<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=iot">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=iot]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for iot]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/484/Semantic-knowledge-and-privacy-in-the-physical-web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/434/Cyber-Physical-Social-Systems-Research-Challenges"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/237/Research-Challenges-In-Data-Mining"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/128/The-Internet-of-Things"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/476/Semantics-for-Privacy-and-Context-on-the-IoT"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1200/Automating-IoT-Data-Privacy-Compliance-by-Integrating-Knowledge-Graphs-With-Large-Language-Models"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1135/Change-Management-using-Generative-Modeling-on-Digital-Twins"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1043/Sentaur-Sensor-Observable-Data-Model-for-Smart-Spaces"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1041/JENNER-Just-in-time-Enrichment-in-Query-Processing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1044/The-SemIoTic-Ecosystem-A-Semantic-Bridge-between-IoT-Devices-and-Smart-Spaces"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/367/Semantics-for-Privacy-and-Context-on-the-IoT"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/371/UMBC-IOT-Android-client"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/484/Semantic-knowledge-and-privacy-in-the-physical-web">
  <title><![CDATA[Semantic knowledge and privacy in the physical web]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/484/Semantic-knowledge-and-privacy-in-the-physical-web</link>
  <description><![CDATA[In the past few years, the Internet of Things has started to become a reality; however, its growth has been hampered by privacy and security concerns. One promising approach is to use Semantic Web technologies to mitigate privacy concerns in an informed, flexible way. We present CARLTON, a framework for managing data privacy for entities in a Physical Web deployment using Semantic Web technologies. CARLTON uses context-sensitive privacy policies to protect privacy of organizational and person...]]></description>
  <dc:date>2016-09-27</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/434/Cyber-Physical-Social-Systems-Research-Challenges">
  <title><![CDATA[Cyber-Physical Social Systems: Research Challenges]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/434/Cyber-Physical-Social-Systems-Research-Challenges</link>
  <description><![CDATA[We are witnessing a new revolution in computing and communication. The Internet, which has spanned several networks in a wide variety of domains, is having a significant impact on every aspect of our lives. The next generation of networks will utilize a wide variety of resources with significant sensing capabilities. Such networks will extend beyond physically linked computers to include multimodal information from biological, cognitive, semantic, and social networks. This paradigm shift will...]]></description>
  <dc:date>2012-04-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/237/Research-Challenges-In-Data-Mining">
  <title><![CDATA[Research Challenges In Data Mining]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/237/Research-Challenges-In-Data-Mining</link>
  <description><![CDATA[Research in data mining has led to advanced knowledge discovery
technologies and applications. In this talk, we will discuss some
emerging research issues for advanced technologies and
applications in data mining and discuss some recent progress in
this direction, including (1) exploration of the power of pattern
mining, (2) analysis of multidimensional, heterogeneous and
evolving information network, (3) mining of fast changing data
streams, (4) mining of moving object data, RFID data...]]></description>
  <dc:date>2008-04-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/128/The-Internet-of-Things">
  <title><![CDATA[The Internet of Things]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/128/The-Internet-of-Things</link>
  <description><![CDATA[Rusty Irving, Global Technology Leader, Compute & Decision Science at
GE Global Research, is the next speaker for the UMBC Visionaries in
Information Technology Forum. The event begins at 7:30 a.m. until 9:30
a.m. on Dec. 13 in the BWI Airport Marriott Hotel (1743 West Nursery
Road Baltimore, MD 21240). The free forum includes a complimentary
breakfast. For more information and to register, visit
http://www.umbc.edu/visionaries.]]></description>
  <dc:date>2005-12-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/476/Semantics-for-Privacy-and-Context-on-the-IoT">
  <title><![CDATA[Semantics for Privacy and Context on the IoT]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/476/Semantics-for-Privacy-and-Context-on-the-IoT</link>
  <dc:date>1999-11-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing">
  <title><![CDATA[UMBC and IBM collaborate on autonomic computing]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing</link>
  <description><![CDATA[University of Maryland, Baltimore County and IBM Collaborate on 
Autonomic Computing Research

BALTIMORE, February 24, 2005 - IBM today announced a new Shared University Research (SUR) grant awarded a group of faculty researchers of the eBiquity research group at the University of Maryland, Baltimore County to help build a major new center for high performance computational research. 

This SUR grant is part of the latest series of Shared University Research (SUR) awards, bringing IBM's ...]]></description>
  <dc:date>2005-02-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin">
  <title><![CDATA[Security Compliance for Smart Manufacturing using Knowledgegraph based Digital Twin]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin</link>
  <description><![CDATA[The combination of Information Technology (IT) and Operational Technology (OT) in smart manufacturing, driven by smart factory innovations and Internet of Things (IoT) devices, generates vast, diverse, and rapidly evolving Big Data, which in turn increases cybersecurity and compliance issues. Adherence to security standards, such as NIST SP 800-171, which requires rigorous access control and audit reporting, is currently obstructed by the resource-intensive and error-prone aspects of manual e...]]></description>
  <dc:date>2025-12-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1200/Automating-IoT-Data-Privacy-Compliance-by-Integrating-Knowledge-Graphs-With-Large-Language-Models">
  <title><![CDATA[Automating IoT Data Privacy Compliance by Integrating Knowledge Graphs With Large Language Models]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1200/Automating-IoT-Data-Privacy-Compliance-by-Integrating-Knowledge-Graphs-With-Large-Language-Models</link>
  <description><![CDATA[Regulatory compliance is mandatory for Internet of Things (IoT) manufacturers, particularly under stringent frameworks such as the General Data Protection Regulation (GDPR), which governs the handling of personal data. We introduce a novel framework for automating IoT compliance verification by integrating a Large Language Model (LLM) with a domain-specific Knowledge Graph (KG). The framework achieves two primary objectives: 1) leveraging the LLM to interpret natural-language compliance queri...]]></description>
  <dc:date>2025-07-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance">
  <title><![CDATA[Integrating Knowledge Graphs with Retrieval-Augmented Generation to Automate IoT Device Security Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance</link>
  <description><![CDATA[As IoT device adoption grows, ensuring cybersecurity compliance with IoT standards, like National Institute of Standards and Technology Interagency (NISTIR) 8259A, has become increasingly complex. These standards are typically presented in lengthy, text-based formats that are difficult to process and query automatically. We built a knowledge graph to address this challenge to represent the key concepts, relationships, and references within NISTIR 8259A. We further integrate this knowledge gra...]]></description>
  <dc:date>2025-07-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation">
  <title><![CDATA[KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation</link>
  <description><![CDATA[In the realm of IoT/CPS systems connected over mobile networks, traditional intrusion detection methods analyze network traffic across multiple devices using anomaly detection techniques to flag potential security threats. However, these methods face significant privacy challenges, particularly with deep packet inspection and network communication analysis. This type of monitoring is highly intrusive, as it involves examining the content of data packets, which can include personal and sensiti...]]></description>
  <dc:date>2024-05-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance">
  <title><![CDATA[IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance</link>
  <description><![CDATA[The proliferation of the Internet of Things (IoT) has led to an exponential increase in data generation, especially from wearable IoT devices. While this data influx offers unparalleled insights and connectivity, it also brings significant privacy and security challenges. Existing regulatory frameworks like the United States (US) National Institute of Standards and Technology Interagency or Internal Report (NISTIR) 8228, the US Health Insurance Portability and Accountability Act (HIPAA), and ...]]></description>
  <dc:date>2023-12-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations">
  <title><![CDATA[Ensuring Privacy Policy Compliance of Wearables with IoT Regulations]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations</link>
  <description><![CDATA[In an era where wearables, particularly those in non-hospital settings, collect and transmit sensitive personal data, it is imperative to implement stringent privacy safeguards. The National Institute of Standards and Technology (NIST) Internal Report 8228 provides regulations for securing Internet of Things (IoT) devices, data, and the privacy of individuals. We have developed a novel framework for examining the privacy policies governing the data and information utilized by wearable devices...]]></description>
  <dc:date>2023-11-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1135/Change-Management-using-Generative-Modeling-on-Digital-Twins">
  <title><![CDATA[Change Management using Generative Modeling on Digital Twins]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1135/Change-Management-using-Generative-Modeling-on-Digital-Twins</link>
  <description><![CDATA[A key challenge faced by small and medium-sized business entities is securely managing software updates and changes. Specifically, with rapidly evolving cybersecurity threats, changes/updates/patches to software systems are necessary to stay ahead of emerging threats and are often mandated by regulators or statutory authorities to counter these. However, security patches/updates require stress testing before they can be released in the production system. Stress testing in production environme...]]></description>
  <dc:date>2023-10-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1043/Sentaur-Sensor-Observable-Data-Model-for-Smart-Spaces">
  <title><![CDATA[Sentaur: Sensor Observable Data Model for Smart Spaces]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1043/Sentaur-Sensor-Observable-Data-Model-for-Smart-Spaces</link>
  <description><![CDATA[This paper presents Sentaur, a middleware designed, built, and deployed to support sensor-based smart space analytical applications. Sentaur supports a powerful data model that decouples semantic data (about the application domain) from sensor data (using which the semantic data is derived). By supporting mechanisms to map/translate data, concepts, and queries between the two levels, Sentaur relieves application developers from having to know or reason about either capabilities of sensors or ...]]></description>
  <dc:date>2022-10-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1041/JENNER-Just-in-time-Enrichment-in-Query-Processing">
  <title><![CDATA[JENNER: Just-in-time Enrichment in Query Processing]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1041/JENNER-Just-in-time-Enrichment-in-Query-Processing</link>
  <description><![CDATA[Emerging domains, such as sensor-driven smart spaces and social media analytics, require incoming data to be enriched prior to its use.  Enrichment often consists of machine learning (ML) functions that are too expensive/infeasible to execute at ingestion. We develop a strategy entitled Just-in-time ENrichmeNt in quERy Processing (JENNER) to support interactive analytics over data as soon as it arrives for such application context. JENNER exploits the inherent tradeoffs of cost and quality of...]]></description>
  <dc:date>2022-09-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1044/The-SemIoTic-Ecosystem-A-Semantic-Bridge-between-IoT-Devices-and-Smart-Spaces">
  <title><![CDATA[The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1044/The-SemIoTic-Ecosystem-A-Semantic-Bridge-between-IoT-Devices-and-Smart-Spaces</link>
  <description><![CDATA[Smart space administration and application development is challenging in part due to the semantic gap that exists between the high-level requirements of users and the low-level capabilities of IoT devices. The stakeholders in a smart space are required to deal with communicating with specific IoT devices, capturing data, processing it, and abstracting it out to generate useful inferences. Additionally, this makes reusability of smart space applications difficult since they are developed for s...]]></description>
  <dc:date>2022-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/367/Semantics-for-Privacy-and-Context-on-the-IoT">
  <title><![CDATA[Semantics for Privacy and Context on the IoT]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/367/Semantics-for-Privacy-and-Context-on-the-IoT</link>
  <dc:date>2015-05-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/371/UMBC-IOT-Android-client">
  <title><![CDATA[UMBC IOT Android client]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/371/UMBC-IOT-Android-client</link>
  <description><![CDATA[UMBC IoT Project Android Client
Install a latest version of the app from release list link from webpage below. In the current mode of deployment, the app will work, if you are near one of our beacons in the Information Technology and Engineering building at UMBC. If you are near one of them, you will be able to query our Knowledge Base using voice commands or through text input. It's an AMA app, enabling you to ask queries about any organization (for example UMBC).]]></description>
  <dc:date>2017-04-04</dc:date>
 </item>
</rdf:RDF>
