<![CDATA[UMBC ebiquity RSS Tag Search]]> <![CDATA[A Collaborative Approach to Situational Awareness for CyberSecurity]]> http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity 2013-04-29 <![CDATA[Identification of common best practices in Stem Cell Preparation]]> http://ebiquity.umbc.edu/event/html/id/433/Identification-of-common-best-practices-in-Stem-Cell-Preparation 2012-04-05 <![CDATA[Recovering from Internet Routing Failures using Declarative Policies and Argumentation Protocols]]> http://ebiquity.umbc.edu/event/html/id/341/Recovering-from-Internet-Routing-Failures-using-Declarative-Policies-and-Argumentation-Protocols 2010-04-13 <![CDATA[Privacy Preserving Distributed Data Mining: A Multi-objective Optimization and Algorithmic Game-theoretic Approach]]> http://ebiquity.umbc.edu/event/html/id/312/Privacy-Preserving-Distributed-Data-Mining-A-Multi-objective-Optimization-and-Algorithmic-Game-theoretic-Approach 2009-09-16 <![CDATA[Creating and Exploiting a Web of Semantic Data]]> http://ebiquity.umbc.edu/event/html/id/304/Creating-and-Exploiting-a-Web-of-Semantic-Data 2009-08-05 <![CDATA[Creating and exploiting a web of (semantic) data]]> http://ebiquity.umbc.edu/event/html/id/298/Creating-and-exploiting-a-web-of-semantic-data 2009-05-01 <![CDATA[A Game Theoretic Framework for Distributed Multi-Party Privacy Preserving Data Mining]]> http://ebiquity.umbc.edu/event/html/id/223/A-Game-Theoretic-Framework-for-Distributed-Multi-Party-Privacy-Preserving-Data-Mining 2007-11-19 <![CDATA[Cross-layer Analysis for Detecting Wireless Misbehavior]]> http://ebiquity.umbc.edu/event/html/id/117/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior 2005-10-19 <![CDATA[Multiagent Systems meet the Semantic Web in the Aether]]> http://ebiquity.umbc.edu/event/html/id/111/Multiagent-Systems-meet-the-Semantic-Web-in-the-Aether 2005-10-18 <![CDATA[A Holistic Approach to Secure Sensor Networks]]> http://ebiquity.umbc.edu/event/html/id/110/A-Holistic-Approach-to-Secure-Sensor-Networks 2005-07-28 <![CDATA[Three new PhDs]]> http://ebiquity.umbc.edu/getnews/html/id/10/Three-new-PhDs 2004-05-19 <![CDATA[Allia: Alliance-based Service Discovery]]> http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery 2002-03-01 <![CDATA[An Agent Based Distributed Computing System using XReggie and Ronin]]> http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin 1999-12-01 <![CDATA[CentaurusComm]]> http://ebiquity.umbc.edu/project/html/id/23/CentaurusComm 1999-01-01 <![CDATA[DAML / ITTalks]]> http://ebiquity.umbc.edu/project/html/id/8/DAML-ITTalks 2000-10-01 <![CDATA[Disconnected Web Browsing]]> http://ebiquity.umbc.edu/project/html/id/18/Disconnected-Web-Browsing 1999-12-01 <![CDATA[MOWSER: Wireless Web Access]]> http://ebiquity.umbc.edu/project/html/id/24/MOWSER-Wireless-Web-Access 1999-01-01 <![CDATA[RAP: RDF Access-control Policiies]]> http://ebiquity.umbc.edu/project/html/id/67/RAP-RDF-Access-control-Policiies 2004-10-01 <![CDATA[Ronin Agent Framework]]> http://ebiquity.umbc.edu/project/html/id/25/Ronin-Agent-Framework 1999-12-01 <![CDATA[Semantic Service Discovery in Bluetooth]]> http://ebiquity.umbc.edu/project/html/id/21/Semantic-Service-Discovery-in-Bluetooth 2000-12-01 <![CDATA[Simulator to evaluate/prototype Local Area and Personal Area Wireless Network Protocols]]> http://ebiquity.umbc.edu/project/html/id/22/Simulator-to-evaluate-prototype-Local-Area-and-Personal-Area-Wireless-Network-Protocols 2001-12-01 <![CDATA[An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains]]> http://ebiquity.umbc.edu/paper/html/id/1073/An-Overview-of-Cybersecurity-Knowledge-Graphs-Mapped-to-the-MITRE-ATT-CK-Framework-Domains 2023-10-03 <![CDATA[Knowledge Infusion in Privacy Preserving Data Generation]]> http://ebiquity.umbc.edu/paper/html/id/1136/Knowledge-Infusion-in-Privacy-Preserving-Data-Generation 2023-08-06 <![CDATA[Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System]]> http://ebiquity.umbc.edu/paper/html/id/1042/Poligraph-Intrusion-Tolerant-and-Distributed-Fake-News-Detection-System 2021-11-25 <![CDATA[A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic]]> http://ebiquity.umbc.edu/paper/html/id/854/A-Policy-based-Framework-for-Privacy-Respecting-Deep-Packet-Inspection-of-High-Velocity-Network-Traffic 2019-05-29 <![CDATA[Detecting Botnets Using a Collaborative Situational-aware IDPS]]> http://ebiquity.umbc.edu/paper/html/id/725/Detecting-Botnets-Using-a-Collaborative-Situational-aware-IDPS 2016-02-19 <![CDATA[Using Data Analytics to Detect Anomalous States in Vehicles]]> http://ebiquity.umbc.edu/paper/html/id/723/Using-Data-Analytics-to-Detect-Anomalous-States-in-Vehicles 2015-12-25 <![CDATA[Creating and Exploiting a Hybrid Knowledge Base for Linked Data]]> http://ebiquity.umbc.edu/paper/html/id/535/Creating-and-Exploiting-a-Hybrid-Knowledge-Base-for-Linked-Data 2011-04-25 <![CDATA[A Declarative Approach for Secure and Robust Routing]]> http://ebiquity.umbc.edu/paper/html/id/495/A-Declarative-Approach-for-Secure-and-Robust-Routing 2010-10-04 <![CDATA[owl:sameAs and Linked Data: An Empirical Study]]> http://ebiquity.umbc.edu/paper/html/id/473/owl-sameAs-and-Linked-Data-An-Empirical-Study 2010-04-26 <![CDATA[Creating and Exploiting a Web of Semantic Data]]> http://ebiquity.umbc.edu/paper/html/id/470/Creating-and-Exploiting-a-Web-of-Semantic-Data 2010-01-22 <![CDATA[Creating and exploiting a web of (semantic) data]]> http://ebiquity.umbc.edu/resource/html/id/267/Creating-and-exploiting-a-web-of-semantic-data 2009-05-01 <![CDATA[Cross-layer Analysis for Detecting Wireless Misbehavior]]> http://ebiquity.umbc.edu/resource/html/id/150/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior 2005-10-19 <![CDATA[Cross-layer Analysis for Detecting Wireless Misbehavior]]> http://ebiquity.umbc.edu/resource/html/id/151/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior 2005-10-19 <![CDATA[Introducing Semantic Technologies and the Vision of the Semantic Web]]> http://ebiquity.umbc.edu/resource/html/id/98/Introducing-Semantic-Technologies-and-the-Vision-of-the-Semantic-Web 2005-02-16 <![CDATA[MATA 2005 keynote]]> http://ebiquity.umbc.edu/resource/html/id/149/MATA-2005-keynote 2005-10-18 <![CDATA[Semantically Rich, Policy Based Framework to Automate Lifecycle of Cloud Based Services]]> http://ebiquity.umbc.edu/resource/html/id/347/Semantically-Rich-Policy-Based-Framework-to-Automate-Lifecycle-of-Cloud-Based-Services 2012-11-19