2023
- J. Bolton, L. Elluri, and K. P. Joshi, "An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains", Proceedings, IEEE International conference on Intelligence and Security Informatics (ISI 2023), October 2023, 128 downloads.
- A. Hamid, H. R. Samidi, T. Finin, P. Pappachan, and R. Yus, "PrivacyLens: A Framework to Collect and Analyze the Landscape of Past, Present, and Future Smart Device Privacy Policies", Article, CoRR abs/2308.05890, August 2023, 51 downloads.
- D. Dahiphale, A. Wadkar, and K. P. Joshi, "CDFMR: A Distributed Statistical Analysis of Stock Market Data using MapReduce with Cumulative Distribution Function", InProceedings, IEEE CLOUD Summit Conference 2023, July 2023, 74 downloads.
- R. Walid, K. P. Joshi, and S. Choi, "Semantically Rich Differential Access to Secure Cloud EHR", InProceedings, 9th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2023), May 2023, 106 downloads.
- A. Piplai, A. Joshi, and T. Finin, "Offline RL+CKG: A hybrid AI model for cybersecurity tasks", InProceedings, AAAI Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering, March 2023, 173 downloads.
- P. Ranade, "Knowledge-Embedded Narrative Construction from Open Source Intelligence", InProceedings, Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI-23) Doctoral Consortium, February 2023, 347 downloads.
2022
- A. Piplai, M. Anoruo, K. Fasaye, A. Joshi, T. Finin, and A. Ridley, "Knowledge guided Two-player Reinforcement Learning for Cyber Attacks and Defenses", InProceedings, International Conference on Machine Learning and Applications, December 2022, 424 downloads.
- R. Ayanzadeh and M. Halem, "Quantum: A New Kind of Knowledge Discovery", InBook, Convergence: Artificial Intelligence and Quantum Computing: Social, Economic, and Policy Impacts, November 2022, 129 downloads.
- D. Ghosh, P. Gupta, S. Dixit, and R. Yus, "JENNER: Just-in-time Enrichment in Query Processing", InProceedings, Proceedings of the VLDB Endowment, September 2022, 177 downloads.
- R. Yus, G. Bouloukakis, S. Mehrotra, and N. Venkatasubramanian, "The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces", Article, ACM Transactions on Internet Technology, August 2022, 86 downloads.
- R. Ayanzadeh, J. E. Dorband, M. Halem, and T. Finin, "Quantum-Assisted Greedy Algorithms", InProceedings, Proceedings of the International Geoscience and Remote Sensing Symposium (IGARSS), July 2022, 244 downloads.
- C. Hanks, M. Maiden, P. Ranade, T. Finin, and A. Joshi, "Recognizing and Extracting Cybersecurity Entities from Text", InProceedings, Workshop on Machine Learning for Cybersecurity, International Conference on Machine Learning, July 2022, 663 downloads.
- C. Hanks, M. Maiden, P. Ranade, T. Finin, and A. Joshi, "CyberEnt: Extracting Domain Specific Entities from Cybersecurity Text", InProceedings, Mid-Atlantic Student Colloquium on Speech, Language and Learning, April 2022, 635 downloads.
- A. Kotal, A. Piplai, S. Chukkapalli, and A. Joshi, "PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data", InProceedings, ACM International Workshop on Security and Privacy Analytics, April 2022, 293 downloads.
- C. Hanks and M. Maiden, "CyNER: A Cybersecurity Domain Specific Dataset for Named Entity Recognition", Misc, UMBC Undergraduate Research and Creative Achievement Day, April 2022, 378 downloads.
- A. Chio, D. Jiang, P. Gupta, G. Bouloukakis, R. Yus, S. Dixit, and N. Venkatasubramanian, "SmartSPEC: Customizable Smart Space Datasets via Event-driven Simulations", InProceedings, IEEE International Conference on Pervasive Computing and Communications (PerCom), March 2022, 73 downloads.
- S. Mitra, A. Piplai, S. Mittal, and A. Joshi, "Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs", IEEE International Conference on Big Data 2021, January 2022, 575 downloads.
2021
- M. Halem, K. Patel, Z. Yang, and J. Sleeman, "The Use of Machine Learning to Infer the Transport Influence of US West Coast WildFires on the US East Coast Planetary Boundary Layer", InProceedings, AGU Fall Meeting 2021, December 2021.
- P. Ranade, A. Piplai, A. Joshi, and T. Finin, "CyBERT: Contextualized Embeddings for the Cybersecurity Domain", InProceedings, IEEE International Conference on Big Data, December 2021, 1177 downloads.
- S. Dasgupta, A. Piplai, P. Ranade, and A. Joshi, "Cybersecurity Knowledge Graph Improvement with Graph Neural Networks", InProceedings, International Conference on Big Data, December 2021, 337 downloads.
- D. L. Kim, L. Elluri, and K. P. Joshi, "Trusted Compliance Enforcement Framework for Sharing Health Big Data", InProceedings, IEEE BigData 2021 4th Special Session on HealthCare Data, December 2021, 296 downloads.
- J. Sleeman, I. Stajner, C. Keller, M. Halem, C. Hamer, R. Montuoro, B. Baker, and e., "The Integration of Artificial Intelligence for Improved Operational Air Quality Forecasting", InProceedings, AGU Fall Meeting 2021, December 2021.
- P. Schubel, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases", InProceedings, IEEE International Conference on Bioinformatics and Biomedicine (BIBM) 2021, December 2021, 161 downloads.
- G. Shan, B. Zhao, J. Clavin, H. Zhang, and S. Duan, "Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System", Article, IEEE Transactions on Information Forensics and Security, November 2021.
- L. Elluri, S. Chukkapalli, K. P. Joshi, T. Finin, and A. Joshi, "A BERT Based Approach to Measure Web Services Policies Compliance With GDPR", Article, IEEE Access, November 2021, 444 downloads.
- K. Sane, K. P. Joshi, and S. Mittal, "Semantically Rich Framework to Automate Cyber Insurance Services", Article, IEEE Transactions on Services Computing, November 2021, 352 downloads.
- A. Kotal, A. Joshi, and K. P. Joshi, "The Effect of Text Ambiguity on creating Policy Knowledge Graphs", InProceedings, IEEE International Conference on Big Data and Cloud Computing (BDCloud 2021), September 2021, 403 downloads.
- K. Patel, J. Sleeman, and M. Halem, "Physics-aware deep edge detection network", InProceedings, Proceedings Volume 11859, Remote Sensing of Clouds and the Atmosphere XXVI; SPIE Remote Sensing, September 2021, 174 downloads.
- R. Walid, K. P. Joshi, and S. Choi, "Secure Cloud EHR with Semantic Access Control, Searchable Encryption and Attribute Revocation", InProceedings, IEEE International Conference on Digital Health (ICDH) 2021 in IEEE World Congress on Services 2021, September 2021, 393 downloads.
- R. Razavisousan and K. P. Joshi, "Analyzing GDPR compliance in Cloud Services' privacy policies using Textual Fuzzy Interpretive Structural Modeling (TFISM)", InProceedings, IEEE International Services Computing Conference (SCC) 2021 in IEEE World Congress on Services 2021, September 2021, 333 downloads.
- S. Chukkapalli, N. Pillai, S. Mittal, and A. Joshi, "Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2021, August 2021, 332 downloads.
- L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 302 downloads.
- P. Ranade, A. Piplai, S. Mittal, A. Joshi, and T. Finin, "Generating Fake Cyber Threat Intelligence Using Transformer-Based Models", Proceedings, International Joint Conference on Neural Networks (IJCNN 2021), July 2021, 540 downloads.
- P. Ranade, A. Joshi, and T. Finin, "Study shows AI-generated fake cybersecurity reports fool experts", Article, The Conversation, June 2021, 261 downloads.
- M. Rezaee and F. Ferraro, "Event Representation with Sequential, Semi-Supervised Discrete Variables", InProceedings, Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL), June 2021, 599 downloads.
- J. Sleeman, T. Finin, and M. Halem, "Understanding Cybersecurity Threat Trends through Dynamic Topic Modeling", Article, Frontiers in Big Data, June 2021, 178 downloads.
- A. Nagar, L. Elluri, and K. P. Joshi, "Automated Compliance of Mobile Wallet Payments for Cloud Services", InProceedings, 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), May 2021, 341 downloads.
- N. Pillai, C. Matuszek, and F. Ferraro, "Measuring Perceptual and Linguistic Complexity in Multilingual Grounded Language Data", InProceedings, 34th International FLAIRS Conference (FLAIRS-34), May 2021, 301 downloads.
- S. Chukkapalli, S. Aziz, N. Alotaibi, S. Mittal, M. Gupta, and M. Abdelsalam, "Ontology driven AI and Access Control Systems for Smart Fisheries", TechReport, January 2021, 497 downloads.
2020
- L. Elluri, K. P. Joshi, and A. Kotal, "Measuring Semantic Similarity across EU GDPR Regulation and Cloud Privacy Policies", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 429 downloads.
- R. Walid, K. P. Joshi, S. Choi, and D. L. Kim, "Cloud-based Encrypted EHR System with Semantically Rich Access Control and Searchable Encryption", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 501 downloads.
- S. Dasgupta, A. Piplai, A. Kotal, and A. Joshi, "A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 893 downloads.
- A. Piplai, S. Mittal, A. Joshi, T. Finin, J. Holt, and R. Zak, "Creating Cybersecurity Knowledge Graphs from Malware After Action Reports", Proceedings, IEEE Access Journal, December 2020, 884 downloads.
- A. Piplai, P. Ranade, A. Kotal, S. Mittal, S. N. Narayanan, and A. Joshi, "Using Knowledge Graphs and Reinforcement Learning for Malware Analysis", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 882 downloads.
- A. Piplai, S. Mittal, M. Abdelsalam, M. Gupta, A. Joshi, and T. Finin, "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2020, November 2020, 415 downloads.
- M. Sills, P. Ranade, and S. Mittal, "Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - A Healthcare Usecase", InProceedings, International Conference on Intelligence and Security Informatics (ISI), November 2020, 15 downloads.
- J. Clavin, V. P. Janeja, K. P. Joshi, Y. Yesha, S. Duan, H. Zhang, L. Erickson, and J. D. Li, "Blockchains for Government: Use Cases and Challenges", Article, Digital Government: Research and Practice, November 2020, 516 downloads.
- K. P. Joshi, L. Elluri, and A. Nagar, "An Integrated Knowledge Graph to Automate Cloud Data Compliance", Article, IEEE Access, November 2020, 552 downloads.
- A. Kotal, K. P. Joshi, and A. Joshi, "ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services", InProceedings, IEEE International Conference on Cloud Computing (CLOUD), 2020, October 2020, 471 downloads.
- S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2020, October 2020, 391 downloads.
- S. Sontowski, M. Gupta, S. Chukkapalli, M. Abdelsalam, S. Mittal, A. Joshi, and R. Sandhu, "Cyber Attacks on Smart Farming Infrastructure", InProceedings, 6th IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2020), October 2020, 745 downloads.
- S. N. Narayanan, A. Joshi, and R. Bose, "ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems", InProceedings, IEEE Transactions on Dependable and Secure Computing, October 2020, 427 downloads.
- Z. Boukouvalas, C. Mallinson, E. Crothers, N. Japkowicz, A. Piplai, S. Mittal, A. Joshi, and T. Adali, "Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19", Article, arXiv:2006.01284 [cs.LG], June 2020, 295 downloads.
- A. Mahindrakar and K. P. Joshi, "Automating GDPR Compliance using Policy Integrated Blockchain", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 1277 downloads.
- S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 2267 downloads.
- J. Sleeman, T. Finin, and M. Halem, "Temporal Understanding of Cybersecurity Threats", InProceedings, IEEE International Conference on Big Data Security on Cloud, May 2020, 738 downloads.
- R. Ayanzadeh, "Leveraging Artificial Intelligence to Advance Problem-Solving with Quantum Annealers", PhdThesis, University of Maryland, Baltimore County, May 2020, 582 downloads.
- D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 192 downloads.
- D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 188 downloads.
- T. W. Satyapanich, F. Ferraro, and T. Finin, "CASIE: Extracting Cybersecurity Event Information from Text", InProceedings, Proceeding of the 34th AAAI Conference on Artificial Intelligence, February 2020, 1595 downloads.
2019
- R. Razavisousan and K. P. Joshi, "Two Tier Analysis of Social Media Collaboration for Student Migration", InProceedings, IEEE International Conference on Collaboration and Internet Computing (IEEE CIC), 2019, December 2019, 454 downloads.
- T. W. Satyapanich, T. Finin, and F. Ferraro, "Extracting Rich Semantic Information about Cybersecurity Events", InProceedings, Second Workshop on Big Data for CyberSecurity, held in conjunction with the IEEE Int. Conf. on Big Data, December 2019, 816 downloads.
- R. Ayanzadeh, M. Halem, J. E. Dorband, and T. Finin, "Quantum-Assisted Greedy Algorithms", Article, arXiv:1912.02362 [quant-ph], December 2019, 376 downloads.
- T. W. Satyapanich, "Modeling and Extracting Information about Cybersecurity Events from Text", PhdThesis, University of Maryland, Baltimore county, December 2019, 441 downloads.
- A. Padia, "Joint Models to Refine Knowledge Graphs", PhdThesis, University of Maryland, Baltimore County, December 2019, 296 downloads.
- A. Padia, "Joint Models to Refine Knowledge Graphs", PhdThesis, October 2019, 571 downloads.
- N. Khurana, S. Mittal, A. Piplai, and A. Joshi, "Preventing Poisoning Attacks on AI based Threat Intelligence Systems", InProceedings, IEEE Machine Learning for Signal Processing, September 2019, 895 downloads.
- S. Mousavi, M. Rezaee, and R. Ayanzadeh, "A Survey on Compressive Sensing: Classical Results and Recent Advancements", Article, arXiv:1908.01014, August 2019, 296 downloads.
- F. Ferraro, T. (. Huang, S. M. Lukin, and M. Mitchell, "Proceedings of the Second Workshop on Storytelling", Proceedings, Association for Computational Linguistics, August 2019, 323 downloads.
- K. Sane, K. P. Joshi, and S. Mittal, "A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services", InProceedings, IEEE International Conference on Web Services (IEEE ICWS) 2019, July 2019, 1024 downloads.
- A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 535 downloads.
- A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 800 downloads.
- S. Mittal, A. Joshi, and T. Finin, "Cyber-All-Intel: An AI for Security related Threat Intelligence", Misc, CoRR abs/1905.02895, May 2019, 36 downloads.
- S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-physical Systems", PhdThesis, University of Maryland, Baltimore County, May 2019, 267 downloads.
- S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 254 downloads.
- S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 1235 downloads.
- D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity", Article, Public Administration Review, February 2019, 753 downloads.
- K. P. Joshi and A. Banerjee, "Automating Privacy Compliance Using Policy Integrated Blockchain", Article, Cryptography, Special Issue Advances of Blockchain Technology and Its Applications, February 2019, 848 downloads.
2018
- S. N. Narayanan, K. Khanna, B. K. Panigrahi, and A. Joshi, "Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars", InBook, Smart Cities Cybersecurity and Privacy, December 2018, 612 downloads.
- L. Elluri, A. Nagar, and K. P. Joshi, "An Integrated Knowledge Graph to Automate GDPR and PCI DSS Compliance", IEEE International Conference on Big Data 2018, December 2018, 1325 downloads.
- R. Ayanzadeh, M. Halem, and T. Finin, "Solving Hard SAT Instances with Adiabatic Quantum Computers", American Geophysical Union, Fall Meeting 2018, abstract #IN41B-27, December 2018.
- P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1294 downloads.
- P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems", InProceedings, IEEE International Symposium on Technologies for Homeland Security, October 2018, 682 downloads.
- S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 2783 downloads.
- D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security", Article, Journal of Homeland Security and Emergency Management, September 2018, 219 downloads.
- L. Neil, S. Mittal, and A. Joshi, "Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, September 2018, 1263 downloads.
- V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 755 downloads.
- A. Padia, A. Roy, T. W. Satyapanich, F. Ferraro, S. Pan, Y. Park, A. Joshi, and T. Finin, "UMBC at SemEval-2018 Task 8: Understanding Text about Malware", InProceedings, Proceedings of International Workshop on Semantic Evaluation (SemEval-2018), June 2018, 939 downloads.
- A. Nagar and K. P. Joshi, "A Semantically Rich Knowledge Representation of PCI DSS for Cloud Services", InProceedings, 6th International IBM Cloud Academy Conference ICACON 2018, Japan, May 2018, 1268 downloads.
2017
- S. Saha and K. P. Joshi, "Cognitive Assistance for Automating the Analysis of the Federal Acquisition Regulations System", InProceedings, AAAI Fall Symposium 2017, November 2017, 631 downloads.
- S. K. Singh, R. Bose, and A. Joshi, "Entropy Based Electricity Theft Detection in AMI Network", Article, IET Cyber-Physical Systems: Theory and Applications, October 2017, 1033 downloads.
- P. K. Das, A. Joshi, and T. Finin, "Personalizing context-aware access control on mobile platforms", InProceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017, 1595 downloads.
- S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", TechReport, arXiv, August 2017, 1274 downloads.
- P. K. Das, "Context-Dependent Privacy and Security Management on Mobile Devices", PhdThesis, Ph.D. Dissertation, August 2017, 984 downloads.
- S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", Article, CoRR, August 2017, 984 downloads.
- J. Sleeman, "Dynamic Data Assimilation for Topic Modeling (DDATM)", PhdThesis, University of Maryland, Baltimore County, July 2017.
- M. P. Joshi, S. Mittal, K. P. Joshi, and T. Finin, "Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage", InProceedings, Proceedings of the First IEEE International Conference on Edge Computing, June 2017, 1518 downloads.
- S. K. Singh, K. Khanna, R. Bose, and A. Joshi, "Joint transformation based detection of false data injection attacks in smart grid", Article, IEEE Transactions on Industrial Informatics, June 2017, 1336 downloads.
- A. Banerjee, R. Dalal, S. Mittal, and K. P. Joshi, "Generating Digital Twin models using Knowledge Graphs for Industrial Production Lines", InProceedings, Workshop on Industrial Knowledge Graphs, co-located with the 9th International ACM Web Science Conference 2017, June 2017, 1932 downloads.
- K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 722 downloads.
- D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity Challenges to American Local Governments", InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017, 1054 downloads.
- A. L. Kashyap, "Deep Representation of Lyrical Style and Semantics for Music Recommendation", PhdThesis, University of Maryland, Baltimore County, May 2017, 266 downloads.
- , " UMBC/ICMA Survey of Local Government Cybersecurity Practices", TechReport, ICMA and UMBC, April 2017, 589 downloads.
2016
- K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "Semantic Approach to Automating Management of Big Data Privacy Policies", InProceedings, IEEE BigData 2016, December 2016, 1923 downloads.
- P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 1209 downloads.
- P. K. Das, D. Ghosh, P. Jagtap, A. Joshi, and T. Finin, "Preserving User Privacy and Security in Context-Aware Mobile Platforms", InBook, Mobile Application Development, Usability, and Security, October 2016, 1273 downloads.
- P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, "Semantic knowledge and privacy in the physical web", InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 2031 downloads.
- K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "ALDA : Cognitive Assistant for Legal Document Analytics", InProceedings, AAAI Fall Symposium 2016, September 2016, 1142 downloads.
- S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 1350 downloads.
- P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", Article, Social Network Analysis and Mining, September 2016, 1258 downloads.
- K. Khanna, B. K. Panigrahi, and A. Joshi, "Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit", Article, IET Transactions on Generation, Transmission and Distribution, September 2016, 1337 downloads.
- S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", InProceedings, International Symposium on Foundations of Open Source Intelligence and Security Informatics, August 2016, 3762 downloads.
- P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 1046 downloads.
- B. Thuraisingham, M. Kantarcioglu, K. Hamlen, L. Khan, T. Finin, A. Joshi, T. Oates, and E. Bertino, "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", InProceedings, IEEE Conference on Information Reuse and Integration,, July 2016, 1365 downloads.
- K. P. Joshi, Y. Yesha, and T. Finin, "An Ontology for a HIPAA compliant cloud service", InProceedings, 4th International IBM Cloud Academy Conference ICACON 2016, June 2016, 1978 downloads.
- P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 1717 downloads.
- R. Holder, "Rapid Plan Adaptation Through Offline Analysis of Potential Plan Disruptors", PhdThesis, May 2016, 200 downloads.
- Y. Gui, "Convexification and Deconvexification for Training Artificial Neural Networks", PhdThesis, May 2016, 196 downloads.
- K. Khanna and A. Joshi, "Feasibility and mitigation of false data injection attacks in smart grid", InProceedings, IEEE 6th International Conference on Power Systems (ICPS), 2016 , March 2016, 800 downloads.
- M. L. Mathews, A. Joshi, and T. Finin, "Detecting Botnets Using a Collaborative Situational-aware IDPS", InProceedings, Second International Conference on Information Systems Security and Privacy, February 2016, 1588 downloads.
- Z. Syed, A. Padia, M. L. Mathews, T. Finin, and A. Joshi, "UCO: A Unified Cybersecurity Ontology", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security, February 2016, 3626 downloads.
- N. K. Sharma and A. Joshi, "Representing attribute based access control policies in OWL", InProceedings, Tenth International Conference on Semantic Computing (ICSC), February 2016, 1744 downloads.
2015
- Y. Huang, Y. Yesha, and S. Zhou, "A database-based distributed computation architecture with Accumulo and D4M: An application of eigensolver for large sparse matrix", InProceedings, IEEE International Conference on Big Data, November 2015, 1216 downloads.
- Z. Syed, L. Han, M. M. Rahman, T. Finin, J. Kukla, and J. Yun, "Querying Large Linked Data Resources", InProceedings, 14th International Semantic Web Conference, October 2015, 1044 downloads.
- Z. Syed, T. Finin, A. Padia, and M. L. Mathews, "Supporting Situationally Aware Cybersecurity Systems", TechReport, University of Maryland Baltimore County, September 2015, 1634 downloads.
- W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 1393 downloads.
- B. Stanton, M. Theofanos, and K. P. Joshi, "Framework for Cloud Usability", InProceedings, HCI International 2015, August 2015, 1211 downloads.
- L. Han, T. Finin, A. Joshi, and D. Cheng, "Querying RDF Data with Text Annotated Graphs", InProceedings, Proceedings of the 27th International Conference on Scientific and Statistical Database Management, June 2015, 2312 downloads.
- A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance", InProceedings, 8th International Conference on Cloud Computing (CLOUD), June 2015, 1031 downloads.
- D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015, 235 downloads.
- Z. Syed, L. Han, M. M. Rahman, T. Finin, J. Kukla, and J. Yun, "UMBC_Ebiquity-SFQ: Schema Free Querying System", InProceedings, Proceedings of the Semantic Web Evaluation Challenge, ESWC, June 2015, 1083 downloads.
- B. Kulvatunyou, Y. Lee, N. Ivezik, and Y. Peng, "A Framework to Canonicalize Manufacturing Service Capability Models", Article, Computers & Industrial Engineering, May 2015, 238 downloads.
2014
- R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, "Semantics for Privacy and Shared Context", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 1197 downloads.
- V. Bansal, "Recoloring Web Pages For Color Vision Deficiency Users", MastersThesis, University of Maryland, Baltimore County, July 2014, 916 downloads.
- K. P. Joshi, "Cloud Data Management Policies: Security and Privacy Checklist", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 1136 downloads.
- K. P. Joshi, M. Halem, Y. Yesha, J. E. Dorband, and e., "USM Community Cloud: VCL-based Academic Cloud", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 2019 downloads.
2013
- J. Lee, K. Jung, B. Kim, Y. Peng, and H. Cho, "Semantic web-based supplier discovery system for building a long-term supply chain", Article, International Journal of Computer Integrated Manufacturing, November 2013.
- A. Joshi, R. Lal, T. Finin, and A. Joshi, "Extracting cybersecurity related linked data from text", InProceedings, Proceedings of the 7th IEEE International Conference on Semantic Computing, September 2013, 2169 downloads.
- Y. H. Lee and Y. Peng, "A Framework for Developing Manufacturing Service Capability Information Model", InProceedings, IFIP Advances in Information and Communication Technology, September 2013.
- Y. Peng and Y. Kang, "Ontology-Based Dynamic Forms for Manufacturing Capability Information Collection", InProceedings, IFIP Advances in Information and Communication Technology, September 2013.
- A. Joshi, "Linked Data for Software Security Concepts and Vulnerability Descriptions", MastersThesis, University of Maryland Baltimore County, July 2013, 1688 downloads.
- W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1695 downloads.
- R. Lal, "Information Extraction of Security related entities and concepts from unstructured text.", MastersThesis, University of Maryland Baltimore County, May 2013, 2142 downloads.
- H. Lamba, P. Kumaraguru, and A. Joshi, "Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy", InProceedings, Second International Workshop on Privacy and Security in Online Social Media (PSOSM), May 2013, 3840 downloads.
2012
- A. Joshi and P. Kumaraguru, "Identifying and characterizing user communities on Twitter during crisis events", InProceedings, Proceedings of the 2012 workshop on Data-driven user behavioral modelling and mining from social media, October 2012, 1419 downloads.
- M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1903 downloads.
- L. Han, T. Finin, and A. Joshi, "Schema-Free Structured Querying of DBpedia Data", InProceedings, Proceedings of the 21st ACM Conference on Information and Knowledge Management (CIKM), August 2012, 1608 downloads.
- W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012.
- D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1428 downloads.
- S. More, "Situation Aware Intrusion Detection Model", MastersThesis, University of Maryland, Baltimore County, May 2012, 107 downloads.
- A. Joshi, T. Finin, K. P. Joshi, and M. Oberoi, "A Policy Driven Semantic Approach to Data Usage Management", InProceedings, DUMW Workshop in conjunction with WWW 2012, April 2012, 1455 downloads.
- V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2012, 37 downloads.
- L. Han, T. Finin, and A. Joshi, "GoRelations: Towards an Intuitive Query System for RDF Data", TechReport, University of Maryland, Baltimore County, February 2012, 1320 downloads.
- W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1516 downloads.
2011
- C. Lee, Y. H. Lee, Y. Peng, and H. Cho, "A Supplier Discovery Framework For Effective And Efficient Configuration Of A Supply Chain", Article, International Journal of Industrial Engineering,, November 2011, 1462 downloads.
- P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1759 downloads.
- M. Oberoi, P. Jagtap, A. Joshi, T. Finin, and L. Kagal, "Information Integration and Analysis: A Semantic Approach to Privacy", InProceedings, Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust, October 2011, 1590 downloads.
- V. Mulwad, W. Li, A. Joshi, T. Finin, and K. Viswanathan, "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 3064 downloads.
- W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 2083 downloads.
- M. Kewalramani, "Community Detection in Twitter", MastersThesis, University of Maryland Baltimore County, May 2011, 2896 downloads.
- A. Mahale, "Group Centric Information Sharing using Hierarchical Models", MastersThesis, UMBC, May 2011, 1472 downloads.
- P. Jagtap, "Privacy Preservation in Context Aware Systems", MastersThesis, May 2011, 1472 downloads.
- P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 1952 downloads.
- P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 1877 downloads, 1 citation.
2010
- J. Sleeman and T. Finin, "Learning Co-reference Relations for FOAF Instances", InProceedings, Proceedings of the Poster and Demonstration Session at the 9th International Semantic Web Conference, November 2010, 2706 downloads, 2 citations.
- K. Viswanathan and T. Finin, "Text Based Similarity Metrics and Delta for Semantic Web Graphs", InProceedings, Proceedings of the Poster Session of 9th International Semantic Web Conference, November 2010, 2396 downloads.
- J. Sleeman and T. Finin, "Computing FOAF Co-reference Relations with Rules and Machine Learning", InProceedings, Proceedings of the Third International Workshop on Social Data on the Web at ISWC2010, November 2010, 3974 downloads, 30 citations.
- P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 1831 downloads, 1 citation.
- P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "A Declarative Approach for Secure and Robust Routing", InProceedings, Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 2181 downloads.
- K. Viswanathan and T. Finin, "Text Based Similarity and Delta for Semantic Web Graphs", TechReport, University of Maryland, Baltimore County, August 2010, 2469 downloads.
- A. Karandikar, "Clustering short status messages: A topic model based approach", MastersThesis, University of Maryland, Baltimore County, July 2010, 10102 downloads.
- K. Viswanathan, "Text Based Similarity Metrics and Delta for Semantic Web Graphs", MastersThesis, UMBC, June 2010, 1550 downloads.
- R. Schauer and A. Joshi, "A Probabilistic Approach to Distributed System Management", InProceedings, Proceedings of the Seventh International Conference on Autonomic Computing, June 2010, 1720 downloads.
- W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 3000 downloads, 7 citations.
- L. Ding, J. Shinavier, T. Finin, and D. L. McGuinness, "owl:sameAs and Linked Data: An Empirical Study", InProceedings, Proceedings of the Second Web Science Conference, April 2010, 2786 downloads, 5 citations.
- J. Sachs and T. Finin, "What Does it Mean for a URI to Resolve?", InProceedings, Proceedings of the AAAI Spring Symposium on Linked Data Meets Artificial Intelligence, March 2010, 1674 downloads.
- J. Sleeman and T. Finin, "A Machine Learning Approach to Linking FOAF Instances", InProceedings, Proceedings of the AAAI Spring Symposium on Linked Data Meets Artificial Intelligence, January 2010, 2565 downloads, 5 citations.
2009
- M. A. Grasso, "The Effect of Computerized Resident Sign-Out on Clarity", Proceedings, Proceedings of the AMIA 2009 Annual Symposium, November 2009, 2241 downloads.
- A. Joshi, Y. Yesha, T. Finin, W. Li, and P. A. Kodeswaran, "A Policy and Trust Driven Framework for Securing Cyber Physical Systems", InProceedings, Workshop on Future Directions in Cyber-physical Systems Security, July 2009, 177 downloads.
- W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1964 downloads, 7 citations.
- W. Jensen and V. Korolev, "A Location-Based Mechanism for Mobile Device Security", InProceedings, Lecture Notes in Artificial Intelligence, March 2009.
2008
- W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2157 downloads, 1 citation.
- S. Gupta, A. Joshi, and T. Finin, "A Framework for Secure Knowledge Management in Pervasive Computing", InProceedings, Proceedings of the Workshop on Secure Knowledge Management, November 2008, 2194 downloads.
- A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2646 downloads, 1 citation.
- J. Sachs, L. Han, T. Wang, and C. Parr, "Bioblitz Data on the Semantic Web", InProceedings, International Semantic Web Conference (Posters & Demos), September 2008, 1282 downloads.
- J. Martineau and P. A. Kodeswaran, "SecurePass: Guarding sensitive information from untrusted machines", TechReport, September 2008, 1732 downloads.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 7351 downloads, 61 citations.
- P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and F. Perich, "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 1620 downloads.
- P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2425 downloads.
2007
- S. B. Kodeswaran, P. A. Kodeswaran, A. Joshi, and F. Perich, "Utilizing Semantic Policies for Secure BGP Route Dissemination", TechReport, September 2007, 2411 downloads.
- P. Ordonez, P. A. Kodeswaran, V. Korolev, W. Li, O. Walavalkar, A. Joshi, T. Finin, Y. Yesha, and I. George, "A Ubiquitous Context-Aware Environment for Surgical Training", InProceedings, Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems, August 2007, 2394 downloads, 1 citation.
- M. A. Grasso and e., "Accuracy of the suspected blood indicator in detecting red lesions during wireless capsule endoscopy", Proceedings, American College of Physicians, Maryland Regional Associates Meeting, Baltimore Maryland, May 2007.
- A. Kale, P. Kolari, A. Java, T. Finin, and A. Joshi, "On Modeling Trust in Social Media using Link Polarity", TechReport, University of Maryland, Baltimore County, May 2007, 3654 downloads.
- A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3264 downloads, 16 citations.
- A. Kale, "Modeling Trust and Influence in Blogosphere using Link Polarity", MastersThesis, University of Maryland Baltimore County, April 2007, 11052 downloads, 36 citations.
- P. Kolari, T. Finin, A. Java, and A. Joshi, "Towards Spam Detection at Ping Servers", InProceedings, Proceedings of the First International Conference on Web and Social Media (ICWSM), March 2007, 2704 downloads, 5 citations.
- A. Kale, A. Karandikar, P. Kolari, A. Java, and A. Joshi, "Modeling Trust and Influence in the Blogosphere Using Link Polarity", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 4772 downloads, 36 citations.
- A. Java, P. Kolari, T. Finin, J. Mayfield, A. Joshi, and J. Martineau, "BlogVox: Separating Blog Wheat from Blog Chaff", InProceedings, Proceedings of the Workshop on Analytics for Noisy Unstructured Text Data, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007), January 2007, 3643 downloads, 8 citations.
2006
- T. Finin, L. Kagal, and D. Olmedilla, "Report on the Models of Trust for the Web Workshop", Article, SIGMOD Record, December 2006, 839 downloads.
- N. Vartak, A. Patwardhan, A. Joshi, and P. Nagy, "Protecting the privacy of RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 3153 downloads.
- M. A. Grasso and e., "Survey of handheld computing among medical students", Article, Computer Methods and Programs in Biomedicine, June 2006.
- A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4034 downloads, 5 citations.
- P. Kolari, T. Finin, Y. Yesha, K. Lyons, J. Hawkins, and S. Perelgut, "Policy Management of Enterprise Systems: A Requirements Study", InProceedings, Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, June 2006, 5561 downloads, 4 citations.
- L. Kagal, T. Finin, A. Joshi, and S. Greenspan, "Security and Privacy Challenges in Open and Dynamic Environments", Article, Computer, June 2006, 2985 downloads.
- S. Agarwal, "Context-Aware System to Create Electronic Medical Encounter Records", MastersThesis, May 2006, 2779 downloads, 2 citations.
- A. Java, P. Kolari, T. Finin, and T. Oates, "Modeling the Spread of Influence on the Blogosphere", TechReport, UMBC TR-CS-06-03, March 2006, 20306 downloads, 47 citations.
- P. Kolari, Y. Yesha, K. Lyons, S. Perelgut, and J. Hawkins, "Policy Management of Enterprise Systems: A Requirements Study", TechReport, TR-CS-06-02 , March 2006, 2916 downloads.
- J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 1864 downloads, 1 citation.
2005
- L. Ding, R. Pan, T. Finin, A. Joshi, Y. Peng, and P. Kolari, "Finding and Ranking Knowledge on the Semantic Web", InProceedings, Proceedings of the 4th International Semantic Web Conference, November 2005, 13349 downloads, 130 citations.
- A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3442 downloads, 11 citations.
- L. Kagal and J. A. Hendler, "Proceedings of the Semantic Web and Policy Workshop", Proceedings, November 2005, 4881 downloads.
- R. Pan, Z. Ding, Y. Yu, and Y. Peng, "A Bayesian Network Approach to Ontology Mapping", InProceedings, Proceedings of the Fourth International Semantic Web Conference, November 2005, 4425 downloads, 91 citations.
- S. B. Kodeswaran and A. Joshi, "Using Location Information for Scheduling in 802.15.3 MAC", InProceedings, 2nd International Conference on Broadband Networks (BROADNETS 2005), October 2005, 3850 downloads.
- S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 3314 downloads.
- H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for Agents: Theory and Experiences, July 2005, 6154 downloads, 70 citations.
- P. Kolari, L. Ding, S. Ganjugunte, L. Kagal, A. Joshi, and T. Finin, "Enhancing Web Privacy Protection through Declarative Policies", InProceedings, Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 7926 downloads, 27 citations.
- M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 2804 downloads.
- L. Ding, P. Kolari, T. Finin, A. Joshi, Y. Peng, and Y. Yesha, "On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework", InProceedings, Proceedings of the AAAI SPring Symposium on AI Technologies for Homeland Security, March 2005, 4312 downloads, 32 citations.
- A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7329 downloads, 96 citations.
- G. Denker, L. Kagal, and T. Finin, "Security in the Semantic Web using OWL", Article, Information Security Technical Report, January 2005, 345 downloads.
2004
- L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.
- L. Ding, T. Finin, A. Joshi, R. Pan, R. S. Cost, Y. Peng, P. Reddivari, V. C. Doshi, and J. Sachs, "Swoogle: A Search and Metadata Engine for the Semantic Web", InProceedings, Proceedings of the Thirteenth ACM Conference on Information and Knowledge Management , November 2004, 29416 downloads, 467 citations.
- H. Chen, T. Finin, A. Joshi, F. Perich, D. Chakraborty, and L. Kagal, "Intelligent Agents Meet the Semantic Web in Smart Spaces", Article, IEEE Internet Computing, November 2004, 5329 downloads, 156 citations.
- L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 8501 downloads, 23 citations.
- W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
- L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", PhdThesis, University of Maryland Baltimore County, September 2004, 10 citations.
- H. Chen, F. Perich, T. Finin, and A. Joshi, "SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 11751 downloads, 342 citations.
- A. Patwardhan, V. Korolev, L. Kagal, and A. Joshi, "Enforcing Policies in Pervasive Environments", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 5530 downloads, 30 citations.
- D. Khushraj, O. Lassila, and T. Finin, "sTuples: Semantic Tuple Spaces", InProceedings, First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’04), August 2004, 3158 downloads, 73 citations.
- H. Chen, F. Perich, D. Chakraborty, T. Finin, and A. Joshi, "Intelligent Agents Meet Semantic Web in a Smart Meeting Room", InProceedings, Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004), July 2004, 5825 downloads, 81 citations.
- A. B. Shah, L. Kagal, and A. Joshi, "Policy Development Software for Security Policies", TechReport, DIMACS workshop on Usable Privacy and Security Software, July 2004.
- L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", Article, IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2743 downloads, 1 citation.
- D. Chakraborty, "Service Discovery and Compsition in Pervasive Environments", PhdThesis, Ph.D. Thesis, June 2004, 4292 downloads, 8 citations.
- H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 1715 downloads, 70 citations.
- L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", InProceedings, First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 9378 downloads, 1 citation.
- D. Khushraj, "Semantic Tuple Spaces: A Coordination", MastersThesis, University of Maryland, Baltimore County, January 2004.
- S. Avancha, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 3749 downloads, 52 citations.
2003
- O. Streltchenko, "Exploring Trading Dynamics in a Derivative Securities Market of Heterogeneous Agents", PhdThesis, UMBC, December 2003.
- S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3502 downloads, 30 citations.
- S. Kallurkar, Y. Shi, R. S. Cost, C. Nicholas, A. Java, and e., "UMBC at TREC 12", InProceedings, Proceedings of the Twelfth Text Retrieval Conference, November 2003, 4483 downloads, 8 citations.
- F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4393 downloads, 44 citations.
- D. Khushraj, T. Finin, and A. Joshi, "Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments", InProceedings, Proceedings of the Second International Semantic Web Conference , September 2003, 3 citations.
- G. Denker, L. Kagal, T. Finin, K. Sycara, and M. Paoucci, "Security for DAML Web Services: Annotation and Matchmaking", InProceedings, Second International Semantic Web Conference , September 2003, 4340 downloads, 125 citations.
- L. Kagal, T. Finin, and A. Joshi, "A Policy Based Approach to Security for the Semantic Web", InProceedings, 2nd International Semantic Web Conference (ISWC2003), September 2003, 11360 downloads, 218 citations.
- L. Ding, Y. Shi, Y. Zou, Z. Ding, and R. Pan, "Strategies and heuristics used by the UMBCTAC agent in the third Trading Agent Competition", InProceedings, Workshop on Trading Agent Design and Analysis, held in conjunction with the Eighteenth International Joint Conference on Artificial Intelligence, August 2003, 2974 downloads, 3 citations.
- W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003.
- J. Mayfield and T. Finin, "Information retrieval on the Semantic Web: Integrating inference and retrieval", InProceedings, Proceedings of the SIGIR Workshop on the Semantic Web, August 2003, 5983 downloads, 76 citations.
- J. Undercofer, A. Joshi, T. Finin, and J. Pinkston, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 1539 downloads, 50 citations.
- W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
- W. Jensen, T. Karygiannis, M. Iorga, S. Gavrila, and V. Korolev, "Security Policy Management for Handheld Devices", InProceedings, Security and Management (SAM'03),, June 2003, 1144 downloads.
- L. Kagal, T. Finin, and A. Joshi, "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4913 downloads, 341 citations.
- A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1488 downloads, 21 citations.
- W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 817 downloads.
- A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 51 citations.
2002
- H. Chen, "An Intelligent Broker Architecture for Context-Aware Systems", TechReport, PhD Dissertation Proposal, December 2002, 10106 downloads.
- L. Ding, Y. Shi, Z. Ding, and R. Pan, "UMBCTAC: A Balanced Bidding Agent", TechReport, UMBC Technical Report TR-02-15, December 2002, 4166 downloads.
- T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent Agents for Mobile and Embedded Devices", Article, International Journal of Cooperative Information Systems, December 2002, 3806 downloads, 17 citations.
- T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1377 downloads.
- L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5563 downloads, 30 citations.
- L. Kagal, "Rei : A Policy Language for the Me-Centric Project", TechReport, HP Labs, September 2002, 4049 downloads.
- J. Undercofer, F. Perich, and C. Nicholas, "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", TechReport, University of Maryland, Baltimore County, September 2002, 5655 downloads.
- T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Information agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 1501 downloads.
- L. Kagal, F. Perich, A. Joshi, and Y. Yesha, "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 5319 downloads, 11 citations.
- S. Tolia, T. Finin, and A. Joshi, "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks", InProceedings, Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices, August 2002, 3211 downloads, 1 citation.
- L. Kagal, "An Agent Approach to Security for Pervasive Computing Environments", InProceedings, Doctoral Consortium, The Eighteenth National Conference on Artificial Intelligence (AAAI 02), July 2002.
- L. Kagal, T. Finin, and A. Joshi, "Developing Secure Agent Systems Using Delegation Based Trust Management", InProceedings, Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002) , July 2002, 5331 downloads, 38 citations.
- M. A. Grasso, "Structured speech input for clinical data collection", Proceedings, Proceedings of the 15th IEEE Symposium on Computer-Based Medical Systems, June 2002, 6 citations.
- W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002.
- A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, International Workshop on Web Services, E-Business, and the Semantic Web, May 2002, 749 downloads.
- L. Kagal, T. Finin, and A. Joshi, "On Security in Open Multi-Agent Systems", TechReport, UMBC, March 2002, 151 downloads.
2001
- L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 9191 downloads, 214 citations.
- T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, and V. Korolev, "Information Agents for Mobile and Embedded Devices", InProceedings, Proceedings of the Fifth International Workshop Cooperative Information Agents, September 2001, 4403 downloads, 17 citations.
- A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 4371 downloads.
- L. Kagal, T. Finin, and Y. Peng, "A Delegation Based Model for Distributed Trust", InProceedings, Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, August 2001, 1123 downloads, 69 citations.
- L. Kagal, T. Finin, R. S. Cost, and Y. Peng, "A Framework for Distributed Trust Management", InProceedings, Second Workshop on Norms and Institutions in multi-agent systems, June 2001, 3740 downloads, 1 citation.
2000
- R. S. Cost, Y. Chen, T. Finin, Y. K. Labrou, and Y. Peng, "Using Colored Petri Nets for Conversation Modeling", InBook, Agent Communication Languages, September 2000, 5542 downloads, 77 citations.
1999
- R. S. Cost, Y. K. Labrou, X. Luan, Y. Peng, I. Soboroff, J. Mayfield, and A. Boughannam, "An Agent-based Infrastructure for Enterprise Integration", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications, October 1999, 2231 downloads, 23 citations.
- S. Quirolgico and K. Canfield, "Communicating neural network knowledge between agents in a simulated aerial reconnaissance system", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications,, October 1999, 2857 downloads, 5 citations.
- Y. Peng, H. Chen, L. Wang, Y. K. Labrou, and R. S. Cost, "An Agent System for Application Initialization in an Integrated Manufacturing Environment", InProceedings, Proceedings of the 3rd. World Multiconference on Systemics, Cybernetics and Informatics and The 5th. Int'l Conference on Information Systems Analysis and Synthesis (SCI'99/ISAS'99), August 1999, 2947 downloads, 5 citations.
- R. S. Cost, Y. Chen, T. Finin, Y. K. Labrou, and Y. Peng, "Modeling agent conversations with colored petri nets", InProceedings, Working notes of the Autonomous Agents '99 Workshop on Specifying and Implementing Conversation Policies, May 1999, 3254 downloads, 114 citations.
- R. S. Cost, T. Finin, Y. K. Labrou, X. Luan, Y. Peng, I. Soboroff, J. Mayfield, and A. Boughannam, "Agent development with Jackal", InProceedings, Third annual conference on Autonomous Agents, May 1999, 948 downloads.
- Y. Peng, T. Finin, Y. K. Labrou, R. S. Cost, B. Chu, J. Long, J. Long, and A. Boughannam, "An agent-based approach for manufacturing integration: The CIIMPLEX experience", Article, Applied Artificial Intelligence, January 1999, 1151 downloads.
1998
- W. Tolone, B. Chu, J. Long, R. Wilhelm, Y. Peng, and A. Boughannam, "Supporting Human Interactions within Integrated Manufacturing Systems", Article, International Journal of Advanced Manufacturing, December 1998, 1244 downloads, 3 citations.
- A. Joshi and V. Subramanyam, "Security in Mobile Systems", InProceedings, Workshop on Security in Large Scale Distributed Systems, IEEE SRDS, October 1998, 6 citations.
- M. A. Rabi, "Relationships among security and algebraic properties of cryptographic objects, and a security infrastructure for agent communication languages", PhdThesis, University of Maryland, Baltimore County, July 1998, 213 downloads.
- Q. He, K. Sycara, and T. Finin, "Personal Security Agent: KQML-based PKI", InProceedings, Proceedings of the 2nd International Conference on Autonomous Agents, May 1998, 2321 downloads, 49 citations.
- E. J. Clarke, "The empirical use of continuous variables in Bayesian belief networks for exploratory data analysis", PhdThesis, University of Maryland, Baltimore County, May 1998, 289 downloads.
- B. Chu, W. Tolone, J. Long, R. Wilhelm, Y. Peng, T. Finin, and M. L. Mathews, "Toward Intelligent Integrated Manufacturing Planning-Execution", Article, The International Journal of Agile Manufacturing, January 1998, 2336 downloads, 20 citations.
Old News
- Ebiquity team wins the Best Paper Award at the IEEE BigDataSecurity 2022 Conference
May 7, 2022 - Yun Peng receives award from NIST for supply chain research
March 10, 2011 - From 'Need to Know’ to ‘Need to Share’:
April 30, 2008 - Welcome to the Splogosphere
December 16, 2005 - UMBC ebqiuity members help organize SWPW
May 1, 2005 - SweetRules v2.1 released
April 25, 2005 - UMBC and IBM collaborate on autonomic computing
February 24, 2005 - ebiquity helps organize PSPT 2004
August 26, 2004 - ebiquity Student Team Wins $120M in Supply Chain Contest
July 25, 2004 - SW-UBICOMP-INTEREST SIG formed
December 27, 2003 - Olga Streltchenko
November 14, 2003
Old Events
- Modeling and Extracting information about Cybersecurity Events from Text
May 16, 2017 - Semantic knowledge and privacy in the physical web
September 27, 2016 - Semantics for Cybersecurity and Privacy
May 1, 2015 - Semantics for Privacy and Context
October 20, 2014 - Semantics for Big Data (,) Security and Privacy
September 16, 2014 - PhD defense: Lushan Han, Schema Free Querying of Semantic Data
May 23, 2014 - Extracting cybersecurity related entities, terms and concepts from text
May 28, 2013 - Phd proposal: A Semantic Resolution Framework for Manufacturing Capability Data Integration
May 14, 2013 - MS defense: Social Media Analytics: Digital Footprints
May 13, 2013 - A Collaborative Approach to Situational Awareness for CyberSecurity
April 29, 2013