-
http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context
2014-10-20
-
http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data
2014-05-23
-
http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks
2011-06-14
-
http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems
2011-03-08
-
http://ebiquity.umbc.edu/event/html/id/347/SMART-A-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks
2010-05-18
-
http://ebiquity.umbc.edu/event/html/id/324/Security-Through-Policy-and-Trust-in-Mobile-Ad-Hoc-Networks
2009-11-03
-
http://ebiquity.umbc.edu/event/html/id/299/Outlier-Detection-in-Ad-Hoc-Networks-Using-Dempster-Shafer-Theory
2009-05-06
-
http://ebiquity.umbc.edu/event/html/id/248/Trust-based-Data-Management-in-Mobile-Ad-Hoc-Networks
2008-07-08
-
http://ebiquity.umbc.edu/event/html/id/242/Gossip-based-Outlier-Detection-for-Mobile-Ad-Hoc-Networks
2008-05-06
-
http://ebiquity.umbc.edu/event/html/id/182/Research-Topics-in-MANETs
2006-10-17
-
http://ebiquity.umbc.edu/project/html/id/74/Distributed-Trust-Management-in-Mobile-Ad-Hoc-Networks
2004-12-01
-
http://ebiquity.umbc.edu/project/html/id/28/mNote-Anywhere-Anytime-Classroom
2001-05-01
-
http://ebiquity.umbc.edu/project/html/id/77/Security-in-Battlefield-MANETs
2006-09-01
-
http://ebiquity.umbc.edu/paper/html/id/677/Semantics-for-Privacy-and-Shared-Context
2014-10-20
-
http://ebiquity.umbc.edu/paper/html/id/658/Schema-Free-Querying-of-Semantic-Data
2014-08-01
-
http://ebiquity.umbc.edu/paper/html/id/490/Security-Through-Collaboration-and-Trust-in-MANETs
2012-06-01
-
http://ebiquity.umbc.edu/paper/html/id/520/Enforcing-security-in-semantics-driven-policy-based-networks
2011-01-01
-
http://ebiquity.umbc.edu/paper/html/id/1151/SMART-An-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks
2010-10-20
-
http://ebiquity.umbc.edu/paper/html/id/484/Coping-with-Node-Misbehaviors-in-Ad-Hoc-Networks-A-Multi-Dimensional-Trust-Management-Approach
2010-05-24
-
http://ebiquity.umbc.edu/paper/html/id/463/Towards-a-Declarative-Framework-For-Managing-Application-and-Network-Adaptations
2009-12-01
-
http://ebiquity.umbc.edu/paper/html/id/459/Policy-based-Malicious-Peer-Detection-in-Ad-Hoc-Networks
2009-08-29
-
http://ebiquity.umbc.edu/paper/html/id/452/Outlier-Detection-in-Ad-Hoc-Networks-Using-Dempster-Shafer-Theory
2009-05-18
-
http://ebiquity.umbc.edu/paper/html/id/424/Security-through-Collaboration-in-MANETs
2008-11-14
-
http://ebiquity.umbc.edu/resource/html/id/135/control-of-mobile-ad-hoc-networks-workshop-presentation
2005-08-19
-
http://ebiquity.umbc.edu/resource/html/id/150/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior
2005-10-19
-
http://ebiquity.umbc.edu/resource/html/id/151/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior
2005-10-19
-
http://ebiquity.umbc.edu/resource/html/id/149/MATA-2005-keynote
2005-10-18
-
http://ebiquity.umbc.edu/resource/html/id/364/Semantics-for-Privacy-and-Context
2014-10-20
-
http://ebiquity.umbc.edu/resource/html/id/296/SMART-A-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks
2010-05-18
-
http://ebiquity.umbc.edu/resource/html/id/104/Source-code-for-MANET-IDS
2005-03-23