<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=nist">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=nist]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for nist]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/482/Kelvin-Information-Extraction-System"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/460/Phd-proposal-A-Semantic-Resolution-Framework-for-Manufacturing-Capability-Data-Integration"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/451/Information-Extraction-of-Security-related-entities-and-concepts-from-unstructured-text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/446/Predicting-Chronic-Diseases-with-Machine-Learning"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/441/An-architecture-for-enterprise-information-interoperability"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/434/Cyber-Physical-Social-Systems-Research-Challenges"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/417/Semantic-Web-Meetup"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/412/Beyond-Reactive-Management-of-Network-Intrusions"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/399/Context-Aware-Middleware-for-Activity-Recognition"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/44/Yun-Peng-receives-award-from-NIST-for-supply-chain-research"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/40/Platys-From-Position-to-Place-in-Next-Generation-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/33/SemNews-news-text-to-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/48/Damlator-Semantic-Web-Translator"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/13/EECOMS"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/110/Medical-Data-Polygraph"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/111/Medical-Device-Regulatory-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/92/Platys-From-Position-to-Place-in-Next-Generation-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/78/Policy-based-Automated-WAN-Configuration-and-Management"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/63/Trauma-Pod"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1203/DUNE-A-Machine-Learning-Deep-UNET-based-ensemble-Approach-to-Monthly-Seasonal-and-Annual-Climate-Forecasting"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1186/MedReg-KG-KnowledgeGraph-for-Streamlining-Medical-Device-Regulatory-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1180/Semantically-Rich-Approach-to-Automating-Regulations-of-Medical-Devices"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1146/Employing-Word-Embedding-for-Schema-Matching-in-Standard-Lifecycle-Management"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1060/Policy-Integrated-Blockchain-to-Automate-HIPAA-Part-2-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1036/Process-Knowledge-Infused-AI-Toward-User-Level-Explainability-Interpretability-and-Safety"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/308/Quick-and-Shallow-Introduction-to-Cloud-Computing-and-Amazon-Web-Services"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/482/Kelvin-Information-Extraction-System">
  <title><![CDATA[Kelvin Information Extraction System]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/482/Kelvin-Information-Extraction-System</link>
  <description><![CDATA[I'll describe recent work on the Kelvin information extraction system and its performance in two tasks in the 2015 NIST Text Analysis Conference.  Kelvin has been under development at the JHU Human Language Center of Excellence for several years.  Kelvin reads documents in several languages and extracts entities and relations between them. This year it was used for the Coldstart Knowledge Base Population and Trilingual Entity Discovery and Linking tasks.  Key components in the tasks are a sys...]]></description>
  <dc:date>2015-11-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/460/Phd-proposal-A-Semantic-Resolution-Framework-for-Manufacturing-Capability-Data-Integration">
  <title><![CDATA[Phd proposal: A Semantic Resolution Framework for Manufacturing Capability Data Integration]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/460/Phd-proposal-A-Semantic-Resolution-Framework-for-Manufacturing-Capability-Data-Integration</link>
  <description><![CDATA[Building flexible manufacturing supply chains requires interoperable and accurate manufacturing service capability (MSC) information of all supply chain participants. Today, MSC information, which is typically published either on the supplier’s web site or registered at an e-marketplace portal, has been shown to fall short of the interoperability and accuracy requirements. This issue can be addressed by annotating the MSC information using shared ontologies. However, ontology-based approach...]]></description>
  <dc:date>2013-05-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints">
  <title><![CDATA[MS defense: Social Media Analytics: Digital Footprints]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints</link>
  <description><![CDATA[In this work we describe an approach to distinguish real and impostor/ compromised accounts on social media. Compromising a user's social media account is not only a breach of security, but can also lead to dissemination of misinformation at a fast pace on social media. There have been several such high profile attacks recently, including on Twitter feeds of AP, CBS, and Delta Airlines. A fake account for the Prime Minister's Office in India was used to spread malicious rumors last year. Our ...]]></description>
  <dc:date>2013-05-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/451/Information-Extraction-of-Security-related-entities-and-concepts-from-unstructured-text">
  <title><![CDATA[Information Extraction of Security related entities and concepts from unstructured text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/451/Information-Extraction-of-Security-related-entities-and-concepts-from-unstructured-text</link>
  <description><![CDATA[Cyber Security has been a big concern especially in past one decade where it is witnessed that targets ranging from large number of internet users to government agencies are being attacked because of vulnerabilities present in the system. Even though these vulnerabilities are identified and published publicly but response has always been slow in covering up these vulnerabilities because there is no automatic mechanism to understand and process this unstructured text that is published on inter...]]></description>
  <dc:date>2013-04-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/446/Predicting-Chronic-Diseases-with-Machine-Learning">
  <title><![CDATA[Predicting Chronic Diseases with Machine Learning]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/446/Predicting-Chronic-Diseases-with-Machine-Learning</link>
  <description><![CDATA[In recent years we saw an explosion of cheap genetic tests, which lead to the emergence of personalized medicine.  Personalized medicine is defined as practice of medicine that is tailored to specifics of individual patient.  My work addresses the problem of attempting to predict individual’s predisposition towards certain chronic diseases based on the individual’s genetic makeup.  The benefits of such work allow for more selective administration of invasive tests such as biopsies, which ...]]></description>
  <dc:date>2013-03-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/441/An-architecture-for-enterprise-information-interoperability">
  <title><![CDATA[An architecture for enterprise information interoperability]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/441/An-architecture-for-enterprise-information-interoperability</link>
  <description><![CDATA[The World Wide Web differed from other early hypertext systems in the removal of "back links" (the ability of a hyperlinked object to link back to a referring resource). The removal of back links allowed the scalability inherent in the Web's design, but sacrificed the knowledge necessary to update links when content moved. Persistent URLs (PURLs) have been used on the Web since 1995 to provide an inexpensive and partial solution to link updates via HTTP redirection: PURLs do not change thei...]]></description>
  <dc:date>2012-11-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/434/Cyber-Physical-Social-Systems-Research-Challenges">
  <title><![CDATA[Cyber-Physical Social Systems: Research Challenges]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/434/Cyber-Physical-Social-Systems-Research-Challenges</link>
  <description><![CDATA[We are witnessing a new revolution in computing and communication. The Internet, which has spanned several networks in a wide variety of domains, is having a significant impact on every aspect of our lives. The next generation of networks will utilize a wide variety of resources with significant sensing capabilities. Such networks will extend beyond physically linked computers to include multimodal information from biological, cognitive, semantic, and social networks. This paradigm shift will...]]></description>
  <dc:date>2012-04-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/417/Semantic-Web-Meetup">
  <title><![CDATA[Semantic Web Meetup]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/417/Semantic-Web-Meetup</link>
  <description><![CDATA[The UMBC Ebiquity Lab is hosting the November meeting of the Lotico Central Maryland Semantic Web Meetup from 6:00-8:00 pm in room 456 of the ITE building (directions).  All are welcome.  If you want to attend, please join the  Central MD Semantic Web Meetup group and RSVP.  The meeting will start with a pizza social from 6:00pm to 6:45pm and then continue with a series of short presentations of current Semantic Web research being done in our lab.

  Tim Finin: introduction and overview

...]]></description>
  <dc:date>2011-11-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/412/Beyond-Reactive-Management-of-Network-Intrusions">
  <title><![CDATA[Beyond Reactive Management of Network Intrusions]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/412/Beyond-Reactive-Management-of-Network-Intrusions</link>
  <description><![CDATA[This talk will discuss issues and methods for survivability of systems under malicious attacks. To protect from such attacks, it is necessary to take steps to prevent attacks from succeeding. At the same time, it is important to recognize that not all attacks can be averted at the outset; attacks that are successful to some degree must be recognized as unavoidable and comprehensive support for identifying and responding to attacks is required.

In my talk, I will describe the recent researc...]]></description>
  <dc:date>2011-10-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/399/Context-Aware-Middleware-for-Activity-Recognition">
  <title><![CDATA[Context-Aware Middleware for Activity Recognition]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/399/Context-Aware-Middleware-for-Activity-Recognition</link>
  <description><![CDATA[Smartphones and other mobile devices have a simple notion of context largely restricted to temporal and spatial coordinates. Service providers and enterprise administrators can deploy systems incorporating activity and relations context to enhance the user experience, but this raises considerable collaboration, trust and privacy issues between different service providers. Our work is an initial step toward enabling devices themselves to represent, acquire and use a richer notion of context th...]]></description>
  <dc:date>2011-05-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/44/Yun-Peng-receives-award-from-NIST-for-supply-chain-research">
  <title><![CDATA[Yun Peng receives award from NIST for supply chain research]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/44/Yun-Peng-receives-award-from-NIST-for-supply-chain-research</link>
  <description><![CDATA[Professor Yun Peng received a research award of $150,000 from the National Institute of Standards and Technology support work on "Integration Testing in Supply Chain Logistics" in the coming year. The research is focused on improving the systems that companies use to exchange and process information on services, products, orders and transportation. The objective is to reduce or eliminate problems that lead to late deliveries, inaccurate tracking, insufficient visibility, poor security, unreli...]]></description>
  <dc:date>2011-03-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/40/Platys-From-Position-to-Place-in-Next-Generation-Networks">
  <title><![CDATA[Platys: From Position to Place in Next Generation Networks]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/40/Platys-From-Position-to-Place-in-Next-Generation-Networks</link>
  <description><![CDATA[A UMBC research team led by Anupam Joshi and Tim Finin received an award from
NSF for four-year project that will explore how advances
in mobile technology and networking can support systems that
understand and adapt their behavior to their user's context,
activities and preferences.

Platys is a collaborative research project between
UMBC and groups at North Carolina State (led by Munindar
Singh and Injong
Rhee) and Duke (led by Romit Roy Choudhury)
Universities.  The group will sh...]]></description>
  <dc:date>2009-08-31</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/33/SemNews-news-text-to-Semantic-Web">
  <title><![CDATA[SemNews: news text to Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/33/SemNews-news-text-to-Semantic-Web</link>
  <description><![CDATA[SemNews Understands the News 

 Prototype UMBC system interprets online news stories  and  publishes text meaning on the Semantic Web

      SemNews is a prototype
application being developed by UMBC Ph.D. student Akshay Java that
uses a sophisticated text understanding system to interpret summaries
of news stories, publishes the results on the semantic web and
provides browsing and query services over them.  The project is the
result of a collaboration between the UMBC's Institute ...]]></description>
  <dc:date>2006-01-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/48/Damlator-Semantic-Web-Translator">
  <title><![CDATA[Damlator: Semantic Web Translator]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/48/Damlator-Semantic-Web-Translator</link>
  <description><![CDATA[Developing DAMLator as a module for the popular Apache web server which does server side translations of DAML encoded files and caches the results. Current translation targets include Ntriples, Prolog terms, GIF and PNG. The benefits of using DAMLator are threefold. First, the caching mechanism provides efficiency and scaling by avoiding repeated translations of the DAML encoded files. Second, doing the translation on the server side means that client applications can be smaller, simpler and ...]]></description>
  <dc:date>2001-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/13/EECOMS">
  <title><![CDATA[EECOMS]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/13/EECOMS</link>
  <description><![CDATA[EECOMS was a NIST sponsored project with the goal "to develop a new framework for people, applications and software agents to collaborate on supply chain logistics, resulting in faster delivery of products to customers, reduction of costly inventories, and an overall increase of U.S. manufacturers' competitiveness in the global marketplace."]]></description>
  <dc:date>1996-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/110/Medical-Data-Polygraph">
  <title><![CDATA[Medical Data Polygraph]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/110/Medical-Data-Polygraph</link>
  <description><![CDATA[Healthcare organizations exchange sensitive health records, including behavioral health data, across peer-to-peer networks, and it is challenging to find and fix compliance issues proactively.

The Healthcare industry anticipates a growing need to audit substance use disorder patient data, commonly referred to as Part 2 data, having been shared without a release of information signed by the patient. To address this need, we developed and evaluated a novel methodology to detect Part 2 data e...]]></description>
  <dc:date>2022-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/111/Medical-Device-Regulatory-Compliance">
  <title><![CDATA[Medical Device Regulatory Compliance]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/111/Medical-Device-Regulatory-Compliance</link>
  <description><![CDATA[Healthcare providers are deploying a large number of AI-driven Medical devices to help monitor and medicate patients. For patients with chronic ailments, like diabetes or gastric diseases, usage of these devices becomes part of their daily lifestyle. These medical devices often capture personally identifiable information (PII) and hence are strictly regulated by the Food and Drug Administration (FDA) to ensure the safety and efficacy of the medical device. Medical device regulations are curre...]]></description>
  <dc:date>2023-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/92/Platys-From-Position-to-Place-in-Next-Generation-Networks">
  <title><![CDATA[Platys: From Position to Place in Next Generation Networks]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/92/Platys-From-Position-to-Place-in-Next-Generation-Networks</link>
  <description><![CDATA[Platys is a collaborative research project between
UMBC and groups at North Carolina State (led by Munindar
Singh and Injong
Rhee) and Duke (led by Romit Roy Choudhury)
Universities.  The group will share $1.8M in research funding
from NSF's Network
Science and Engineering program.

Platys will develop a high-level notion of 'context' that
exploits the capabilities of next generation networks to enable
applications that deliver better user experiences. In particular,
it exploits mo...]]></description>
  <dc:date>2009-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/78/Policy-based-Automated-WAN-Configuration-and-Management">
  <title><![CDATA[Policy-based Automated WAN Configuration and Management]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/78/Policy-based-Automated-WAN-Configuration-and-Management</link>
  <description><![CDATA[There are many significant challenges related to configuration and management of wide-area networks due to their rapidly growing complexity, failures, and attacks.  The DARPA Knowledge Plane Study identified that main challenges to be intelligent network management, fault detection, attack response, and fast network configuration.  With uncertainty and threads of battle areas, these challenges further grow exponentially.

In order to overcome the challenges, the project aims at developing a...]]></description>
  <dc:date>2006-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/63/Trauma-Pod">
  <title><![CDATA[Trauma Pod]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/63/Trauma-Pod</link>
  <description><![CDATA[DARPA's Defense Sciences Office has funded a team led by SRI
to develop a prototype toward the development of a future
generation of battlefield-based unmanned medical treatment
systems.  These "Trauma Pods" will stabilize injured
soldiers within minutes after a battlefield trauma and
administer life-saving medical and surgical care prior to
evacuation and during transport.

The first phase of the program is an effort to develop
robotic technology to perform a totally unmanned surg...]]></description>
  <dc:date>2005-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin">
  <title><![CDATA[Security Compliance for Smart Manufacturing using Knowledgegraph based Digital Twin]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin</link>
  <description><![CDATA[The combination of Information Technology (IT) and Operational Technology (OT) in smart manufacturing, driven by smart factory innovations and Internet of Things (IoT) devices, generates vast, diverse, and rapidly evolving Big Data, which in turn increases cybersecurity and compliance issues. Adherence to security standards, such as NIST SP 800-171, which requires rigorous access control and audit reporting, is currently obstructed by the resource-intensive and error-prone aspects of manual e...]]></description>
  <dc:date>2025-12-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1203/DUNE-A-Machine-Learning-Deep-UNET-based-ensemble-Approach-to-Monthly-Seasonal-and-Annual-Climate-Forecasting">
  <title><![CDATA[DUNE: A Machine Learning Deep UNET++ based ensemble Approach to Monthly, Seasonal and Annual Climate Forecasting]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1203/DUNE-A-Machine-Learning-Deep-UNET-based-ensemble-Approach-to-Monthly-Seasonal-and-Annual-Climate-Forecasting</link>
  <description><![CDATA[Capitalizing on the recent availability of ERA5 monthly averaged, long-term data records of mean atmospheric and climate fields derived from the high-resolution reanalysis, deep learning architectures provide an alternative to physics-based daily numerical weather predictions for subseasonal to seasonal (S2S) and annual forecasts. A novel deep U-Net++-based ensemble (DUNE) neural architecture is introduced, incorporating encoder–decoder structures with residual blocks. When initialized with...]]></description>
  <dc:date>2025-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance">
  <title><![CDATA[Integrating Knowledge Graphs with Retrieval-Augmented Generation to Automate IoT Device Security Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance</link>
  <description><![CDATA[As IoT device adoption grows, ensuring cybersecurity compliance with IoT standards, like National Institute of Standards and Technology Interagency (NISTIR) 8259A, has become increasingly complex. These standards are typically presented in lengthy, text-based formats that are difficult to process and query automatically. We built a knowledge graph to address this challenge to represent the key concepts, relationships, and references within NISTIR 8259A. We further integrate this knowledge gra...]]></description>
  <dc:date>2025-07-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1186/MedReg-KG-KnowledgeGraph-for-Streamlining-Medical-Device-Regulatory-Compliance">
  <title><![CDATA[MedReg-KG: KnowledgeGraph for Streamlining Medical Device Regulatory Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1186/MedReg-KG-KnowledgeGraph-for-Streamlining-Medical-Device-Regulatory-Compliance</link>
  <description><![CDATA[Healthcare providers are deploying a large number
of AI-driven Medical devices to help monitor and medicate
patients. For patients with chronic ailments, like diabetes or
gastric diseases, usage of these devices becomes part of their
daily lifestyle. These medical devices often capture personally
identifiable information (PII) and hence are strictly regulated by
the Food and Drug Administration (FDA) to ensure the safety
and efficacy of the medical device. Medical device regulations
a...]]></description>
  <dc:date>2024-12-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1180/Semantically-Rich-Approach-to-Automating-Regulations-of-Medical-Devices">
  <title><![CDATA[Semantically Rich Approach to Automating Regulations of Medical Devices]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1180/Semantically-Rich-Approach-to-Automating-Regulations-of-Medical-Devices</link>
  <description><![CDATA[Advanced medical devices increasingly use sophisticated AI/ML models to enable real-time analytics for monitoring patients. In the US, these AI models, which often form the underlying device software, are regulated by the Center for Devices & Radiological Health (CDRH) at the Food & Drug Administration (FDA) to ensure the safety & efficacy of the medical device. These regulations for medical devices are currently available as large textual documents, called Code of Federal Regulations (CFR) T...]]></description>
  <dc:date>2024-07-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1146/Employing-Word-Embedding-for-Schema-Matching-in-Standard-Lifecycle-Management">
  <title><![CDATA[Employing Word-Embedding for Schema Matching in Standard Lifecycle Management]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1146/Employing-Word-Embedding-for-Schema-Matching-in-Standard-Lifecycle-Management</link>
  <description><![CDATA[Today, businesses rely on numerous information systems to achieve their production goals and improve their global competitiveness. Semantically integrating those systems is essential for businesses to achieve both. To do so, businesses must rely on standards, the most important of which are data exchange standards (DES). DES focus on technical and business semantics that are needed to deliver quality and timely products and services. Consequently, the ability for businesses to quickly use and...]]></description>
  <dc:date>2024-03-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance">
  <title><![CDATA[IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance</link>
  <description><![CDATA[The proliferation of the Internet of Things (IoT) has led to an exponential increase in data generation, especially from wearable IoT devices. While this data influx offers unparalleled insights and connectivity, it also brings significant privacy and security challenges. Existing regulatory frameworks like the United States (US) National Institute of Standards and Technology Interagency or Internal Report (NISTIR) 8228, the US Health Insurance Portability and Accountability Act (HIPAA), and ...]]></description>
  <dc:date>2023-12-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations">
  <title><![CDATA[Ensuring Privacy Policy Compliance of Wearables with IoT Regulations]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations</link>
  <description><![CDATA[In an era where wearables, particularly those in non-hospital settings, collect and transmit sensitive personal data, it is imperative to implement stringent privacy safeguards. The National Institute of Standards and Technology (NIST) Internal Report 8228 provides regulations for securing Internet of Things (IoT) devices, data, and the privacy of individuals. We have developed a novel framework for examining the privacy policies governing the data and information utilized by wearable devices...]]></description>
  <dc:date>2023-11-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1060/Policy-Integrated-Blockchain-to-Automate-HIPAA-Part-2-Compliance">
  <title><![CDATA[Policy Integrated Blockchain to Automate HIPAA Part 2 Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1060/Policy-Integrated-Blockchain-to-Automate-HIPAA-Part-2-Compliance</link>
  <description><![CDATA[Healthcare organizations exchange sensitive health records, including behavioral health data, across peer-to-peer networks, and it is challenging to find and fix compliance issues proactively. The Healthcare industry anticipates a growing need to audit substance use disorder patient data, commonly referred to as Part 2 data, having been shared without a release of information signed by the patient. To address this need, we developed and evaluated a novel methodology to detect Part 2 data exch...]]></description>
  <dc:date>2023-07-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1036/Process-Knowledge-Infused-AI-Toward-User-Level-Explainability-Interpretability-and-Safety">
  <title><![CDATA[Process Knowledge-Infused AI: Toward User-Level Explainability, Interpretability, and Safety]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1036/Process-Knowledge-Infused-AI-Toward-User-Level-Explainability-Interpretability-and-Safety</link>
  <description><![CDATA[AI has seen wide adoption for automating tasks in several domains. However, AI's use in high-value, sensitive, or safety-critical applications such as self-management for personalized health or personalized nutrition has been challenging. These require that the AI system follows guidelines or well-defined processes set by experts, community, or standards. We characterize these as process knowledge (PK). For example, to diagnose the severity of depression, the AI system should incorporate PK t...]]></description>
  <dc:date>2022-09-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/308/Quick-and-Shallow-Introduction-to-Cloud-Computing-and-Amazon-Web-Services">
  <title><![CDATA[Quick and Shallow Introduction to Cloud Computing and Amazon Web Services]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/308/Quick-and-Shallow-Introduction-to-Cloud-Computing-and-Amazon-Web-Services</link>
  <description><![CDATA[Vlad Korolev will provide a quick overview of development techniques for cloud computing environments and survey of major providers and services offered by them. He will explain the anatomy of typical cloud computing application and provide provide a concrete example of the application within the Amazon Web Services environment (comprising EC2, S3, SQS, and RDS). Vlad will also give an overview of the available development and administration tools and how to get started with EC2. The talk wil...]]></description>
  <dc:date>2010-09-21</dc:date>
 </item>
</rdf:RDF>
