Tags: uri

Publications

2022

  1. R. Ayanzadeh, J. E. Dorband, M. Halem, and T. Finin, "Quantum-Assisted Greedy Algorithms", InProceedings, Proceedings of the International Geoscience and Remote Sensing Symposium (IGARSS), July 2022.
  2. C. Hanks, M. Maiden, P. Ranade, T. Finin, and A. Joshi, "CyberEnt: Extracting Domain Specific Entities from Cybersecurity Text,", InProceedings, Mid-Atlantic Student Colloquium on Speech, Language and Learning, April 2022, 147 downloads.
  3. A. Kotal, A. Piplai, S. Chukkapalli, and A. Joshi, "PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data", InProceedings, ACM International Workshop on Security and Privacy Analytics, April 2022, 93 downloads.
  4. C. Hanks and M. Maiden, "CyNER: A Cybersecurity Domain Specific Dataset for Named Entity Recognition", Misc, UMBC Undergraduate Research and Creative Achievement Day, April 2022, 23 downloads.
  5. S. Mitra, A. Piplai, S. Mittal, and A. Joshi, "Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs", IEEE International Conference on Big Data 2021, January 2022, 244 downloads.

2021

  1. M. Halem, K. Patel, Z. Yang, and J. Sleeman, "The Use of Machine Learning to Infer the Transport Influence of US West Coast WildFires on the US East Coast Planetary Boundary Layer", InProceedings, AGU Fall Meeting 2021, December 2021.
  2. P. Ranade, A. Piplai, A. Joshi, and T. Finin, "CyBERT: Contextualized Embeddings for the Cybersecurity Domain", InProceedings, IEEE International Conference on Big Data, December 2021, 414 downloads.
  3. S. Dasgupta, A. Piplai, P. Ranade, and A. Joshi, "Cybersecurity Knowledge Graph Improvement with Graph Neural Networks", InProceedings, International Conference on Big Data, December 2021, 107 downloads.
  4. D. L. Kim, L. Elluri, and K. P. Joshi, "Trusted Compliance Enforcement Framework for Sharing Health Big Data", InProceedings, IEEE BigData 2021 4th Special Session on HealthCare Data, December 2021, 88 downloads.
  5. J. Sleeman, I. Stajner, C. Keller, M. Halem, C. Hamer, R. Montuoro, B. Baker, and e., "The Integration of Artificial Intelligence for Improved Operational Air Quality Forecasting", InProceedings, AGU Fall Meeting 2021, December 2021.
  6. P. Schubel, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases", InProceedings, IEEE International Conference on Bioinformatics and Biomedicine (BIBM) 2021, December 2021, 38 downloads.
  7. L. Elluri, S. Chukkapalli, K. P. Joshi, T. Finin, and A. Joshi, "A BERT Based Approach to Measure Web Services Policies Compliance With GDPR", Article, IEEE Access, November 2021, 217 downloads.
  8. K. Sane, K. P. Joshi, and S. Mittal, "Semantically Rich Framework to Automate Cyber Insurance Services", Article, IEEE Transactions on Services Computing, November 2021, 147 downloads.
  9. A. Kotal, A. Joshi, and K. P. Joshi, "The Effect of Text Ambiguity on creating Policy Knowledge Graphs", InProceedings, IEEE International Conference on Big Data and Cloud Computing (BDCloud 2021), September 2021, 209 downloads.
  10. K. Patel, J. Sleeman, and M. Halem, "Physics-aware deep edge detection network", InProceedings, Proceedings Volume 11859, Remote Sensing of Clouds and the Atmosphere XXVI; SPIE Remote Sensing, September 2021, 48 downloads.
  11. R. Walid, K. P. Joshi, and S. Choi, "Secure Cloud EHR with Semantic Access Control, Searchable Encryption and Attribute Revocation", InProceedings, IEEE International Conference on Digital Health (ICDH) 2021 in IEEE World Congress on Services 2021, September 2021, 173 downloads.
  12. R. Razavisousan and K. P. Joshi, "Analyzing GDPR compliance in Cloud Services' privacy policies using Textual Fuzzy Interpretive Structural Modeling (TFISM)", InProceedings, IEEE International Services Computing Conference (SCC) 2021 in IEEE World Congress on Services 2021, September 2021, 154 downloads.
  13. S. Chukkapalli, N. Pillai, S. Mittal, and A. Joshi, "Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2021, August 2021, 143 downloads.
  14. L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 133 downloads.
  15. P. Ranade, A. Piplai, S. Mittal, A. Joshi, and T. Finin, "Generating Fake Cyber Threat Intelligence Using Transformer-Based Models", Proceedings, International Joint Conference on Neural Networks (IJCNN 2021), July 2021, 372 downloads.
  16. P. Ranade, A. Joshi, and T. Finin, "Study shows AI-generated fake cybersecurity reports fool experts", Article, The Conversation, June 2021, 82 downloads.
  17. M. Rezaee and F. Ferraro, "Event Representation with Sequential, Semi-Supervised Discrete Variables", InProceedings, Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL), June 2021, 392 downloads.
  18. J. Sleeman, T. Finin, and M. Halem, "Understanding Cybersecurity Threat Trends through Dynamic Topic Modeling", Article, Frontiers in Big Data, June 2021, 87 downloads.
  19. A. Nagar, L. Elluri, and K. P. Joshi, "Automated Compliance of Mobile Wallet Payments for Cloud Services", InProceedings, 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), May 2021, 192 downloads.
  20. N. Pillai, C. Matuszek, and F. Ferraro, "Measuring Perceptual and Linguistic Complexity in Multilingual Grounded Language Data", InProceedings, 34th International FLAIRS Conference (FLAIRS-34), May 2021, 170 downloads.
  21. S. Chukkapalli, S. Aziz, N. Alotaibi, S. Mittal, M. Gupta, and M. Abdelsalam, "Ontology driven AI and Access Control Systems for Smart Fisheries", TechReport, January 2021, 295 downloads.

2020

  1. L. Elluri, K. P. Joshi, and A. Kotal, "Measuring Semantic Similarity across EU GDPR Regulation and Cloud Privacy Policies", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 272 downloads.
  2. R. Walid, K. P. Joshi, S. Choi, and D. L. Kim, "Cloud-based Encrypted EHR System with Semantically Rich Access Control and Searchable Encryption", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 272 downloads.
  3. S. Dasgupta, A. Piplai, A. Kotal, and A. Joshi, "A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 652 downloads.
  4. A. Piplai, S. Mittal, A. Joshi, T. Finin, J. Holt, and R. Zak, "Creating Cybersecurity Knowledge Graphs from Malware After Action Reports", Proceedings, IEEE Access Journal, December 2020, 733 downloads.
  5. A. Piplai, P. Ranade, A. Kotal, S. Mittal, S. N. Narayanan, and A. Joshi, "Using Knowledge Graphs and Reinforcement Learning for Malware Analysis", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 619 downloads.
  6. A. Piplai, S. Mittal, M. Abdelsalam, M. Gupta, A. Joshi, and T. Finin, "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2020, November 2020, 293 downloads.
  7. J. Clavin, V. P. Janeja, K. P. Joshi, Y. Yesha, S. Duan, H. Zhang, L. Erickson, and J. D. Li, "Blockchains for Government: Use Cases and Challenges", Article, Digital Government: Research and Practice, November 2020, 325 downloads.
  8. K. P. Joshi, L. Elluri, and A. Nagar, "An Integrated Knowledge Graph to Automate Cloud Data Compliance", Article, IEEE Access, November 2020, 248 downloads.
  9. A. Kotal, K. P. Joshi, and A. Joshi, "ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services", InProceedings, IEEE International Conference on Cloud Computing (CLOUD), 2020, October 2020, 308 downloads.
  10. S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2020, October 2020, 262 downloads.
  11. S. Sontowski, M. Gupta, S. Chukkapalli, M. Abdelsalam, S. Mittal, A. Joshi, and R. Sandhu, "Cyber Attacks on Smart Farming Infrastructure", InProceedings, 6th IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2020), October 2020, 577 downloads.
  12. S. N. Narayanan, A. Joshi, and R. Bose, "ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems", InProceedings, IEEE Transactions on Dependable and Secure Computing, October 2020, 252 downloads.
  13. Z. Boukouvalas, C. Mallinson, E. Crothers, N. Japkowicz, A. Piplai, S. Mittal, A. Joshi, and T. Adali, "Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19", Article, arXiv:2006.01284 [cs.LG], June 2020, 173 downloads.
  14. A. Mahindrakar and K. P. Joshi, "Automating GDPR Compliance using Policy Integrated Blockchain", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 1095 downloads.
  15. S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 1653 downloads.
  16. J. Sleeman, T. Finin, and M. Halem, "Temporal Understanding of Cybersecurity Threats", InProceedings, IEEE International Conference on Big Data Security on Cloud, May 2020, 559 downloads.
  17. R. Ayanzadeh, "Leveraging Artificial Intelligence to Advance Problem-Solving with Quantum Annealers", PhdThesis, University of Maryland, Baltimore County, May 2020, 471 downloads.
  18. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 67 downloads.
  19. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 64 downloads.
  20. T. W. Satyapanich, F. Ferraro, and T. Finin, "CASIE: Extracting Cybersecurity Event Information from Text", InProceedings, Proceeding of the 34th AAAI Conference on Artificial Intelligence, February 2020, 1259 downloads.

2019

  1. R. Razavisousan and K. P. Joshi, "Two Tier Analysis of Social Media Collaboration for Student Migration", InProceedings, IEEE International Conference on Collaboration and Internet Computing (IEEE CIC), 2019, December 2019, 314 downloads.
  2. T. W. Satyapanich, T. Finin, and F. Ferraro, "Extracting Rich Semantic Information about Cybersecurity Events", InProceedings, Second Workshop on Big Data for CyberSecurity, held in conjunction with the IEEE Int. Conf. on Big Data, December 2019, 644 downloads.
  3. R. Ayanzadeh, M. Halem, J. E. Dorband, and T. Finin, "Quantum-Assisted Greedy Algorithms", Article, arXiv:1912.02362 [quant-ph], December 2019, 262 downloads.
  4. T. W. Satyapanich, "Modeling and Extracting Information about Cybersecurity Events from Text", PhdThesis, University of Maryland, Baltimore county, December 2019, 204 downloads.
  5. A. Padia, "Joint Models to Refine Knowledge Graphs", PhdThesis, University of Maryland, Baltimore County, December 2019, 207 downloads.
  6. A. Padia, "Joint Models to Refine Knowledge Graphs", PhdThesis, October 2019, 355 downloads.
  7. N. Khurana, S. Mittal, A. Piplai, and A. Joshi, "Preventing Poisoning Attacks on AI based Threat Intelligence Systems", InProceedings, IEEE Machine Learning for Signal Processing, September 2019, 793 downloads.
  8. S. Mousavi, M. Rezaee, and R. Ayanzadeh, "A Survey on Compressive Sensing: Classical Results and Recent Advancements", Article, arXiv:1908.01014, August 2019, 160 downloads.
  9. F. Ferraro, T. (. Huang, S. M. Lukin, and M. Mitchell, "Proceedings of the Second Workshop on Storytelling", Proceedings, Association for Computational Linguistics, August 2019, 210 downloads.
  10. K. Sane, K. P. Joshi, and S. Mittal, "A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services", InProceedings, IEEE International Conference on Web Services (IEEE ICWS) 2019, July 2019, 808 downloads.
  11. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 400 downloads.
  12. A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 635 downloads.
  13. S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-physical Systems", PhdThesis, University of Maryland, Baltimore County, May 2019, 172 downloads.
  14. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 162 downloads.
  15. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 1120 downloads.
  16. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity", Article, Public Administration Review, February 2019, 593 downloads.
  17. K. P. Joshi and A. Banerjee, "Automating Privacy Compliance Using Policy Integrated Blockchain", Article, Cryptography, Special Issue Advances of Blockchain Technology and Its Applications, February 2019, 712 downloads.

2018

  1. S. N. Narayanan, K. Khanna, B. K. Panigrahi, and A. Joshi, "Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars", InBook, Smart Cities Cybersecurity and Privacy, December 2018, 377 downloads.
  2. L. Elluri, A. Nagar, and K. P. Joshi, "An Integrated Knowledge Graph to Automate GDPR and PCI DSS Compliance", IEEE International Conference on Big Data 2018, December 2018, 1163 downloads.
  3. R. Ayanzadeh, M. Halem, and T. Finin, "Solving Hard SAT Instances with Adiabatic Quantum Computers", American Geophysical Union, Fall Meeting 2018, abstract #IN41B-27, December 2018.
  4. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1134 downloads.
  5. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems", InProceedings, IEEE International Symposium on Technologies for Homeland Security, October 2018, 575 downloads.
  6. S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 2223 downloads.
  7. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security", Article, Journal of Homeland Security and Emergency Management, September 2018, 52 downloads.
  8. L. Neil, S. Mittal, and A. Joshi, "Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, September 2018, 1042 downloads.
  9. V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 603 downloads.
  10. A. Padia, A. Roy, T. W. Satyapanich, F. Ferraro, S. Pan, Y. Park, A. Joshi, and T. Finin, "UMBC at SemEval-2018 Task 8: Understanding Text about Malware", InProceedings, Proceedings of International Workshop on Semantic Evaluation (SemEval-2018), June 2018, 816 downloads.
  11. A. Nagar and K. P. Joshi, "A Semantically Rich Knowledge Representation of PCI DSS for Cloud Services", InProceedings, 6th International IBM Cloud Academy Conference ICACON 2018, Japan, May 2018, 1001 downloads.

2017

  1. S. Saha and K. P. Joshi, "Cognitive Assistance for Automating the Analysis of the Federal Acquisition Regulations System", InProceedings, AAAI Fall Symposium 2017, November 2017, 631 downloads.
  2. S. K. Singh, R. Bose, and A. Joshi, "Entropy Based Electricity Theft Detection in AMI Network", Article, IET Cyber-Physical Systems: Theory and Applications, October 2017, 923 downloads.
  3. P. K. Das, A. Joshi, and T. Finin, "Personalizing context-aware access control on mobile platforms", InProceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017, 1444 downloads.
  4. S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", TechReport, arXiv, August 2017, 1094 downloads.
  5. P. K. Das, "Context-Dependent Privacy and Security Management on Mobile Devices", PhdThesis, Ph.D. Dissertation, August 2017, 887 downloads.
  6. S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", Article, CoRR, August 2017, 831 downloads.
  7. J. Sleeman, "Dynamic Data Assimilation for Topic Modeling (DDATM)", PhdThesis, University of Maryland, Baltimore County, July 2017.
  8. M. P. Joshi, S. Mittal, K. P. Joshi, and T. Finin, "Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage", InProceedings, Proceedings of the First IEEE International Conference on Edge Computing, June 2017, 1344 downloads.
  9. S. K. Singh, K. Khanna, R. Bose, and A. Joshi, "Joint transformation based detection of false data injection attacks in smart grid", Article, IEEE Transactions on Industrial Informatics, June 2017, 1118 downloads.
  10. A. Banerjee, R. Dalal, S. Mittal, and K. P. Joshi, "Generating Digital Twin models using Knowledge Graphs for Industrial Production Lines", InProceedings, Workshop on Industrial Knowledge Graphs, co-located with the 9th International ACM Web Science Conference 2017, June 2017, 1704 downloads.
  11. K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 616 downloads.
  12. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity Challenges to American Local Governments", InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017, 929 downloads.
  13. A. L. Kashyap, "Deep Representation of Lyrical Style and Semantics for Music Recommendation", PhdThesis, University of Maryland, Baltimore County, May 2017, 141 downloads.
  14. , " UMBC/ICMA Survey of Local Government Cybersecurity Practices", TechReport, ICMA and UMBC, April 2017, 488 downloads.

2016

  1. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "Semantic Approach to Automating Management of Big Data Privacy Policies", InProceedings, IEEE BigData 2016, December 2016, 1790 downloads.
  2. P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 1097 downloads.
  3. P. K. Das, D. Ghosh, P. Jagtap, A. Joshi, and T. Finin, "Preserving User Privacy and Security in Context-Aware Mobile Platforms", InBook, Mobile Application Development, Usability, and Security, October 2016, 1165 downloads.
  4. P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, "Semantic knowledge and privacy in the physical web", InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 1865 downloads.
  5. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "ALDA : Cognitive Assistant for Legal Document Analytics", InProceedings, AAAI Fall Symposium 2016, September 2016, 1036 downloads.
  6. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 1247 downloads.
  7. P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", Article, Social Network Analysis and Mining, September 2016, 1132 downloads.
  8. K. Khanna, B. K. Panigrahi, and A. Joshi, "Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit", Article, IET Transactions on Generation, Transmission and Distribution, September 2016, 1228 downloads.
  9. S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", InProceedings, International Symposium on Foundations of Open Source Intelligence and Security Informatics, August 2016, 3249 downloads.
  10. P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 930 downloads.
  11. B. Thuraisingham, M. Kantarcioglu, K. Hamlen, L. Khan, T. Finin, A. Joshi, T. Oates, and E. Bertino, "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", InProceedings, IEEE Conference on Information Reuse and Integration,, July 2016, 1255 downloads.
  12. K. P. Joshi, Y. Yesha, and T. Finin, "An Ontology for a HIPAA compliant cloud service", InProceedings, 4th International IBM Cloud Academy Conference ICACON 2016, June 2016, 1839 downloads.
  13. P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 1605 downloads.
  14. R. Holder, "Rapid Plan Adaptation Through Offline Analysis of Potential Plan Disruptors", PhdThesis, May 2016, 128 downloads.
  15. Y. Gui, "Convexification and Deconvexification for Training Artificial Neural Networks", PhdThesis, May 2016, 122 downloads.
  16. K. Khanna and A. Joshi, "Feasibility and mitigation of false data injection attacks in smart grid", InProceedings, IEEE 6th International Conference on Power Systems (ICPS), 2016 , March 2016, 688 downloads.
  17. M. L. Mathews, A. Joshi, and T. Finin, "Detecting Botnets Using a Collaborative Situational-aware IDPS", InProceedings, Second International Conference on Information Systems Security and Privacy, February 2016, 1471 downloads.
  18. Z. Syed, A. Padia, M. L. Mathews, T. Finin, and A. Joshi, "UCO: A Unified Cybersecurity Ontology", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security, February 2016, 3304 downloads.
  19. N. K. Sharma and A. Joshi, "Representing attribute based access control policies in OWL", InProceedings, Tenth International Conference on Semantic Computing (ICSC), February 2016, 1620 downloads.

2015

  1. Y. Huang, Y. Yesha, and S. Zhou, "A database-based distributed computation architecture with Accumulo and D4M: An application of eigensolver for large sparse matrix", InProceedings, IEEE International Conference on Big Data, November 2015, 1122 downloads.
  2. Z. Syed, L. Han, M. M. Rahman, T. Finin, J. Kukla, and J. Yun, "Querying Large Linked Data Resources", InProceedings, 14th International Semantic Web Conference, October 2015, 942 downloads.
  3. Z. Syed, T. Finin, A. Padia, and M. L. Mathews, "Supporting Situationally Aware Cybersecurity Systems", TechReport, University of Maryland Baltimore County, September 2015, 1534 downloads.
  4. W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 1269 downloads.
  5. B. Stanton, M. Theofanos, and K. P. Joshi, "Framework for Cloud Usability", InProceedings, HCI International 2015, August 2015, 1108 downloads.
  6. L. Han, T. Finin, A. Joshi, and D. Cheng, "Querying RDF Data with Text Annotated Graphs", InProceedings, Proceedings of the 27th International Conference on Scientific and Statistical Database Management, June 2015, 2121 downloads.
  7. A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance", InProceedings, 8th International Conference on Cloud Computing (CLOUD), June 2015, 922 downloads.
  8. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015, 50 downloads.
  9. Z. Syed, L. Han, M. M. Rahman, T. Finin, J. Kukla, and J. Yun, "UMBC_Ebiquity-SFQ: Schema Free Querying System", InProceedings, Proceedings of the Semantic Web Evaluation Challenge, ESWC, June 2015, 981 downloads.
  10. B. Kulvatunyou, Y. Lee, N. Ivezik, and Y. Peng, "A Framework to Canonicalize Manufacturing Service Capability Models", Article, Computers & Industrial Engineering, May 2015, 130 downloads.

2014

  1. R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, "Semantics for Privacy and Shared Context", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 1089 downloads.
  2. V. Bansal, "Recoloring Web Pages For Color Vision Deficiency Users", MastersThesis, University of Maryland, Baltimore County, July 2014, 834 downloads.
  3. K. P. Joshi, "Cloud Data Management Policies: Security and Privacy Checklist", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 1039 downloads.
  4. K. P. Joshi, M. Halem, Y. Yesha, J. E. Dorband, and e., "USM Community Cloud: VCL-based Academic Cloud", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 1861 downloads.

2013

  1. J. Lee, K. Jung, B. Kim, Y. Peng, and H. Cho, "Semantic web-based supplier discovery system for building a long-term supply chain", Article, International Journal of Computer Integrated Manufacturing, November 2013.
  2. A. Joshi, R. Lal, T. Finin, and A. Joshi, "Extracting cybersecurity related linked data from text", InProceedings, Proceedings of the 7th IEEE International Conference on Semantic Computing, September 2013, 2025 downloads.
  3. Y. H. Lee and Y. Peng, "A Framework for Developing Manufacturing Service Capability Information Model", InProceedings, IFIP Advances in Information and Communication Technology, September 2013.
  4. Y. Peng and Y. Kang, "Ontology-Based Dynamic Forms for Manufacturing Capability Information Collection", InProceedings, IFIP Advances in Information and Communication Technology, September 2013.
  5. A. Joshi, "Linked Data for Software Security Concepts and Vulnerability Descriptions", MastersThesis, University of Maryland Baltimore County, July 2013, 1599 downloads.
  6. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1589 downloads.
  7. R. Lal, "Information Extraction of Security related entities and concepts from unstructured text.", MastersThesis, University of Maryland Baltimore County, May 2013, 1878 downloads.
  8. H. Lamba, P. Kumaraguru, and A. Joshi, "Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy", InProceedings, Second International Workshop on Privacy and Security in Online Social Media (PSOSM), May 2013, 3666 downloads.

2012

  1. A. Joshi and P. Kumaraguru, "Identifying and characterizing user communities on Twitter during crisis events", InProceedings, Proceedings of the 2012 workshop on Data-driven user behavioral modelling and mining from social media, October 2012, 1310 downloads.
  2. M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1785 downloads.
  3. L. Han, T. Finin, and A. Joshi, "Schema-Free Structured Querying of DBpedia Data", InProceedings, Proceedings of the 21st ACM Conference on Information and Knowledge Management (CIKM), August 2012, 1509 downloads.
  4. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012.
  5. D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1320 downloads.
  6. S. More, "Situation Aware Intrusion Detection Model", MastersThesis, University of Maryland, Baltimore County, May 2012, 9 downloads.
  7. A. Joshi, T. Finin, K. P. Joshi, and M. Oberoi, "A Policy Driven Semantic Approach to Data Usage Management", InProceedings, DUMW Workshop in conjunction with WWW 2012, April 2012, 1354 downloads.
  8. L. Han, T. Finin, and A. Joshi, "GoRelations: Towards an Intuitive Query System for RDF Data", TechReport, University of Maryland, Baltimore County, February 2012, 1215 downloads.
  9. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1410 downloads.

2011

  1. C. Lee, Y. H. Lee, Y. Peng, and H. Cho, "A Supplier Discovery Framework For Effective And Efficient Configuration Of A Supply Chain", Article, International Journal of Industrial Engineering,, November 2011, 1320 downloads.
  2. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1651 downloads.
  3. M. Oberoi, P. Jagtap, A. Joshi, T. Finin, and L. Kagal, "Information Integration and Analysis: A Semantic Approach to Privacy", InProceedings, Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust, October 2011, 1492 downloads.
  4. V. Mulwad, W. Li, A. Joshi, T. Finin, and K. Viswanathan, "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 2930 downloads.
  5. W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1986 downloads.
  6. M. Kewalramani, "Community Detection in Twitter", MastersThesis, University of Maryland Baltimore County, May 2011, 2778 downloads.
  7. A. Mahale, "Group Centric Information Sharing using Hierarchical Models", MastersThesis, UMBC, May 2011, 1366 downloads.
  8. P. Jagtap, "Privacy Preservation in Context Aware Systems", MastersThesis, May 2011, 1373 downloads.
  9. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 1865 downloads.
  10. V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2011.
  11. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 1760 downloads, 1 citation.

2010

  1. J. Sleeman and T. Finin, "Learning Co-reference Relations for FOAF Instances", InProceedings, Proceedings of the Poster and Demonstration Session at the 9th International Semantic Web Conference, November 2010, 2528 downloads, 2 citations.
  2. K. Viswanathan and T. Finin, "Text Based Similarity Metrics and Delta for Semantic Web Graphs", InProceedings, Proceedings of the Poster Session of 9th International Semantic Web Conference, November 2010, 2263 downloads.
  3. J. Sleeman and T. Finin, "Computing FOAF Co-reference Relations with Rules and Machine Learning", InProceedings, Proceedings of the Third International Workshop on Social Data on the Web, November 2010, 3811 downloads, 6 citations.
  4. P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 1735 downloads, 1 citation.
  5. P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "A Declarative Approach for Secure and Robust Routing", InProceedings, Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 2078 downloads.
  6. K. Viswanathan and T. Finin, "Text Based Similarity and Delta for Semantic Web Graphs", TechReport, University of Maryland, Baltimore County, August 2010, 2382 downloads.
  7. A. Karandikar, "Clustering short status messages: A topic model based approach", MastersThesis, University of Maryland, Baltimore County, July 2010, 9896 downloads.
  8. K. Viswanathan, "Text Based Similarity Metrics and Delta for Semantic Web Graphs", MastersThesis, UMBC, June 2010, 1463 downloads.
  9. R. Schauer and A. Joshi, "A Probabilistic Approach to Distributed System Management", InProceedings, Proceedings of the Seventh International Conference on Autonomic Computing, June 2010, 1613 downloads.
  10. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 2846 downloads, 7 citations.
  11. L. Ding, J. Shinavier, T. Finin, and D. L. McGuinness, "owl:sameAs and Linked Data: An Empirical Study", InProceedings, Proceedings of the Second Web Science Conference, April 2010, 2609 downloads, 5 citations.
  12. J. Sachs and T. Finin, "What Does it Mean for a URI to Resolve?", InProceedings, Proceedings of the AAAI Spring Symposium on Linked Data Meets Artificial Intelligence, March 2010, 1567 downloads.
  13. J. Sleeman and T. Finin, "A Machine Learning Approach to Linking FOAF Instances", InProceedings, Proceedings of the AAAI Spring Symposium on Linked Data Meets Artificial Intelligence, January 2010, 2466 downloads, 5 citations.

2009

  1. M. A. Grasso, "The Effect of Computerized Resident Sign-Out on Clarity", Proceedings, Proceedings of the AMIA 2009 Annual Symposium, November 2009, 2154 downloads.
  2. A. Joshi, Y. Yesha, T. Finin, W. Li, and P. A. Kodeswaran, "A Policy and Trust Driven Framework for Securing Cyber Physical Systems", InProceedings, Workshop on Future Directions in Cyber-physical Systems Security, July 2009, 72 downloads.
  3. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1875 downloads, 7 citations.
  4. W. Jensen and V. Korolev, "A Location-Based Mechanism for Mobile Device Security", InProceedings, Lecture Notes in Artificial Intelligence, March 2009.

2008

  1. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2059 downloads, 1 citation.
  2. S. Gupta, A. Joshi, and T. Finin, "A Framework for Secure Knowledge Management in Pervasive Computing", InProceedings, Proceedings of the Workshop on Secure Knowledge Management, November 2008, 2078 downloads.
  3. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2549 downloads, 1 citation.
  4. J. Sachs, L. Han, T. Wang, and C. Parr, "Bioblitz Data on the Semantic Web", InProceedings, International Semantic Web Conference (Posters & Demos), September 2008, 1205 downloads.
  5. J. Martineau and P. A. Kodeswaran, "SecurePass: Guarding sensitive information from untrusted machines", TechReport, September 2008, 1632 downloads.
  6. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 7188 downloads, 61 citations.
  7. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and F. Perich, "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 1527 downloads.
  8. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2293 downloads.

2007

  1. S. B. Kodeswaran, P. A. Kodeswaran, A. Joshi, and F. Perich, "Utilizing Semantic Policies for Secure BGP Route Dissemination", TechReport, September 2007, 2311 downloads.
  2. P. Ordonez, P. A. Kodeswaran, V. Korolev, W. Li, O. Walavalkar, A. Joshi, T. Finin, Y. Yesha, and I. George, "A Ubiquitous Context-Aware Environment for Surgical Training", InProceedings, Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems, August 2007, 2301 downloads, 1 citation.
  3. M. A. Grasso and e., "Accuracy of the suspected blood indicator in detecting red lesions during wireless capsule endoscopy", Proceedings, American College of Physicians, Maryland Regional Associates Meeting, Baltimore Maryland, May 2007.
  4. A. Kale, P. Kolari, A. Java, T. Finin, and A. Joshi, "On Modeling Trust in Social Media using Link Polarity", TechReport, University of Maryland, Baltimore County, May 2007, 3485 downloads.
  5. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3147 downloads, 16 citations.
  6. A. Kale, "Modeling Trust and Influence in Blogosphere using Link Polarity", MastersThesis, University of Maryland Baltimore County, April 2007, 10869 downloads, 36 citations.
  7. P. Kolari, T. Finin, A. Java, and A. Joshi, "Towards Spam Detection at Ping Servers", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 2590 downloads, 5 citations.
  8. A. Kale, A. Karandikar, P. Kolari, A. Java, and A. Joshi, "Modeling Trust and Influence in the Blogosphere Using Link Polarity", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 4656 downloads, 36 citations.
  9. A. Java, P. Kolari, T. Finin, J. Mayfield, A. Joshi, and J. Martineau, "BlogVox: Separating Blog Wheat from Blog Chaff", InProceedings, Proceedings of the Workshop on Analytics for Noisy Unstructured Text Data, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007), January 2007, 3515 downloads, 8 citations.

2006

  1. T. Finin, L. Kagal, and D. Olmedilla, "Report on the Models of Trust for the Web Workshop", Article, SIGMOD Record, December 2006, 749 downloads.
  2. N. Vartak, A. Patwardhan, A. Joshi, and P. Nagy, "Protecting the privacy of RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 3052 downloads.
  3. M. A. Grasso and e., "Survey of handheld computing among medical students", Article, Computer Methods and Programs in Biomedicine, June 2006.
  4. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 3847 downloads, 5 citations.
  5. P. Kolari, T. Finin, Y. Yesha, K. Lyons, J. Hawkins, and S. Perelgut, "Policy Management of Enterprise Systems: A Requirements Study", InProceedings, Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, June 2006, 5439 downloads, 4 citations.
  6. L. Kagal, T. Finin, A. Joshi, and S. Greenspan, "Security and Privacy Challenges in Open and Dynamic Environments", Article, Computer, June 2006, 2877 downloads.
  7. S. Agarwal, "Context-Aware System to Create Electronic Medical Encounter Records", MastersThesis, May 2006, 2690 downloads, 2 citations.
  8. A. Java, P. Kolari, T. Finin, and T. Oates, "Modeling the Spread of Influence on the Blogosphere", TechReport, UMBC TR-CS-06-03, March 2006, 12240 downloads, 47 citations.
  9. P. Kolari, Y. Yesha, K. Lyons, S. Perelgut, and J. Hawkins, "Policy Management of Enterprise Systems: A Requirements Study", TechReport, TR-CS-06-02 , March 2006, 2749 downloads.
  10. J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 1741 downloads, 1 citation.

2005

  1. L. Ding, R. Pan, T. Finin, A. Joshi, Y. Peng, and P. Kolari, "Finding and Ranking Knowledge on the Semantic Web", InProceedings, Proceedings of the 4th International Semantic Web Conference, November 2005, 13157 downloads, 130 citations.
  2. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3317 downloads, 11 citations.
  3. L. Kagal and J. A. Hendler, "Proceedings of the Semantic Web and Policy Workshop", Proceedings, November 2005, 4777 downloads.
  4. R. Pan, Z. Ding, Y. Yu, and Y. Peng, "A Bayesian Network Approach to Ontology Mapping", InProceedings, Proceedings of the Fourth International Semantic Web Conference, November 2005, 4307 downloads, 91 citations.
  5. S. B. Kodeswaran and A. Joshi, "Using Location Information for Scheduling in 802.15.3 MAC", InProceedings, 2nd International Conference on Broadband Networks (BROADNETS 2005), October 2005, 3737 downloads.
  6. S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 3223 downloads.
  7. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for Agents: Theory and Experiences, July 2005, 5940 downloads, 70 citations.
  8. P. Kolari, L. Ding, S. Ganjugunte, L. Kagal, A. Joshi, and T. Finin, "Enhancing Web Privacy Protection through Declarative Policies", InProceedings, Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 7659 downloads, 27 citations.
  9. M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 2734 downloads.
  10. L. Ding, P. Kolari, T. Finin, A. Joshi, Y. Peng, and Y. Yesha, "On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework", InProceedings, Proceedings of the AAAI SPring Symposium on AI Technologies for Homeland Security, March 2005, 4207 downloads, 32 citations.
  11. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7200 downloads, 96 citations.
  12. G. Denker, L. Kagal, and T. Finin, "Security in the Semantic Web using OWL", Article, Information Security Technical Report, January 2005, 248 downloads.

2004

  1. L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.
  2. L. Ding, T. Finin, A. Joshi, R. Pan, R. S. Cost, Y. Peng, P. Reddivari, V. C. Doshi, and J. Sachs, "Swoogle: A Search and Metadata Engine for the Semantic Web", InProceedings, Proceedings of the Thirteenth ACM Conference on Information and Knowledge Management , November 2004, 28948 downloads, 467 citations.
  3. H. Chen, T. Finin, A. Joshi, F. Perich, D. Chakraborty, and L. Kagal, "Intelligent Agents Meet the Semantic Web in Smart Spaces", Article, IEEE Internet Computing, November 2004, 5214 downloads, 156 citations.
  4. L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 8312 downloads, 23 citations.
  5. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  6. L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", PhdThesis, University of Maryland Baltimore County, September 2004, 10 citations.
  7. H. Chen, F. Perich, T. Finin, and A. Joshi, "SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 11567 downloads, 342 citations.
  8. A. Patwardhan, V. Korolev, L. Kagal, and A. Joshi, "Enforcing Policies in Pervasive Environments", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 5434 downloads, 30 citations.
  9. D. Khushraj, O. Lassila, and T. Finin, "sTuples: Semantic Tuple Spaces", InProceedings, First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’04), August 2004, 2978 downloads, 73 citations.
  10. H. Chen, F. Perich, D. Chakraborty, T. Finin, and A. Joshi, "Intelligent Agents Meet Semantic Web in a Smart Meeting Room", InProceedings, Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004), July 2004, 5681 downloads, 81 citations.
  11. A. B. Shah, L. Kagal, and A. Joshi, "Policy Development Software for Security Policies", TechReport, DIMACS workshop on Usable Privacy and Security Software, July 2004.
  12. L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", Article, IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2614 downloads, 1 citation.
  13. D. Chakraborty, "Service Discovery and Compsition in Pervasive Environments", PhdThesis, Ph.D. Thesis, June 2004, 4206 downloads, 8 citations.
  14. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 1592 downloads, 70 citations.
  15. L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", InProceedings, First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 9237 downloads, 1 citation.
  16. D. Khushraj, "Semantic Tuple Spaces: A Coordination", MastersThesis, University of Maryland, Baltimore County, January 2004.
  17. S. Avancha, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 3631 downloads, 52 citations.

2003

  1. O. Streltchenko, "Exploring Trading Dynamics in a Derivative Securities Market of Heterogeneous Agents", PhdThesis, UMBC, December 2003.
  2. S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3361 downloads, 30 citations.
  3. S. Kallurkar, Y. Shi, R. S. Cost, C. Nicholas, A. Java, and e., "UMBC at TREC 12", InProceedings, Proceedings of the Twelfth Text Retrieval Conference, November 2003, 4296 downloads, 8 citations.
  4. F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4267 downloads, 44 citations.
  5. D. Khushraj, T. Finin, and A. Joshi, "Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments", InProceedings, Proceedings of the Second International Semantic Web Conference , September 2003, 3 citations.
  6. G. Denker, L. Kagal, T. Finin, K. Sycara, and M. Paoucci, "Security for DAML Web Services: Annotation and Matchmaking", InProceedings, Second International Semantic Web Conference , September 2003, 4192 downloads, 125 citations.
  7. L. Kagal, T. Finin, and A. Joshi, "A Policy Based Approach to Security for the Semantic Web", InProceedings, 2nd International Semantic Web Conference (ISWC2003), September 2003, 11170 downloads, 218 citations.
  8. L. Ding, Y. Shi, Y. Zou, Z. Ding, and R. Pan, "Strategies and heuristics used by the UMBCTAC agent in the third Trading Agent Competition", InProceedings, Workshop on Trading Agent Design and Analysis, held in conjunction with the Eighteenth International Joint Conference on Artificial Intelligence, August 2003, 2773 downloads, 3 citations.
  9. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003.
  10. J. Mayfield and T. Finin, "Information retrieval on the Semantic Web: Integrating inference and retrieval", InProceedings, Proceedings of the SIGIR Workshop on the Semantic Web, August 2003, 5829 downloads, 76 citations.
  11. J. Undercofer, A. Joshi, T. Finin, and J. Pinkston, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 1380 downloads, 50 citations.
  12. W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
  13. W. Jensen, T. Karygiannis, M. Iorga, S. Gavrila, and V. Korolev, "Security Policy Management for Handheld Devices", InProceedings, Security and Management (SAM'03),, June 2003, 1069 downloads.
  14. L. Kagal, T. Finin, and A. Joshi, "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4796 downloads, 341 citations.
  15. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1387 downloads, 21 citations.
  16. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 726 downloads.
  17. A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 51 citations.

2002

  1. H. Chen, "An Intelligent Broker Architecture for Context-Aware Systems", TechReport, PhD Dissertation Proposal, December 2002, 9964 downloads.
  2. L. Ding, Y. Shi, Z. Ding, and R. Pan, "UMBCTAC: A Balanced Bidding Agent", TechReport, UMBC Technical Report TR-02-15, December 2002, 4084 downloads.
  3. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent Agents for Mobile and Embedded Devices", Article, International Journal of Cooperative Information Systems, December 2002, 3688 downloads, 17 citations.
  4. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1279 downloads.
  5. L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5451 downloads, 30 citations.
  6. L. Kagal, "Rei : A Policy Language for the Me-Centric Project", TechReport, HP Labs, September 2002, 3918 downloads.
  7. J. Undercofer, F. Perich, and C. Nicholas, "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", TechReport, University of Maryland, Baltimore County, September 2002, 5544 downloads.
  8. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Information agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 1399 downloads.
  9. L. Kagal, F. Perich, A. Joshi, and Y. Yesha, "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 5213 downloads, 11 citations.
  10. S. Tolia, T. Finin, and A. Joshi, "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks", InProceedings, Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices, August 2002, 3106 downloads, 1 citation.
  11. L. Kagal, "An Agent Approach to Security for Pervasive Computing Environments", InProceedings, Doctoral Consortium, The Eighteenth National Conference on Artificial Intelligence (AAAI 02), July 2002.
  12. L. Kagal, T. Finin, and A. Joshi, "Developing Secure Agent Systems Using Delegation Based Trust Management", InProceedings, Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002) , July 2002, 5213 downloads, 38 citations.
  13. M. A. Grasso, "Structured speech input for clinical data collection", Proceedings, Proceedings of the 15th IEEE Symposium on Computer-Based Medical Systems, June 2002, 6 citations.
  14. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002.
  15. A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, International Workshop on Web Services, E-Business, and the Semantic Web, May 2002, 652 downloads.
  16. L. Kagal, T. Finin, and A. Joshi, "On Security in Open Multi-Agent Systems", TechReport, UMBC, March 2002, 66 downloads.

2001

  1. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 9017 downloads, 214 citations.
  2. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, and V. Korolev, "Information Agents for Mobile and Embedded Devices", InProceedings, Proceedings of the Fifth International Workshop Cooperative Information Agents, September 2001, 4205 downloads, 17 citations.
  3. A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 4272 downloads.
  4. L. Kagal, T. Finin, and Y. Peng, "A Delegation Based Model for Distributed Trust", InProceedings, Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, August 2001, 1016 downloads, 69 citations.
  5. L. Kagal, T. Finin, R. S. Cost, and Y. Peng, "A Framework for Distributed Trust Management", InProceedings, Second Workshop on Norms and Institutions in multi-agent systems, June 2001, 3636 downloads, 1 citation.

2000

  1. R. S. Cost, Y. Chen, T. Finin, Y. K. Labrou, and Y. Peng, "Using Colored Petri Nets for Conversation Modeling", InBook, Agent Communication Languages, September 2000, 5368 downloads, 77 citations.

1999

  1. R. S. Cost, Y. K. Labrou, X. Luan, Y. Peng, I. Soboroff, J. Mayfield, and A. Boughannam, "An Agent-based Infrastructure for Enterprise Integration", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications, October 1999, 2149 downloads, 23 citations.
  2. S. Quirolgico and K. Canfield, "Communicating neural network knowledge between agents in a simulated aerial reconnaissance system", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications,, October 1999, 2735 downloads, 5 citations.
  3. Y. Peng, H. Chen, L. Wang, Y. K. Labrou, and R. S. Cost, "An Agent System for Application Initialization in an Integrated Manufacturing Environment", InProceedings, Proceedings of the 3rd. World Multiconference on Systemics, Cybernetics and Informatics and The 5th. Int'l Conference on Information Systems Analysis and Synthesis (SCI'99/ISAS'99), August 1999, 2839 downloads, 5 citations.
  4. R. S. Cost, Y. Chen, T. Finin, Y. K. Labrou, and Y. Peng, "Modeling agent conversations with colored petri nets", InProceedings, Working notes of the Autonomous Agents '99 Workshop on Specifying and Implementing Conversation Policies, May 1999, 3103 downloads, 114 citations.
  5. R. S. Cost, T. Finin, Y. K. Labrou, X. Luan, Y. Peng, I. Soboroff, J. Mayfield, and A. Boughannam, "Agent development with Jackal", InProceedings, Third annual conference on Autonomous Agents, May 1999, 854 downloads.
  6. Y. Peng, T. Finin, Y. K. Labrou, R. S. Cost, B. Chu, J. Long, J. Long, and A. Boughannam, "Agent-based approach for manufacturing integration: The CIIMPLEX experience", Article, Applied Artificial Intelligence , January 1999, 1035 downloads.

1998

  1. W. Tolone, B. Chu, J. Long, R. Wilhelm, Y. Peng, and A. Boughannam, "Supporting Human Interactions within Integrated Manufacturing Systems", Article, International Journal of Advanced Manufacturing, December 1998, 1122 downloads, 3 citations.
  2. A. Joshi and V. Subramanyam, "Security in Mobile Systems", InProceedings, Workshop on Security in Large Scale Distributed Systems, IEEE SRDS, October 1998, 6 citations.
  3. M. A. Rabi, "Relationships among security and algebraic properties of cryptographic objects, and a security infrastructure for agent communication languages", PhdThesis, University of Maryland, Baltimore County, July 1998, 132 downloads.
  4. Q. He, K. Sycara, and T. Finin, "Personal Security Agent: KQML-based PKI", InProceedings, Proceedings of the 2nd International Conference on Autonomous Agents, May 1998, 2232 downloads, 49 citations.
  5. E. J. Clarke, "The empirical use of continuous variables in Bayesian belief networks for exploratory data analysis", PhdThesis, University of Maryland, Baltimore County, May 1998, 156 downloads.
  6. B. Chu, W. Tolone, J. Long, R. Wilhelm, Y. Peng, T. Finin, and M. L. Mathews, "Toward Intelligent Integrated Manufacturing Planning-Execution", Article, The International Journal of Agile Manufacturing, January 1998, 2238 downloads, 20 citations.

1995

  1. C. Thirunavukkarasu, T. Finin, and J. Mayfield, "Secret Agents - A Security Architecture for the KQML Agent Communication Language", InProceedings, CIKM'95 Intelligent Information Agents Workshop, October 1995, 226 downloads.

1990

  1. S. Schocken and T. Finin, "Meta-interpreters for rule-based inference under uncertainty", Article, Decision Support Systems, April 1990, 951 downloads.

1989

  1. S. Schocken and T. Finin, "Meta-Interpreters for Rule-Based Reasoning Under Uncertainty", TechReport, New York University, Information Systems Department, July 1989, 1277 downloads.

1987

  1. S. Schocken and T. Finin, "Prolog Meta-Interpreters for Rule-Based Inference Under Uncertainty", TechReport, New York University, September 1987, 67 downloads.

1980

  1. T. Finin, "The Semantic Interpretation of Compound Nominals", PhdThesis, University of Illinois at Urbana Champaign, February 1980, 1734 downloads, 85 citations.

Presentation

  1. A Dynamic Pipeline for Cybersecurity Information Extraction and Understanding
  2. A Schema-Based Approach Combined with Inter-Ontology Reasoning to Construct Consensus Ontologies
  3. Agent approaches to Security, Trust and Privacy in Pervasive Computing
  4. Blackbook3: A Graph Analytic Processing Platform For The Semantic Web
  5. Computational Policies in a Need to Share Environment
  6. Context Aware Surgical Training Environment
  7. Context-Aware Policies for Privacy and Security
  8. Context-Dependent Privacy and Security Management on Mobile Devices
  9. Context-Dependent Privacy and Security Management on Mobile Devices
  10. DDRE: Managing the Assured Information Sharing Lifecycle
  11. Extracting Cybersecurity related entities, terms and concepts from text.
  12. Framework for Managing the Assured Information Sharing Lifecycle
  13. GoRelations: an Intuitive Query System for DBPedia (and LOD)
  14. Information Extraction of Security related entities and concepts from unstructured text.
  15. Information Extraction of Security related entities and concepts from unstructured text.
  16. IT, defense and intelligence
  17. Knowledge sharing on the Semantic Web
  18. Knowledge sharing on the Semantic Web
  19. Managing the Assured Information Sharing Lifecycle
  20. Managing the Assured Information Sharing Lifecycle
  21. Privacy Preservation in Context-Aware Systems
  22. Problem Space Analysis for Plan Library Generation and Algorithm Selection in Real-time Systems
  23. Semantic Knowledge Graphs for Cybersecurity
  24. Semantics for big data security and privacy
  25. Semantics for Cybersecurity and Privacy
  26. Semantics for Privacy and Context
  27. situational awareness for cybersecurity
  28. SMART: A SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks
  29. Text Based Similarity Metrics and Delta for Semantic Web Graphs
  30. Understanding RSM: Relief Social Media
  31. Web Security - Overview
  32. Web Security - Overview