Tags: vehicle

Publications

2025

  1. S. Chukkapalli, D. Ledbetter, A. Joshi, T. Finin, and J. Freeman, "Impostors Among Us: An Agentic Approach to Identifying and Resolving Conflicts in Collaborative Network Environments", InProceedings, IEEE Military Communications Conference, October 2025, 58 downloads.

2023

  1. N. M. Gowrishetty, S. Chukkapalli, and A. Joshi, "Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones", InProceedings, INFOCOM Workshop on Security, Privacy, and Digital Forensics of Mobile Systems and Networks, May 2023, 436 downloads.

2022

  1. S. Chukkapalli, A. Joshi, T. Finin, and R. F. Erbacher, "CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations", InProceedings, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications IV, SPIE Defense + Commercial Sensing, April 2022, 535 downloads.

2020

  1. S. Sontowski, M. Gupta, S. Chukkapalli, M. Abdelsalam, S. Mittal, A. Joshi, and R. Sandhu, "Cyber Attacks on Smart Farming Infrastructure", InProceedings, 6th IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2020), October 2020, 1320 downloads.
  2. S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 3820 downloads.

2016

  1. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 1641 downloads.
  2. S. N. Narayanan, S. Mittal, and A. Joshi, "OBD SecureAlert: An Anomaly Detection System for Vehicles", InProceedings, IEEE Workshop on Smart Service Systems (SmartSys 2016), May 2016, 1920 downloads.

2015

  1. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Data Analytics to Detect Anomalous States in Vehicles", TechReport, December 2015, 1920 downloads.
  2. W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 1711 downloads.

2012

  1. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1878 downloads.

2008

  1. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 7914 downloads, 350 citations.

2006

  1. N. Vartak, A. Patwardhan, A. Joshi, T. Finin, and P. Nagy, "Protecting the privacy of passive RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 3438 downloads.
  2. A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", InProceedings, Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 4422 downloads, 10 citations.
  3. N. Vartak, "Protecting the privacy of RFID tags", MastersThesis, University of Maryland, Baltimore County, May 2006, 3440 downloads.

2004

  1. F. Perich, "On Peer-to-Peer Data Management in Pervasive Computing Environments", PhdThesis, UMBC, May 2004, 2096 downloads.