Tags: tac

Refereed Publications

2019

  1. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 68 downloads.
  2. R. Ayanzadeh, M. Halem, and T. Finin, "SAT-based Compressive Sensing", Article, arXiv:1903.03650 [cs.IT], March 2019, 35 downloads.
  3. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity", Article, Public Administration Review, February 2019, 45 downloads.
  4. R. Ayanzadeh, S. Mousavi, M. Halem, and T. Finin, "Quantum Annealing Based Binary Compressive Sensing with Matrix Uncertainty", Article, arXiv:1901.00088 [cs.IT], January 2019, 118 downloads.

2018

  1. A. Renjan, K. P. Joshi, S. N. Narayanan, and A. Joshi, "DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 246 downloads.
  2. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems", InProceedings, IEEE International Symposium on Technologies for Homeland Security, October 2018, 185 downloads.
  3. S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 533 downloads.
  4. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security", Article, Journal of Homeland Security and Emergency Management, September 2018.
  5. L. Neil, S. Mittal, and A. Joshi, "Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, September 2018, 309 downloads.
  6. V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 161 downloads.
  7. A. Padia, F. Ferraro, and T. Finin, "KG Cleaner: Identifying and Correcting Errors Produced by Information Extraction Systems", InCollection, arXiv, August 2018, 95 downloads.
  8. N. Khurana, S. Mittal, and A. Joshi, "Preventing Poisoning Attacks on AI based Threat Intelligence Systems", July 2018, 197 downloads.

2017

  1. T. Finin, D. Lawrie, J. Mayfield, P. McNamee, and C. Costello, "Participation in TAC KBP 2017: Cold Start TEDL and Low-resource EDL", InProceedings, Proceedings of the 2017 Text Analysis Workshop, November 2017, 223 downloads.
  2. S. K. Singh, R. Bose, and A. Joshi, "Entropy Based Electricity Theft Detection in AMI Network", Article, IET Cyber-Physical Systems: Theory and Applications, October 2017, 469 downloads.
  3. K. Khanna and A. Joshi, "AI based approach to identify compromised meters in data integrity attacks on smart grid", Article, IET Generation, Transmission and Distribution, October 2017, 299 downloads.
  4. F. Ferraro, A. Poliak, R. Cotterell, and B. Van Durme, "Frame-Based Continuous Lexical Semantics through Exponential Family Tensor Factorization and Semantic Proto-Roles", InProceedings, Proceedings of the Sixth Joint Conference on Lexical and Computational Semantics (*SEM), August 2017, 156 downloads.
  5. S. K. Singh, K. Khanna, R. Bose, and A. Joshi, "Joint transformation based detection of false data injection attacks in smart grid", Article, IEEE Transactions on Industrial Informatics, June 2017, 360 downloads.
  6. K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 264 downloads.
  7. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity Challenges to American Local Governments", InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017, 345 downloads.

2016

  1. K. Khanna and A. Joshi, "Bid Modification Attack in Smart Grid for Monetary Benefits", InProceedings, 2016 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), December 2016, 230 downloads.
  2. K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 255 downloads.
  3. T. Finin, D. Lawrie, J. Mayfield, P. McNamee, J. Laspesa, and M. Latman, "HLTCOE Participation in TAC KBP 2016: Cold Start and EDL", InProceedings, Proceedings of the 2016 Text Analysis Workshop, November 2016, 672 downloads.
  4. T. W. Satyapanich and T. Finin, "Event Nugget Detection Task: UMBC systems", InProceedings, Proceedings of the 9th Text Analysis Worksho, November 2016, 579 downloads.
  5. P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 655 downloads.
  6. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 823 downloads.
  7. K. Khanna, B. K. Panigrahi, and A. Joshi, "Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit", Article, IET Transactions on Generation, Transmission and Distribution, September 2016, 834 downloads.
  8. P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 577 downloads.
  9. B. Thuraisingham, M. Kantarcioglu, K. Hamlen, L. Khan, T. Finin, A. Joshi, T. Oates, and E. Bertino, "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", InProceedings, IEEE Conference on Information Reuse and Integration,, July 2016, 841 downloads.
  10. S. N. Narayanan, S. Mittal, and A. Joshi, "OBD SecureAlert: An Anomaly Detection System for Vehicles", InProceedings, IEEE Workshop on Smart Service Systems (SmartSys 2016), May 2016, 749 downloads.
  11. D. S. Roche, A. Aviv, and S. Choi, "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.", InProceedings, IEEE Symposium on Security and Privacy, May 2016, 762 downloads.
  12. K. Khanna and A. Joshi, "Feasibility and mitigation of false data injection attacks in smart grid", InProceedings, IEEE 6th International Conference on Power Systems (ICPS), 2016 , March 2016, 242 downloads.
  13. M. L. Mathews, A. Joshi, and T. Finin, "Detecting Botnets Using a Collaborative Situational-aware IDPS", InProceedings, Second International Conference on Information Systems Security and Privacy, February 2016, 1028 downloads.

2015

  1. Y. Huang, Y. Yesha, and S. Zhou, "A database-based distributed computation architecture with Accumulo and D4M: An application of eigensolver for large sparse matrix", InProceedings, IEEE International Conference on Big Data, November 2015, 675 downloads.
  2. T. W. Satyapanich and T. Finin, "Event Nugget Detection using Thresholding and Classification Techniques", InProceedings, Eighth Text Analysis Conference, November 2015, 485 downloads.
  3. T. Finin, D. Lawrie, P. McNamee, J. Mayfield, D. Oard, N. Peng, N. Gao, Y. Lin, J. MacKin, and T. Dowd, "HLTCOE Participation in TAC KBP 2015: Cold Start and TEDL", InProceedings, Eighth Text Analysis Conference, November 2015, 427 downloads.
  4. W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 883 downloads.
  5. P. Nimbalkar, "Semantic Interpretation of Structured Log Files", MastersThesis, University of Maryland, Baltimore County, August 2015, 588 downloads.
  6. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015.
  7. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015, 478 downloads.

2014

  1. J. Mayfield, P. McNamee, C. Harmon, T. Finin, and D. Lawrie, "KELVIN: Extracting Knowledge from Large Text Collections", InProceedings, AAAI Fall Symposium on Natural Language Access to Big Data, November 2014, 967 downloads.
  2. T. Finin, P. McNamee, D. Lawrie, J. Mayfield, and C. Harmon, "Hot Stuff at Cold Start: HLTCOE participation at TAC 2014", InProceedings, Proceedings of the 7th Text Analysis Conference, October 2014, 726 downloads.

2013

  1. J. Lee, K. Jung, B. Kim, Y. Peng, and H. Cho, "Semantic web-based supplier discovery system for building a long-term supply chain", Article, International Journal of Computer Integrated Manufacturing, November 2013.
  2. P. McNamee, T. Finin, D. Lawrie, and J. Mayfield, "HLTCOE Participation at TAC 2013", InProceedings, Proceedings of the Sixth Text Analysis Conference, November 2013, 613 downloads.
  3. A. Joshi, R. Lal, T. Finin, and A. Joshi, "Extracting cybersecurity related linked data from text", InProceedings, Proceedings of the 7th IEEE International Conference on Semantic Computing, September 2013, 1537 downloads.
  4. P. Sharma, A. Joshi, and T. Finin, "Detecting Data Exfiltration by Integrating Information Across Layers", InProceedings, 14th IEEE International Conference on Information Reuse and Integration, August 2013, 1270 downloads.
  5. A. Joshi, "Linked Data for Software Security Concepts and Vulnerability Descriptions", MastersThesis, University of Maryland Baltimore County, July 2013, 1228 downloads.
  6. P. McNamee, J. Mayfield, T. Finin, T. Oates, D. Lawrie, T. Xu, and D. Oard, "KELVIN: a tool for automated knowledge base construction", InProceedings, Proc. Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, June 2013, 897 downloads.
  7. R. Lal, "Information Extraction of Security related entities and concepts from unstructured text.", MastersThesis, University of Maryland Baltimore County, May 2013, 1126 downloads.

2012

  1. P. McNamee, v. Stoyanov, J. Mayfield, T. Finin, T. Oates, T. Xu, D. Oard, and D. Lawrie, "HLTCOE Participation at TAC 2012: Entity Linking and Cold Start Knowledge Base Construction", InProceedings, Proceedings of the Fifth Text Analysis Conference (TAC 2012), November 2012, 761 downloads.
  2. M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1417 downloads.
  3. S. More, M. L. Mathews, A. Joshi, and T. Finin, "A Semantic Approach to Situational Awareness for Intrusion Detection", InProceedings, Proceedings of the National Symposium on Moving Target Research, June 2012, 2259 downloads.
  4. J. Mayfield and T. Finin, "Evaluating the Quality of a Knowledge Base Populated from Text", InProceedings, Joint Workshop on Automatic Knowledge Base Construction and Web-scale Knowledge Extraction, June 2012, 2798 downloads.
  5. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012.
  6. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1099 downloads.

2011

  1. V. Mulwad, T. Finin, and A. Joshi, "Generating Linked Data by Inferring the Semantics of Tables", InProceedings, Proceedings of the First International Workshop on Searching and Integrating New Web Data Sources, September 2011, 2463 downloads.
  2. V. Mulwad, W. Li, A. Joshi, T. Finin, and K. Viswanathan, "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 2519 downloads.

2010

  1. I. Mayk, A. Patwardhan, and e., "Tactical Information Technology for Assured Network Operations Information Dissemination and Management for Battle Command Support Services", InProceedings, Proceedings of the 27th Army Science Conference, November 2010, 987 downloads.

2009

  1. P. A. Kodeswaran and A. Joshi, "Towards a Declarative Framework For Managing Application and Network Adaptations", Proceedings, IEEE GlobeCom, December 2009, 1448 downloads.
  2. D. Chinavle, P. Kolari, T. Oates, and T. Finin, "Ensembles in Adversarial Classification for Spam", InProceedings, Proceedings of the 18th ACM Conference on Information and Knowledge Management, November 2009, 3337 downloads, 1 citation.
  3. P. McNamee, M. Dredze, A. Gerber, N. Garera, T. Finin, J. Mayfield, C. Piatko, D. Rao, D. Yarowsky, and M. Dreyer, "HLTCOE Approaches to Knowledge Base Population at TAC 2009", InProceedings, Proceedings of the 2009 Text Analysis Conference, November 2009, 1031 downloads, 6 citations.
  4. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1582 downloads, 7 citations.

2008

  1. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 1799 downloads, 1 citation.
  2. Y. Shi, "An Investigation of Linguistic Information for Speech Recognition Error Detection", PhdThesis, University of Maryland, Baltimore County, October 2008, 2920 downloads.
  3. A. Karandikar, A. Java, A. Joshi, T. Finin, Y. Yesha, and Y. Yesha, "Second Space: A Generative Model For The Blogosphere", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2008), March 2008, 4079 downloads, 1 citation.
  4. K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2292 downloads.

2007

  1. M. Halem, Y. Yesha, C. Tilmes, D. Chapman, M. Goldberg, and L. Zhou, "A Web Service Tool (SOAR) for the Dynamic Generation of L1 Grids of Coincident AIRS, AMSU and MODIS Satellite Sounding Radiance Data for Climate Studies", Article, EOS Transactions, June 2007.
  2. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 2778 downloads, 16 citations.
  3. A. Karandikar, "Generative Model To Construct Blog and Post Networks In Blogosphere", MastersThesis, University of Maryland at Baltimore County, May 2007, 7795 downloads, 3 citations.
  4. A. Java, "A Framework for Modeling Influence, Opinions and Structure in Social Media", InProceedings, 22nd Conference on Artificial Intelligence (AAAI 2007), April 2007, 4479 downloads, 4 citations.
  5. P. Kolari, A. Java, and A. Joshi, "Spam in Blogs and Social Media, Tutorial", InProceedings, ICWSM 2007, March 2007, 2950 downloads, 3 citations.

2006

  1. J. Parker, A. Patwardhan, and A. Joshi, "Cross-layer Analysis for Detecting Wireless Misbehaviour", Proceedings, IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 3733 downloads, 13 citations.

2005

  1. S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 2849 downloads.
  2. V. Parekh, "Applying Ontologies and Semantic Web technologies to Environmental Sciences and Engineering", MastersThesis, University of Maryland, Baltimore County, May 2005, 13124 downloads, 1 citation.
  3. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 6818 downloads, 96 citations.

2004

  1. Z. Ding, Y. Peng, and R. Pan, "A Bayesian Approach to Uncertainty Modeling in OWL Ontology", InProceedings, Proceedings of the International Conference on Advances in Intelligent Systems - Theory and Applications, November 2004, 3545 downloads, 2 citations.
  2. L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 7566 downloads, 23 citations.
  3. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  4. L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", PhdThesis, University of Maryland Baltimore County, September 2004, 10 citations.
  5. A. Patwardhan, V. Korolev, L. Kagal, and A. Joshi, "Enforcing Policies in Pervasive Environments", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 5153 downloads, 30 citations.
  6. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 4443 downloads, 15 citations.
  7. J. Undercofer, "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 6829 downloads.
  8. J. Undercofer, A. Joshi, T. Finin, and J. Pinkston, "Using DAML+ OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, January 2004, 744 downloads, 3 citations.
  9. Z. Ding and Y. Peng, "A Probabilistic Extension to Ontology Language OWL", InProceedings, Proceedings of the 37th Hawaii International Conference On System Sciences (HICSS-37)., January 2004, 5493 downloads, 154 citations.

2003

  1. Y. Zou, T. Finin, L. Ding, H. Chen, and R. Pan, "Using Semantic web technology in Multi-Agent systems: a case study in the TAGA Trading agent environment", InProceedings, Proceeding of the 5th International Conference on Electronic Commerce, September 2003, 3499 downloads, 47 citations.
  2. J. Undercofer, A. Joshi, and J. Pinkston, "Modeling Computer Attacks: An Ontology for Intrusion Detection", InProceedings, The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 3727 downloads, 19 citations.
  3. L. Ding, Y. Shi, Y. Zou, Z. Ding, and R. Pan, "Strategies and heuristics used by the UMBCTAC agent in the third Trading Agent Competition", InProceedings, Workshop on Trading Agent Design and Analysis, held in conjunction with the Eighteenth International Joint Conference on Artificial Intelligence, August 2003, 2483 downloads, 3 citations.
  4. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003.
  5. A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 2723 downloads, 4 citations.
  6. A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 51 citations.

2002

  1. M. Gandhe, T. Finin, and B. Grosof, "SweetJess: Translating DamlRuleML to Jess", InProceedings, International Workshop on Rule Markup Languages for Business Rules on the Semantic Web in conjunction with ISWC2002, June 2002, 2320 downloads, 51 citations.

2000

  1. Y. K. Labrou and T. Finin, "History, State of the Art and Challenges for Agent Communication Languages", Article, Informatik/Informatique, January 2000, 2118 downloads, 9 citations.

1995

  1. M. A. Grasso, "Automated speech recognition in medical applications", Article, MD Computing, January 1995, 15 citations.

Non-Refereed Publications

2015

  1. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Data Analytics to Detect Anomalous States in Vehicles", TechReport, December 2015, 575 downloads.

2003

  1. B. Grosof, M. Gandhe, and T. Finin, "SweetJess: Inferencing in Situated Courteous RuleML via Translation to and from Jess Rules", TechReport, May 2003, 1766 downloads.

2002

  1. L. Ding, Y. Shi, Z. Ding, and R. Pan, "UMBCTAC: A Balanced Bidding Agent", TechReport, UMBC Technical Report TR-02-15, December 2002, 3818 downloads.

Web Site

  1. TAGA