<![CDATA[UMBC ebiquity RSS Tag Search]]> <![CDATA[Modeling and Extracting information about Cybersecurity Events from Text]]> http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text 2017-05-16 <![CDATA[Leveraging semantic context to establish access controls for secure cloud-based electronic health records]]> http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records 2024-04-01 <![CDATA[Enhancing Knowledge Graph Consistency through Open Large Language Models: A Case Study]]> http://ebiquity.umbc.edu/paper/html/id/1169/Enhancing-Knowledge-Graph-Consistency-through-Open-Large-Language-Models-A-Case-Study 2024-03-25 <![CDATA[Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations]]> http://ebiquity.umbc.edu/paper/html/id/1128/Secure-and-Privacy-Compliant-Data-Sharing-An-Essential-Framework-for-Healthcare-Organizations 2024-01-04 <![CDATA[IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance]]> http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance 2023-12-15 <![CDATA[An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains]]> http://ebiquity.umbc.edu/paper/html/id/1073/An-Overview-of-Cybersecurity-Knowledge-Graphs-Mapped-to-the-MITRE-ATT-CK-Framework-Domains 2023-10-03 <![CDATA[Knowledge Graph-driven Tabular Data Discovery from Scientific Documents]]> http://ebiquity.umbc.edu/paper/html/id/1071/Knowledge-Graph-driven-Tabular-Data-Discovery-from-Scientific-Documents 2023-09-01 <![CDATA[Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy]]> http://ebiquity.umbc.edu/paper/html/id/1104/Knowledge-Enhanced-Neurosymbolic-Artificial-Intelligence-for-Cybersecurity-and-Privacy 2023-09-01 <![CDATA[Knowledge Infusion in Privacy Preserving Data Generation]]> http://ebiquity.umbc.edu/paper/html/id/1136/Knowledge-Infusion-in-Privacy-Preserving-Data-Generation 2023-08-06 <![CDATA[Knowledge Graphs and Reinforcement Learning: A Hybrid Approach for Cybersecurity Problems]]> http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems 2023-07-19 <![CDATA[Policy Integrated Blockchain to Automate HIPAA Part 2 Compliance]]> http://ebiquity.umbc.edu/paper/html/id/1060/Policy-Integrated-Blockchain-to-Automate-HIPAA-Part-2-Compliance 2023-07-05 <![CDATA[knowledge graphs]]> http://ebiquity.umbc.edu/research/area/id/39/knowledge-graphs 2024-03-29 <![CDATA[Extracting Malware Information from Cybersecurity Text]]> http://ebiquity.umbc.edu/resource/html/id/384/Extracting-Malware-Information-from-Cybersecurity-Text <![CDATA[Semantic Knowledge Graphs for Cybersecurity]]> http://ebiquity.umbc.edu/resource/html/id/381/Semantic-Knowledge-Graphs-for-Cybersecurity 2020-06-23