dynamic Topic Modeling", Article, Frontiers in Big Data, June 2021, 327 downloads.
- A. Nagar, L. Elluri, and K. P. Joshi, "Automated Compliance of Mobile Wallet Payments for Cloud Services", InProceedings, 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), May 2021, 527 downloads.
2020
- L. Elluri, K. P. Joshi, and A. Kotal, "Measuring Semantic Similarity across EU GDPR Regulation and Cloud Privacy Policies", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 662 downloads.
- R. Walid, K. P. Joshi, S. Choi, and D. L. Kim, "Cloud-based Encrypted EHR System with Semantically Rich Access Control and Searchable Encryption", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 844 downloads.
- S. Dasgupta, A. Piplai, A. Kotal, and A. Joshi, "A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 1164 downloads.
- A. Piplai, S. Mittal, A. Joshi, T. Finin, J. Holt, and R. Zak, "Creating Cybersecurity Knowledge Graphs from Malware After Action Reports", Article, IEEE Access Journal, December 2020, 1116 downloads.
- A. Piplai, P. Ranade, A. Kotal, S. Mittal, S. N. Narayanan, and A. Joshi, "Using Knowledge Graphs and Reinforcement Learning for Malware Analysis", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 1167 downloads.
- A. Piplai, S. Mittal, M. Abdelsalam, M. Gupta, A. Joshi, and T. Finin, "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2020, November 2020, 704 downloads.
- M. Sills, P. Ranade, and S. Mittal, "Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - A Healthcare Usecase", InProceedings, International Conference on Intelligence and Security Informatics (ISI), November 2020, 161 downloads.
- J. Clavin, V. P. Janeja, K. P. Joshi, Y. Yesha, S. Duan, H. Zhang, L. Erickson, and J. D. Li, "Blockchains for Government: Use Cases and Challenges", Article, Digital Government: Research and Practice, November 2020, 937 downloads.
- K. P. Joshi, L. Elluri, and A. Nagar, "An Integrated Knowledge Graph to Automate Cloud Data Compliance", Article, IEEE Access, November 2020, 855 downloads.
- S. Sontowski, M. Gupta, S. Chukkapalli, M. Abdelsalam, S. Mittal, A. Joshi, and R. Sandhu, "Cyber Attacks on Smart Farming Infrastructure", InProceedings, 6th IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2020), October 2020, 1188 downloads.
- A. Mahindrakar and K. P. Joshi, "Automating GDPR Compliance using Policy Integrated Blockchain", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 1545 downloads.
- S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 3056 downloads.
- J. Sleeman, T. Finin, and M. Halem, "Temporal Understanding of Cybersecurity Threats", InProceedings, IEEE International Conference on Big Data Security on Cloud, May 2020, 950 downloads.
- R. Ayanzadeh, "Leveraging Artificial Intelligence to Advance Problem-Solving with Quantum Annealers", PhdThesis, University of Maryland, Baltimore County, May 2020, 836 downloads.
- D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 338 downloads.
- D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 400 downloads.
- T. W. Satyapanich, F. Ferraro, and T. Finin, "CASIE: Extracting Cybersecurity Event Information from Text", InProceedings, Proceeding of the 34th AAAI Conference on Artificial Intelligence, February 2020, 2075 downloads.
2019
- T. W. Satyapanich, T. Finin, and F. Ferraro, "Extracting Rich Semantic Information about Cybersecurity Events", InProceedings, Second Workshop on Big Data for CyberSecurity, held in conjunction with the IEEE Int. Conf. on Big Data, December 2019, 1008 downloads.
- T. W. Satyapanich, "Modeling and Extracting Information about Cybersecurity Events from Text", PhdThesis, University of Maryland, Baltimore County, December 2019, 756 downloads.
- N. Khurana, S. Mittal, A. Piplai, and A. Joshi, "Preventing Poisoning Attacks on AI based Threat Intelligence Systems", InProceedings, IEEE Machine Learning for Signal Processing, September 2019, 1044 downloads.
- K. Sane, K. P. Joshi, and S. Mittal, "A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services", InProceedings, IEEE International Conference on Web Services (IEEE ICWS) 2019, July 2019, 1339 downloads.
- A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 769 downloads.
- A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 1033 downloads.
- S. Mittal, A. Joshi, and T. Finin, "Cyber-All-Intel: An AI for Security Related Threat Intelligence", Misc, CoRR abs/1905.02895, May 2019, 231 downloads.
- S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-physical Systems", PhdThesis, University of Maryland, Baltimore County, May 2019, 415 downloads.
- S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 488 downloads.
- S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-Physical Systems", PhdThesis, May 2019, 246 downloads.
- S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, May 2019, 147 downloads.
- S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 1480 downloads.
- D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity", Article, Public Administration Review, February 2019, 1020 downloads.
2018
- S. N. Narayanan, K. Khanna, B. K. Panigrahi, and A. Joshi, "Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars", InBook, Smart Cities Cybersecurity and Privacy, December 2018, 965 downloads.
- L. Elluri, A. Nagar, and K. P. Joshi, "An Integrated Knowledge Graph to Automate GDPR and PCI DSS Compliance", IEEE International Conference on Big Data 2018, December 2018, 1672 downloads.
- P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1505 downloads.
- P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems", InProceedings, IEEE International Symposium on Technologies for Homeland Security, October 2018, 863 downloads.
- S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 3408 downloads.
- D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security", Article, Journal of Homeland Security and Emergency Management, September 2018, 466 downloads.
- L. Neil, S. Mittal, and A. Joshi, "Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, September 2018, 1477 downloads.
- V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 960 downloads.
- M. P. Joshi, K. P. Joshi, and T. Finin, "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems", InProceedings, International Conference on Cloud Computing, July 2018, 1989 downloads.
- A. Padia, A. Roy, T. W. Satyapanich, F. Ferraro, S. Pan, Y. Park, A. Joshi, and T. Finin, "UMBC at SemEval-2018 Task 8: Understanding Text about Malware", InProceedings, Proceedings of International Workshop on Semantic Evaluation (SemEval-2018), June 2018, 1097 downloads.
- A. Nagar and K. P. Joshi, "A Semantically Rich Knowledge Representation of PCI DSS for Cloud Services", InProceedings, 6th International IBM Cloud Academy Conference ICACON 2018, Japan, May 2018, 1516 downloads.
2017
- S. K. Singh, R. Bose, and A. Joshi, "Entropy Based Electricity Theft Detection in AMI Network", Article, IET Cyber-Physical Systems: Theory and Applications, October 2017, 1194 downloads.
- P. K. Das, A. Joshi, and T. Finin, "Personalizing context-aware access control on mobile platforms", InProceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017, 1835 downloads.
- S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", TechReport, arXiv, August 2017, 1574 downloads.
- P. K. Das, "Context-Dependent Privacy and Security Management on Mobile Devices", PhdThesis, Ph.D. Dissertation, August 2017, 1150 downloads.
- S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", Article, CoRR, August 2017, 1200 downloads.
- K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 894 downloads.
- D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity Challenges to American Local Governments", InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017, 1225 downloads.
- D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyber-Security at the Grassroots: Findings from a Nationwide Survey of Local Government CyberSecurity", InProceedings, 47th Annual Conference of the Urban Affairs Association, April 2017.
- , " UMBC/ICMA Survey of Local Government Cybersecurity Practices", TechReport, ICMA and UMBC, April 2017, 753 downloads.
- D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity 2016 Survey, Summary Report of Survey Results", TechReport, UMBC, April 2017, 148 downloads.
2016
- P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 1352 downloads.
- P. K. Das, D. Ghosh, P. Jagtap, A. Joshi, and T. Finin, "Preserving User Privacy and Security in Context-Aware Mobile Platforms", InBook, Mobile Application Development, Usability, and Security, October 2016, 1470 downloads.
- P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, "Semantic knowledge and privacy in the physical web", InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 2256 downloads.
- S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 1499 downloads.
- P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", Article, Social Network Analysis and Mining, September 2016, 1509 downloads.
- K. Khanna, B. K. Panigrahi, and A. Joshi, "Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit", Article, IET Transactions on Generation, Transmission and Distribution, September 2016, 1576 downloads.
- S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), August 2016, 4230 downloads.
- P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 1284 downloads.
- B. Thuraisingham, M. Kantarcioglu, K. Hamlen, L. Khan, T. Finin, A. Joshi, T. Oates, and E. Bertino, "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", InProceedings, IEEE Conference on Information Reuse and Integration,, July 2016, 1572 downloads.
- K. P. Joshi, Y. Yesha, and T. Finin, "An Ontology for a HIPAA compliant cloud service", InProceedings, 4th International IBM Cloud Academy Conference ICACON 2016, June 2016, 2194 downloads.
- P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 1872 downloads.
- D. S. Roche, A. Aviv, and S. Choi, "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.", InProceedings, IEEE Symposium on Security and Privacy, May 2016, 1424 downloads.
- Z. Syed, A. Padia, M. L. Mathews, T. Finin, and A. Joshi, "UCO: A Unified Cybersecurity Ontology", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security, February 2016, 3974 downloads.
- N. K. Sharma and A. Joshi, "Representing attribute based access control policies in OWL", InProceedings, Tenth International Conference on Semantic Computing (ICSC), February 2016, 1942 downloads.
2015
- Z. Syed, T. Finin, A. Padia, and M. L. Mathews, "Supporting Situationally Aware Cybersecurity Systems", TechReport, University of Maryland Baltimore County, September 2015, 1792 downloads.
- W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 1555 downloads.
- A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance", InProceedings, 8th International Conference on Cloud Computing (CLOUD), June 2015, 1350 downloads.
- D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015, 497 downloads.
- D. Norris, A. Joshi, and T. Finin, "Cyber-Security at the Grassroots: American State and Local Governments and the Management of Website Security", InProceedings, Proceedings of the Annual Conference of the Urban Affairs Association, April 2015.
2014
- K. P. Joshi, "Cloud Data Management Policies: Security and Privacy Checklist", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 1281 downloads.
- K. P. Joshi, M. Halem, Y. Yesha, J. E. Dorband, and e., "USM Community Cloud: VCL-based Academic Cloud", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 2296 downloads.
2013
- A. Joshi, R. Lal, T. Finin, and A. Joshi, "Extracting cybersecurity related linked data from text", InProceedings, Proceedings of the 7th IEEE International Conference on Semantic Computing, September 2013, 2492 downloads.
- P. Sharma, A. Joshi, and T. Finin, "Detecting Data Exfiltration by Integrating Information Across Layers", InProceedings, 14th IEEE International Conference on Information Reuse and Integration, August 2013, 1960 downloads.
- A. Joshi, "Linked Data for Software Security Concepts and Vulnerability Descriptions", MastersThesis, University of Maryland Baltimore County, July 2013, 1862 downloads.
- W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1898 downloads.
- R. Lal, "Information Extraction of Security related entities and concepts from unstructured text.", MastersThesis, University of Maryland Baltimore County, May 2013, 2362 downloads.
2012
- M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 2068 downloads.
- W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012, 127 downloads.
- S. More, M. L. Mathews, A. Joshi, and T. Finin, "A Knowledge-Based Approach To Intrusion Detection Modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 2393 downloads.
- D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1565 downloads.
- A. Joshi, T. Finin, K. P. Joshi, and M. Oberoi, "A Policy Driven Semantic Approach to Data Usage Management", InProceedings, Data Usage Management on the Web Workshop in conjunction with WWW 2012, April 2012, 1599 downloads.
- V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2012, 197 downloads.
- W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1693 downloads.
2011
- W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1933 downloads.
- P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1931 downloads.
- M. Oberoi, P. Jagtap, A. Joshi, T. Finin, and L. Kagal, "Information Integration and Analysis: A Semantic Approach to Privacy", InProceedings, Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust, October 2011, 1747 downloads.
- V. Mulwad, W. Li, A. Joshi, T. Finin, and K. Viswanathan, "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 3334 downloads.
- W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 2243 downloads.
- W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1810 downloads.
- A. Mahale, "Group Centric Information Sharing using Hierarchical Models", MastersThesis, UMBC, May 2011, 1638 downloads.
- P. Jagtap, "Privacy Preservation in Context Aware Systems", MastersThesis, May 2011, 1632 downloads.
- P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 2110 downloads.
- P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 2048 downloads, 1 citation.
2010
- P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 2005 downloads, 1 citation.
- W. Li, A. Joshi, and T. Finin, "SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks", TechReport, October 2010, 280 downloads.
- R. Schauer and A. Joshi, "A Probabilistic Approach to Distributed System Management", InProceedings, Proceedings of the Seventh International Conference on Autonomic Computing, June 2010, 1856 downloads.
- W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 3200 downloads, 7 citations.
2009
- C. Grasso, T. Finin, M. A. Grasso, Y. Yesha, and A. Joshi, "Intelligent Agents and UICDS", InProceedings, Workshop on Emergency Management: Incident, Resource and Supply Chain Management, November 2009, 139 downloads.
- W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 3157 downloads, 4 citations.
- A. Joshi, Y. Yesha, T. Finin, W. Li, and P. A. Kodeswaran, "A Policy and Trust Driven Framework for Securing Cyber Physical Systems", InProceedings, Workshop on Future Directions in Cyber-physical Systems Security, July 2009, 338 downloads.
- W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 2115 downloads, 7 citations.
- W. Jensen and V. Korolev, "A Location-Based Mechanism for Mobile Device Security", InProceedings, Lecture Notes in Artificial Intelligence, March 2009.
2008
- W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2321 downloads, 1 citation.
- A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2801 downloads, 1 citation.
- J. Martineau and P. A. Kodeswaran, "SecurePass: Guarding sensitive information from untrusted machines", TechReport, September 2008, 1877 downloads.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 7668 downloads, 61 citations.
- P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and F. Perich, "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 1787 downloads.
- P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2597 downloads.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Role Based Access Control and OWL", InProceedings, Proceedings of the fourth OWL: Experiences and Directions Workshop, April 2008, 3259 downloads.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 3164 downloads.
2007
- , "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability", Proceedings, November 2007, 2705 downloads.
- S. B. Kodeswaran, P. A. Kodeswaran, A. Joshi, and F. Perich, "Utilizing Semantic Policies for Secure BGP Route Dissemination", TechReport, September 2007, 2568 downloads.
- A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3406 downloads, 16 citations.
2006
- T. Finin, L. Kagal, and D. Olmedilla, "Report on the Models of Trust for the Web Workshop", Article, SIGMOD Record, December 2006, 995 downloads.
- N. Vartak, A. Patwardhan, A. Joshi, T. Finin, and P. Nagy, "Protecting the privacy of passive RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 3308 downloads.
- A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4239 downloads, 5 citations.
- P. Kolari, T. Finin, Y. Yesha, K. Lyons, J. Hawkins, and S. Perelgut, "Policy Management of Enterprise Systems: A Requirements Study", InProceedings, Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, June 2006, 5754 downloads, 4 citations.
- L. Kagal, T. Finin, A. Joshi, and S. Greenspan, "Security and Privacy Challenges in Open and Dynamic Environments", Article, Computer, June 2006, 3159 downloads.
- P. Kolari, Y. Yesha, K. Lyons, S. Perelgut, J. Hawkins, and T. Finin, "Policy Management of Enterprise Systems: A Requirements Study", TechReport, TR-CS-06-02, March 2006, 3113 downloads.
- J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 2065 downloads, 1 citation.
2005
- A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3655 downloads, 11 citations.
- L. Kagal, T. Finin, and J. A. Hendler, "Proceedings of the Semantic Web and Policy Workshop", Proceedings, November 2005, 5072 downloads.
- S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 3459 downloads.
- H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for Agents: Theory and Experiences, July 2005, 6338 downloads, 70 citations.
- R. Masuoka, M. Chopra, Z. Song, Y. K. Labrou, L. Kagal, and T. Finin, "Policy-based Access Control for Task Computing Using Rei", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 3162 downloads, 15 citations.
- M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 2902 downloads.
- L. Ding, P. Kolari, T. Finin, A. Joshi, Y. Peng, and Y. Yesha, "On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework", InProceedings, Proceedings of the AAAI SPring Symposium on AI Technologies for Homeland Security, March 2005, 4494 downloads, 32 citations.
- A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7533 downloads, 96 citations.
- G. Denker, L. Kagal, and T. Finin, "Security in the Semantic Web using OWL", Article, Elsevier Information Security Technical Report, January 2005, 641 downloads.
- L. Kagal, T. Finin, and A. Joshi, "Towards a Well-Behaved Web", TechReport, UMBC, January 2005, 120 downloads.
2004
- L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.
- H. Chen, T. Finin, A. Joshi, F. Perich, D. Chakraborty, and L. Kagal, "Intelligent Agents Meet the Semantic Web in Smart Spaces", Article, IEEE Internet Computing, November 2004, 5553 downloads, 156 citations.
- L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 8718 downloads, 23 citations.
- W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
- L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", PhdThesis, University of Maryland Baltimore County, September 2004, 10 citations.
- H. Chen, F. Perich, T. Finin, and A. Joshi, "SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 11983 downloads, 342 citations.
- A. Patwardhan, V. Korolev, L. Kagal, and A. Joshi, "Enforcing Policies in Pervasive Environments", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 5695 downloads, 30 citations.
- D. Khushraj, O. Lassila, and T. Finin, "sTuples: Semantic Tuple Spaces", InProceedings, First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’04), August 2004, 3336 downloads, 73 citations.
- H. Chen, F. Perich, D. Chakraborty, T. Finin, and A. Joshi, "Intelligent Agents Meet Semantic Web in a Smart Meeting Room", InProceedings, Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004), July 2004, 6025 downloads, 81 citations.
- A. B. Shah, L. Kagal, T. Finin, and A. Joshi, "Policy Development Software for Security Policies", InProceedings, DIAMACS Workshop on Usable Privacy and Security Software, July 2004, 133 downloads.
- L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", Article, IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2923 downloads, 1 citation.
- H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 2006 downloads, 70 citations.
- M. Cornwell, J. E. Just, and L. Kagal, "Autonomic Policy-Based Collaboration for Cross-Agency Human Teams", InProceedings, Conference on the Human Impact and Application of Autonomic Computing Systems (CHIACS2), April 2004, 3907 downloads.
- L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", InProceedings, First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 9614 downloads, 1 citation.
- , "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 7429 downloads.
- D. Khushraj, "Semantic Tuple Spaces: A Coordination", MastersThesis, University of Maryland, Baltimore County, January 2004.
- A. Joshi, T. Finin, and J. Pinkston, "Using DAML+ OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, January 2004, 1474 downloads, 3 citations.
- S. Avancha, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 3906 downloads, 52 citations.
2003
- S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3697 downloads, 30 citations.
- F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4582 downloads, 44 citations.
- D. Khushraj, T. Finin, and A. Joshi, "Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments", InProceedings, Proceedings of the Second International Semantic Web Conference , September 2003, 3 citations.
- G. Denker, L. Kagal, T. Finin, K. Sycara, and M. Paoucci, "Security for DAML Web Services: Annotation and Matchmaking", InProceedings, Second International Semantic Web Conference, September 2003, 4519 downloads, 125 citations.
- L. Kagal, T. Finin, and A. Joshi, "A Policy Based Approach to Security for the Semantic Web", InProceedings, 2nd International Semantic Web Conference (ISWC2003), September 2003, 11660 downloads, 218 citations.
- A. Joshi and J. Pinkston, "Modeling Computer Attacks: An Ontology for Intrusion Detection", InProceedings, The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 4863 downloads, 19 citations.
- W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003, 115 downloads.
- J. Pinkston, A. Joshi, and T. Finin, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 1768 downloads, 50 citations.
- W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
- W. Jensen, T. Karygiannis, M. Iorga, S. Gavrila, and V. Korolev, "Security Policy Management for Handheld Devices", InProceedings, Security and Management (SAM'03),, June 2003, 1380 downloads.
- L. Kagal, T. Finin, and A. Joshi, "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 5078 downloads, 341 citations.
- A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1662 downloads, 21 citations.
- W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 956 downloads.
- A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 3497 downloads, 4 citations.
- A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 126 downloads, 51 citations.
2002
- T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent Agents for Mobile and Embedded Devices", Article, International Journal of Cooperative Information Systems, December 2002, 3990 downloads, 17 citations.
- T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1535 downloads.
- L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5740 downloads, 30 citations.
- L. Kagal, "Rei : A Policy Language for the Me-Centric Project", TechReport, HP Labs, September 2002, 4243 downloads.
- F. Perich and C. Nicholas, "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", TechReport, University of Maryland, Baltimore County, September 2002, 5837 downloads.
- T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 1678 downloads.
- L. Kagal, F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 5490 downloads, 11 citations.
- L. Kagal, "An Agent Approach to Security for Pervasive Computing Environments", InProceedings, Doctoral Consortium, The Eighteenth National Conference on Artificial Intelligence (AAAI 02), July 2002.
- L. Kagal, T. Finin, and A. Joshi, "Developing Secure Agent Systems Using Delegation Based Trust Management", InProceedings, Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002) , July 2002, 5493 downloads, 38 citations.
- W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002, 108 downloads.
- A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, International Workshop on Web Services, E-Business, and the Semantic Web, May 2002, 906 downloads.
- A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure and Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, Proceedings of the Web Services, E-Business, and the Semantic Web Workshop, May 2002, 156 downloads.
- L. Kagal, T. Finin, and A. Joshi, "On Security in Open Multi-Agent Systems", TechReport, UMBC, March 2002, 303 downloads.
2001
- L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 9397 downloads, 214 citations.
- T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, and V. Korolev, "Information Agents for Mobile and Embedded Devices", InProceedings, Proceedings of the Fifth International Workshop Cooperative Information Agents, September 2001, 4773 downloads, 17 citations.
- A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 4532 downloads.
- L. Kagal, T. Finin, and Y. Peng, "A Delegation Based Model for Distributed Trust", InProceedings, Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, August 2001, 1349 downloads, 69 citations.
- L. Kagal, T. Finin, R. S. Cost, and Y. Peng, "A Framework for Distributed Trust Management", InProceedings, Second Workshop on Norms and Institutions in multi-agent systems, May 2001, 4023 downloads, 1 citation.
1998
- M. A. Rabi, T. Finin, A. Sherman, and Y. K. Labrou, "Secure Knowledge Query Manipulation Language: a security infrastructure for agent communication languages", TechReport, UMBC, November 1998, 120 downloads.
- A. Joshi and V. Subramanyam, "Security in Mobile Systems", InProceedings, Workshop on Security in Large Scale Distributed Systems, IEEE SRDS, October 1998, 149 downloads, 6 citations.
- M. A. Rabi, "Relationships among security and algebraic properties of cryptographic objects, and a security infrastructure for agent communication languages", PhdThesis, University of Maryland, Baltimore County, July 1998, 423 downloads.
- Q. He, K. Sycara, and T. Finin, "Personal Security Agent: KQML-based PKI", InProceedings, Proceedings of the 2nd International Conference on Autonomous Agents, May 1998, 2460 downloads, 49 citations.
Old Events
- Modeling and Extracting information about Cybersecurity Events from Text
May 16, 2017 - Semantic knowledge and privacy in the physical web
September 27, 2016 - Are you in control or being controlled in your vehicle?
October 26, 2015 - Attribute-based Fine Grained Access Control for Triple Stores
September 14, 2015 - Semantics for Cybersecurity and Privacy
May 1, 2015 - Semantics for Big Data (,) Security and Privacy
September 16, 2014 - Extracting cybersecurity related entities, terms and concepts from text
May 28, 2013 - MS defense: Social Media Analytics: Digital Footprints
May 13, 2013 - A Collaborative Approach to Situational Awareness for CyberSecurity
April 29, 2013 - Social Media Analytics: Digital Footprints
April 15, 2013