<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=cyber-physical+systems">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=cyber-physical+systems]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for cyber-physical systems]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/432/Securing-Cyber-Physical-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/430/talk-Self-sustainable-Cyber-physical-System-Design"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/375/Towards-Cooperative-Autonomous-Resilient-Defenses-in-Cyberspace"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/959/ABATe-Automatic-Behavioral-Abstraction-Technique-to-Detect-Anomalies-in-Smart-Cyber-Physical-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/949/Ontologies-and-Artificial-Intelligence-Systems-for-the-Cooperative-Smart-Farming-Ecosystem"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/887/Context-Sensitive-Access-Control-in-Smart-Home-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/911/A-Framework-for-Detecting-Anomalous-Behaviors-in-Smart-Cyber-physical-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1133/A-Framework-for-Detecting-Anomalous-Behaviors-in-Smart-Cyber-Physical-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/926/Security-in-Smart-Cyber-Physical-Systems-A-Case-Study-on-Smart-Grids-and-Smart-Cars"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/759/Using-Semantic-Technologies-to-Mine-Vehicular-Context-for-Security"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/728/Context-Sensitive-Policy-Based-Security-in-Internet-of-Things"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/725/Detecting-Botnets-Using-a-Collaborative-Situational-aware-IDPS"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/576/Managing-and-Securing-Critical-Infrastructure-A-Semantic-Policy-and-Trust-Driven-Approach"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/359/Extracting-Cybersecurity-related-entities-terms-and-concepts-from-text-"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-">
  <title><![CDATA[Are you in control or being controlled in your vehicle?]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-</link>
  <description><![CDATA[Vehicles changed from being just mechanical devices which will just obey the commands to a smarter Sensor-ECU-Actuator systems which sense the surroundings and take necessary smart actions. A modern car has around forty to hundred different ECU’s, possibly communicating, to make intelligent decisions. But recently, there is a lot of buzz in the research community on hacking and taking control of vehicles. These literature describe and document the different ways to take control of vehicles....]]></description>
  <dc:date>2015-10-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text">
  <title><![CDATA[Extracting cybersecurity related entities, terms and concepts from text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text</link>
  <description><![CDATA[Securing computers, data, cyber-physical systems and networks is a growing problem as society&#39;s dependence on them increases while they remain vulnerable to attacks by both criminals and rival nation states. Creating &#39;situationally aware&#39; computer systems that defend against new &quot;zero day&quot; software vulnerabilities requires them to automatically integrate and use new security-related data from a wide variety of sources. One important source is information found in text fr...]]></description>
  <dc:date>2013-05-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/432/Securing-Cyber-Physical-Systems">
  <title><![CDATA[Securing Cyber-Physical Systems]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/432/Securing-Cyber-Physical-Systems</link>
  <description><![CDATA[Our critical infrastructure systems are being modernized with information and communication technologies to face the operational requirements and efficiency challenges of the 21st century. The smart grid in particular, will introduce millions of new intelligent components to the electric grid, buildings, and homes within the next decade. While this modernization will bring many operational benefits to infrastructure systems, it will also introduce new vulnerabilities, a larger attack surface,...]]></description>
  <dc:date>2012-03-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/430/talk-Self-sustainable-Cyber-physical-System-Design">
  <title><![CDATA[talk: Self-sustainable Cyber-physical System Design]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/430/talk-Self-sustainable-Cyber-physical-System-Design</link>
  <description><![CDATA[Renewable energy can enable diverse self-sustainable cyber-physical systems with applications ranging from healthcare to off-grid home energy management. However, there are several challenges that need to be addressed before such systems can be realized. For instance, how do we balance the small and often variable energy budgets imposed by renewables with system functionality? How can we design sensitive physical sensors and efficient harvesting circuits for mW energy sources such as sound an...]]></description>
  <dc:date>2012-03-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/375/Towards-Cooperative-Autonomous-Resilient-Defenses-in-Cyberspace">
  <title><![CDATA[Towards Cooperative Autonomous Resilient Defenses in Cyberspace]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/375/Towards-Cooperative-Autonomous-Resilient-Defenses-in-Cyberspace</link>
  <description><![CDATA[Cyberspace is becoming the nervous system of our modern society as it is increasingly being integrated in virtually all aspects of control and communications. From worldwide social interactions and gaming to smart infrastructure systems in energy, healthcare, transportation, and emergency response, all are enabled and advanced by operations within cyberspace. Today’s cyberspace comprises highly dynamic, interdependent global network of information technology infrastructures, telecommunicati...]]></description>
  <dc:date>2010-10-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/959/ABATe-Automatic-Behavioral-Abstraction-Technique-to-Detect-Anomalies-in-Smart-Cyber-Physical-Systems">
  <title><![CDATA[ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/959/ABATe-Automatic-Behavioral-Abstraction-Technique-to-Detect-Anomalies-in-Smart-Cyber-Physical-Systems</link>
  <description><![CDATA[Detecting anomalies and attacks in smart cyber-physical systems are of paramount importance owing to their growing prominence in controlling critical systems. However, this is a challenging task due to the heterogeneity and variety of components of a CPS, and the complex relationships between sensed values and potential attacks or anomalies. Such complex relationships are results of physical constraints and domain norms which exist in many CPS domains. In this paper, we propose ABATe, an Auto...]]></description>
  <dc:date>2020-10-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/949/Ontologies-and-Artificial-Intelligence-Systems-for-the-Cooperative-Smart-Farming-Ecosystem">
  <title><![CDATA[Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/949/Ontologies-and-Artificial-Intelligence-Systems-for-the-Cooperative-Smart-Farming-Ecosystem</link>
  <description><![CDATA[Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid advancements in technologies that support smart devices, agriculture and farming sector is shifting towards IoT connected ecosystem to balance the increase in demand for food supply. As the number of smart farms reach critical mass, it is now possible to include AI assisted systems at a cooperative (co-op) farming l...]]></description>
  <dc:date>2020-09-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/887/Context-Sensitive-Access-Control-in-Smart-Home-Environments">
  <title><![CDATA[Context Sensitive Access Control in Smart Home Environments]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/887/Context-Sensitive-Access-Control-in-Smart-Home-Environments</link>
  <description><![CDATA[The rise in popularity of Internet of Things (IoT) devices has opened doors for privacy and security breaches in Cyber-Physical systems like smart homes, smart vehicles, and smart grids that affect our daily existence. IoT systems are also a source of big data that gets shared via cloud. IoT systems in a smart home environment have sensitive access control issues since they are deployed in a personal space. The collected data can also be of highly personal nature. Therefore, it is critical to...]]></description>
  <dc:date>2020-05-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/911/A-Framework-for-Detecting-Anomalous-Behaviors-in-Smart-Cyber-physical-Systems">
  <title><![CDATA[A Framework for Detecting Anomalous Behaviors in Smart Cyber-physical Systems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/911/A-Framework-for-Detecting-Anomalous-Behaviors-in-Smart-Cyber-physical-Systems</link>
  <description><![CDATA[This dissertation makes significant contributions to automatic, scalable, and data-driven approaches for securing smart cyber-physical systems (CPS). Smart CPS are increasingly embedded in our everyday life. Security incidents involving them are often high-profile because of their ability to control critical infrastructure. Stuxnet and the Ukrainian power-grid attack are some notorious attacks reported against CPS which impacted governmental programs to ordinary users. In addition to the deli...]]></description>
  <dc:date>2019-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1133/A-Framework-for-Detecting-Anomalous-Behaviors-in-Smart-Cyber-Physical-Systems">
  <title><![CDATA[A Framework for Detecting Anomalous Behaviors in Smart Cyber-Physical Systems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1133/A-Framework-for-Detecting-Anomalous-Behaviors-in-Smart-Cyber-Physical-Systems</link>
  <description><![CDATA[This dissertation makes significant contributions to automatic, scalable, and data-driven approaches for securing smart cyber-physical systems (CPS). Smart CPS are increasingly embedded in our everyday life. Security incidents involving them are often high-prolfie because of their ability to control critical infrastructure.  Stuxnet and the Ukrainian power-grid attack are some notorious attacks reported against CPS which impacted governmental programs to ordinary users. In addition to the del...]]></description>
  <dc:date>2019-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/926/Security-in-Smart-Cyber-Physical-Systems-A-Case-Study-on-Smart-Grids-and-Smart-Cars">
  <title><![CDATA[Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/926/Security-in-Smart-Cyber-Physical-Systems-A-Case-Study-on-Smart-Grids-and-Smart-Cars</link>
  <description><![CDATA[Smart cyber-physical systems (CPS) form an integral part of Smart Cities, and are deployed in various domains, such as energy and transportation. In general, a smart CPS senses data from the physical world and uses cyber capabilities to transmit and analyze this data for making intelligent decisions in their respective domains. However, the growing number of cyberattacks against CPSs can badly affect their reputation and wide-scale acceptability. The Ukrainian smart grid attack and Jeep hack ...]]></description>
  <dc:date>2018-12-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/759/Using-Semantic-Technologies-to-Mine-Vehicular-Context-for-Security">
  <title><![CDATA[Using Semantic Technologies to Mine Vehicular Context for Security]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/759/Using-Semantic-Technologies-to-Mine-Vehicular-Context-for-Security</link>
  <description><![CDATA[The number of sensors, actuators and electronic
control units present in cars have increased in the last few years.
The Internet-of-Things (IoT) model has transformed modern
vehicles into a co-engineered interacting network of physical
and computational components. Vehicles have become a complex
cyber-physical system where context detection has become a
challenge. In this paper, we present a rule based approach for
context detection in vehicles. We also discuss various attack
surfaces...]]></description>
  <dc:date>2016-09-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/728/Context-Sensitive-Policy-Based-Security-in-Internet-of-Things">
  <title><![CDATA[Context-Sensitive Policy Based Security in Internet of Things]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/728/Context-Sensitive-Policy-Based-Security-in-Internet-of-Things</link>
  <description><![CDATA[According to recent media reports, there has been a surge in the number of devices that are being connected to the Internet. The Internet of Things (IoT), also referred to as Cyber-Physical Systems, is a collection of physical entities with computational and communication capabilities. The storage and computing power of these devices is often limited and their designs currently focus on ensuring functionality and largely ignore other requirements, including security and privacy concerns. We p...]]></description>
  <dc:date>2016-05-18</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/725/Detecting-Botnets-Using-a-Collaborative-Situational-aware-IDPS">
  <title><![CDATA[Detecting Botnets Using a Collaborative Situational-aware IDPS]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/725/Detecting-Botnets-Using-a-Collaborative-Situational-aware-IDPS</link>
  <description><![CDATA[Botnet attacks turn susceptible victim computers into bots that perform various malicious activities while under the control of a botmaster. Some examples of the damage they cause include denial-of-service attacks, click fraud, spamware, and phishing. These attacks can vary in the type of architecture and communication protocol used, which might be modified during the botnet's lifespan. Intrusion detection and prevention systems are one way to safeguard the cyber-physical systems we use, but ...]]></description>
  <dc:date>2016-02-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/576/Managing-and-Securing-Critical-Infrastructure-A-Semantic-Policy-and-Trust-Driven-Approach">
  <title><![CDATA[Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/576/Managing-and-Securing-Critical-Infrastructure-A-Semantic-Policy-and-Trust-Driven-Approach</link>
  <description><![CDATA[Cyber-physical systems (CPS) and cyber infrastructure are key elements of the national infrastructure, and securing them is of vital importance to national security. There is ample evidence that these systems are vulnerable to disruption and damage due to natural disasters, social crises, and terrorism. CPS applications are becoming more widespread, ranging from healthcare patient monitoring systems to autonomous vehicles to integrated electrical power grids. Often, the new application domain...]]></description>
  <dc:date>2012-01-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/359/Extracting-Cybersecurity-related-entities-terms-and-concepts-from-text-">
  <title><![CDATA[Extracting Cybersecurity related entities, terms and concepts from text.]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/359/Extracting-Cybersecurity-related-entities-terms-and-concepts-from-text-</link>
  <description><![CDATA[MS Thesis Presentation

Securing computers, data, cyber-physical systems and networks is a growing problem as society's dependence on them increases while they remain vulnerable to attacks by both criminals and rival nation states. Creating 'situationally aware' computer systems that defend against new "zero day" software vulnerabilities requires them to automatically integrate and use new security-related data from a wide variety of sources. One important source is information found in tex...]]></description>
  <dc:date>2013-05-30</dc:date>
 </item>
</rdf:RDF>
