Tags: tac

Publications

2023

  1. J. Bolton, L. Elluri, and K. P. Joshi, "An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains", Proceedings, IEEE International conference on Intelligence and Security Informatics (ISI 2023), October 2023, 521 downloads.
  2. A. Kotal, N. Das, and A. Joshi, "Knowledge Infusion in Privacy Preserving Data Generation", InProceedings, KDD Workshop on Knowledge-infused Learning, 29TH ACM SIGKDD,, August 2023, 158 downloads.
  3. A. Piplai, "Knowledge Graphs and Reinforcement Learning: A Hybrid Approach for Cybersecurity Problems", PhdThesis, July 2023, 197 downloads.
  4. V. Mulwad, V. S. Kumar, J. W. Williams, T. Finin, S. Dixit, and A. Joshi, "Towards Semantic Exploration of Tables in Scientific Documents", InProceedings, Workshop on Semantic Technologies for Scientific, Technical and Legal Data, Extended Semantic Web Conference, May 2023, 396 downloads.
  5. N. M. Gowrishetty, S. Chukkapalli, and A. Joshi, "Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones", InProceedings, INFOCOM Workshop on Security, Privacy, and Digital Forensics of Mobile Systems and Networks, May 2023, 95 downloads.
  6. A. Piplai, A. Joshi, and T. Finin, "Offline RL+CKG: A hybrid AI model for cybersecurity tasks", InProceedings, AAAI Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering, March 2023, 276 downloads.

2022

  1. A. Piplai, M. Anoruo, K. Fasaye, A. Joshi, T. Finin, and A. Ridley, "Knowledge guided Two-player Reinforcement Learning for Cyber Attacks and Defenses", InProceedings, International Conference on Machine Learning and Applications, December 2022, 651 downloads.
  2. V. Rawte, K. Roy, M. Chakraborty, M. Gaur, K. Faldu, P. Kikani, H. Akbari, and A. Sheth, "TDLR: Top (Semantic)-Down (Syntactic) Language Representation", InProceedings, Attention Workshop, 36th Conference on Neural Information Processing Systems (NeurIPS 2022), November 2022, 146 downloads.
  3. F. Lu, J. Munoz, M. Fuchs, T. LeBlond, E. Zaresky-Williams, E. Raff, F. Ferraro, and B. Testa, "A General Framework for Auditing Differentially Private Machine Learning", InProceedings, Advances in Neural Information Processing Systems, November 2022, 160 downloads.
  4. P. Ranade, S. Dey, A. Joshi, and T. Finin, "Computational Understanding of Narratives: A Survey", Article, IEEE Access, September 2022, 316 downloads.
  5. D. L. Kim, N. Alodadi, Z. Chen, K. P. Joshi, A. Crainiceanu, and D. Needham, "MATS: A Multi-aspect and Adaptive Trust-based Situation-aware Access Control Framework for Federated Data-as-a-Service Systems", InProceedings, IEEE International Services Computing Conference (SCC) 2022 in IEEE World Congress on Services 2022, July 2022, 381 downloads.
  6. C. Hanks, M. Maiden, P. Ranade, T. Finin, and A. Joshi, "Recognizing and Extracting Cybersecurity Entities from Text", InProceedings, Workshop on Machine Learning for Cybersecurity, International Conference on Machine Learning, July 2022, 1077 downloads.
  7. S. Dixit, K. P. Joshi, S. Choi, and L. Elluri, "Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE", InProceedings, 8th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2022), May 2022, 367 downloads.
  8. A. Kotal, A. Piplai, S. Chukkapalli, and A. Joshi, "PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data", InProceedings, ACM International Workshop on Security and Privacy Analytics, April 2022, 392 downloads.
  9. S. Chukkapalli, A. Joshi, T. Finin, and R. F. Erbacher, "CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations", InProceedings, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications IV, SPIE Defense + Commercial Sensing, April 2022, 295 downloads.

2021

  1. P. Ranade, A. Piplai, A. Joshi, and T. Finin, "CyBERT: Contextualized Embeddings for the Cybersecurity Domain", InProceedings, IEEE International Conference on Big Data, December 2021, 1451 downloads.
  2. D. L. Kim, L. Elluri, and K. P. Joshi, "Trusted Compliance Enforcement Framework for Sharing Health Big Data", InProceedings, IEEE BigData 2021 4th Special Session on HealthCare Data, December 2021, 437 downloads.
  3. P. Schubel, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases", InProceedings, IEEE International Conference on Bioinformatics and Biomedicine (BIBM) 2021, December 2021, 239 downloads.
  4. S. Chukkapalli, N. Pillai, S. Mittal, and A. Joshi, "Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2021, August 2021, 458 downloads.
  5. P. Ranade, A. Piplai, S. Mittal, A. Joshi, and T. Finin, "Generating Fake Cyber Threat Intelligence Using Transformer-Based Models", Proceedings, International Joint Conference on Neural Networks (IJCNN 2021), July 2021, 641 downloads.
  6. S. Chukkapalli, S. Aziz, N. Alotaibi, S. Mittal, M. Gupta, and M. Abdelsalam, "Ontology driven AI and Access Control Systems for Smart Fisheries", TechReport, January 2021, 708 downloads.

2020

  1. S. Dasgupta, A. Piplai, A. Kotal, and A. Joshi, "A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 1030 downloads.
  2. A. Piplai, S. Mittal, A. Joshi, T. Finin, J. Holt, and R. Zak, "Creating Cybersecurity Knowledge Graphs from Malware After Action Reports", Proceedings, IEEE Access Journal, December 2020, 986 downloads.
  3. A. Piplai, P. Ranade, A. Kotal, S. Mittal, S. N. Narayanan, and A. Joshi, "Using Knowledge Graphs and Reinforcement Learning for Malware Analysis", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 1017 downloads.
  4. A. Piplai, S. Mittal, M. Abdelsalam, M. Gupta, A. Joshi, and T. Finin, "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2020, November 2020, 514 downloads.
  5. M. Sills, P. Ranade, and S. Mittal, "Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - A Healthcare Usecase", InProceedings, International Conference on Intelligence and Security Informatics (ISI), November 2020, 80 downloads.
  6. S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2020, October 2020, 454 downloads.
  7. S. Sontowski, M. Gupta, S. Chukkapalli, M. Abdelsalam, S. Mittal, A. Joshi, and R. Sandhu, "Cyber Attacks on Smart Farming Infrastructure", InProceedings, 6th IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2020), October 2020, 867 downloads.
  8. S. N. Narayanan, A. Joshi, and R. Bose, "ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems", InProceedings, IEEE Transactions on Dependable and Secure Computing, October 2020, 569 downloads.
  9. A. Piplai, S. Chukkapalli, and A. Joshi, "NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud, May 2020, 886 downloads.
  10. S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 2665 downloads.
  11. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 262 downloads.
  12. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 297 downloads.
  13. S. Chukkapalli, A. Piplai, S. Mittal, M. Gupta, and A. Joshi, "A Smart-Farming Ontology for Attribute Based Access Control", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), March 2020, 825 downloads.
  14. T. W. Satyapanich, F. Ferraro, and T. Finin, "CASIE: Extracting Cybersecurity Event Information from Text", InProceedings, Proceeding of the 34th AAAI Conference on Artificial Intelligence, February 2020, 1767 downloads.

2019

  1. T. W. Satyapanich, T. Finin, and F. Ferraro, "Extracting Rich Semantic Information about Cybersecurity Events", InProceedings, Second Workshop on Big Data for CyberSecurity, held in conjunction with the IEEE Int. Conf. on Big Data, December 2019, 922 downloads.
  2. A. Padia, "Joint Models to Refine Knowledge Graphs", PhdThesis, University of Maryland, Baltimore County, December 2019, 370 downloads.
  3. A. Padia, "Joint Models to Refine Knowledge Graphs", PhdThesis, October 2019, 707 downloads.
  4. J. Sleeman, M. Halem, and J. E. Dorband, "RBM Image Generation Using the D-Wave 2000Q", Misc, D-Wave Qubits North America Conference, September 2019, 512 downloads.
  5. N. Khurana, S. Mittal, A. Piplai, and A. Joshi, "Preventing Poisoning Attacks on AI based Threat Intelligence Systems", InProceedings, IEEE Machine Learning for Signal Processing, September 2019, 963 downloads.
  6. A. Diaz, A. Sherman, and A. Joshi, "Phishing in an academic community: A study of user susceptibility and behavior", Article, Crypologia, August 2019, 422 downloads.
  7. S. Dixit, K. P. Joshi, and S. Choi, "Multi Authority Access Control in a Cloud EHR System with MA-ABE", InProceedings, IEEE International Conference on Edge Computing (EDGE 2019), July 2019, 748 downloads.
  8. S. K. Singh, R. Bose, and A. Joshi, "Energy theft detection for AMI using principal component analysis based reconstructed data", Article, IET Cyber-Physical Systems: Theory & Applications, June 2019, 890 downloads.
  9. A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 935 downloads.
  10. S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-physical Systems", PhdThesis, University of Maryland, Baltimore County, May 2019, 324 downloads.
  11. S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-Physical Systems", PhdThesis, May 2019, 120 downloads.
  12. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 1329 downloads.
  13. R. Ayanzadeh, M. Halem, and T. Finin, "SAT-based Compressive Sensing", Article, arXiv:1903.03650 [cs.IT], March 2019, 483 downloads.
  14. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity", Article, Public Administration Review, February 2019, 843 downloads.
  15. R. Ayanzadeh, S. Mousavi, M. Halem, and T. Finin, "Quantum Annealing Based Binary Compressive Sensing with Matrix Uncertainty", Article, arXiv:1901.00088 [cs.IT], January 2019, 837 downloads.

2018

  1. S. N. Narayanan, K. Khanna, B. K. Panigrahi, and A. Joshi, "Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars", InBook, Smart Cities Cybersecurity and Privacy, December 2018, 771 downloads.
  2. A. Renjan, K. P. Joshi, S. N. Narayanan, and A. Joshi, "DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1643 downloads.
  3. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems", InProceedings, IEEE International Symposium on Technologies for Homeland Security, October 2018, 763 downloads.
  4. S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 3141 downloads.
  5. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security", Article, Journal of Homeland Security and Emergency Management, September 2018, 341 downloads.
  6. L. Neil, S. Mittal, and A. Joshi, "Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, September 2018, 1357 downloads.
  7. V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 860 downloads.
  8. A. Padia, F. Ferraro, and T. Finin, "KG Cleaner: Identifying and Correcting Errors Produced by Information Extraction Systems", InCollection, arXiv, August 2018, 621 downloads.

2017

  1. T. Finin, D. Lawrie, J. Mayfield, P. McNamee, and C. Costello, "Participation in TAC KBP 2017: Cold Start TEDL and Low-resource EDL", InProceedings, Proceedings of the 2017 Text Analysis Workshop, November 2017, 731 downloads.
  2. S. K. Singh, R. Bose, and A. Joshi, "Entropy Based Electricity Theft Detection in AMI Network", Article, IET Cyber-Physical Systems: Theory and Applications, October 2017, 1102 downloads.
  3. K. Khanna and A. Joshi, "AI based approach to identify compromised meters in data integrity attacks on smart grid", Article, IET Generation, Transmission and Distribution, October 2017, 912 downloads.
  4. F. Ferraro, A. Poliak, R. Cotterell, and B. Van Durme, "Frame-Based Continuous Lexical Semantics through Exponential Family Tensor Factorization and Semantic Proto-Roles", InProceedings, Proceedings of the Sixth Joint Conference on Lexical and Computational Semantics (*SEM), August 2017, 559 downloads.
  5. S. K. Singh, K. Khanna, R. Bose, and A. Joshi, "Joint transformation based detection of false data injection attacks in smart grid", Article, IEEE Transactions on Industrial Informatics, June 2017, 1444 downloads.
  6. K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 806 downloads.
  7. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity Challenges to American Local Governments", InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017, 1128 downloads.
  8. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyber-Security at the Grassroots: Findings from a Nationwide Survey of Local Government CyberSecurity", InProceedings, 47th Annual Conference of the Urban Affairs Association, April 2017.

2016

  1. K. Khanna and A. Joshi, "Bid Modification Attack in Smart Grid for Monetary Benefits", InProceedings, 2016 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), December 2016, 799 downloads.
  2. K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 835 downloads.
  3. T. Finin, D. Lawrie, J. Mayfield, P. McNamee, J. Laspesa, and M. Latman, "HLTCOE Participation in TAC KBP 2016: Cold Start and EDL", InProceedings, Proceedings of the 2016 Text Analysis Workshop, November 2016, 1360 downloads.
  4. T. W. Satyapanich and T. Finin, "Event Nugget Detection Task: UMBC systems", InProceedings, Proceedings of the 9th Text Analysis Worksho, November 2016, 1115 downloads.
  5. P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 1288 downloads.
  6. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 1420 downloads.
  7. K. Khanna, B. K. Panigrahi, and A. Joshi, "Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit", Article, IET Transactions on Generation, Transmission and Distribution, September 2016, 1419 downloads.
  8. P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 1141 downloads.
  9. B. Thuraisingham, M. Kantarcioglu, K. Hamlen, L. Khan, T. Finin, A. Joshi, T. Oates, and E. Bertino, "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", InProceedings, IEEE Conference on Information Reuse and Integration,, July 2016, 1450 downloads.
  10. S. N. Narayanan, S. Mittal, and A. Joshi, "OBD SecureAlert: An Anomaly Detection System for Vehicles", InProceedings, IEEE Workshop on Smart Service Systems (SmartSys 2016), May 2016, 1559 downloads.
  11. D. S. Roche, A. Aviv, and S. Choi, "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.", InProceedings, IEEE Symposium on Security and Privacy, May 2016, 1340 downloads.
  12. K. Khanna and A. Joshi, "Feasibility and mitigation of false data injection attacks in smart grid", InProceedings, IEEE 6th International Conference on Power Systems (ICPS), 2016 , March 2016, 877 downloads.
  13. M. L. Mathews, A. Joshi, and T. Finin, "Detecting Botnets Using a Collaborative Situational-aware IDPS", InProceedings, Second International Conference on Information Systems Security and Privacy, February 2016, 1659 downloads.

2015

  1. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Data Analytics to Detect Anomalous States in Vehicles", TechReport, December 2015, 1641 downloads.
  2. Y. Huang, Y. Yesha, and S. Zhou, "A database-based distributed computation architecture with Accumulo and D4M: An application of eigensolver for large sparse matrix", InProceedings, IEEE International Conference on Big Data, November 2015, 1285 downloads.
  3. T. W. Satyapanich and T. Finin, "Event Nugget Detection using Thresholding and Classification Techniques", InProceedings, Eighth Text Analysis Conference, November 2015, 962 downloads.
  4. T. Finin, D. Lawrie, P. McNamee, J. Mayfield, D. Oard, N. Peng, N. Gao, Y. Lin, J. MacKin, and T. Dowd, "HLTCOE Participation in TAC KBP 2015: Cold Start and TEDL", InProceedings, Eighth Text Analysis Conference, November 2015, 898 downloads.
  5. W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 1469 downloads.
  6. P. Nimbalkar, "Semantic Interpretation of Structured Log Files", MastersThesis, University of Maryland, Baltimore County, August 2015, 1017 downloads.
  7. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015, 378 downloads.
  8. D. Norris, A. Joshi, and T. Finin, "Cyber-Security at the Grassroots: American State and Local Governments and the Management of Website Security", InProceedings, Proceedings of the Annual Conference of the Urban Affairs Association, April 2015.

2014

  1. J. Mayfield, P. McNamee, C. Harmon, T. Finin, and D. Lawrie, "KELVIN: Extracting Knowledge from Large Text Collections", InProceedings, AAAI Fall Symposium on Natural Language Access to Big Data, November 2014, 1528 downloads.
  2. T. Finin, P. McNamee, D. Lawrie, J. Mayfield, and C. Harmon, "Hot Stuff at Cold Start: HLTCOE participation at TAC 2014", InProceedings, Proceedings of the 7th Text Analysis Conference, October 2014, 1327 downloads.

2013

  1. J. Lee, K. Jung, B. Kim, Y. Peng, and H. Cho, "Semantic web-based supplier discovery system for building a long-term supply chain", Article, International Journal of Computer Integrated Manufacturing, November 2013.
  2. P. McNamee, T. Finin, D. Lawrie, and J. Mayfield, "HLTCOE Participation at TAC 2013", InProceedings, Proceedings of the Sixth Text Analysis Conference, November 2013, 1053 downloads.
  3. A. Joshi, R. Lal, T. Finin, and A. Joshi, "Extracting cybersecurity related linked data from text", InProceedings, Proceedings of the 7th IEEE International Conference on Semantic Computing, September 2013, 2284 downloads.
  4. P. Sharma, A. Joshi, and T. Finin, "Detecting Data Exfiltration by Integrating Information Across Layers", InProceedings, 14th IEEE International Conference on Information Reuse and Integration, August 2013, 1873 downloads.
  5. A. Joshi, "Linked Data for Software Security Concepts and Vulnerability Descriptions", MastersThesis, University of Maryland Baltimore County, July 2013, 1770 downloads.
  6. P. McNamee, J. Mayfield, T. Finin, T. Oates, D. Lawrie, T. Xu, and D. Oard, "KELVIN: a tool for automated knowledge base construction", InProceedings, Proc. Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, June 2013, 1331 downloads.
  7. R. Lal, "Information Extraction of Security related entities and concepts from unstructured text.", MastersThesis, University of Maryland Baltimore County, May 2013, 2271 downloads.

2012

  1. P. McNamee, v. Stoyanov, J. Mayfield, T. Finin, T. Oates, T. Xu, D. Oard, and D. Lawrie, "HLTCOE Participation at TAC 2012: Entity Linking and Cold Start Knowledge Base Construction", InProceedings, Proceedings of the Fifth Text Analysis Conference (TAC 2012), November 2012, 1297 downloads.
  2. M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1976 downloads.
  3. S. More, M. L. Mathews, A. Joshi, and T. Finin, "A Semantic Approach to Situational Awareness for Intrusion Detection", InProceedings, Proceedings of the National Symposium on Moving Target Research, June 2012, 3354 downloads.
  4. J. Mayfield and T. Finin, "Evaluating the Quality of a Knowledge Base Populated from Text", InProceedings, Joint Workshop on Automatic Knowledge Base Construction and Web-scale Knowledge Extraction, June 2012, 4451 downloads.
  5. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012, 56 downloads.
  6. S. More, "Situation Aware Intrusion Detection Model", MastersThesis, University of Maryland, Baltimore County, May 2012, 161 downloads.
  7. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1594 downloads.

2011

  1. V. Mulwad, T. Finin, and A. Joshi, "Generating Linked Data by Inferring the Semantics of Tables", InProceedings, Proceedings of the First International Workshop on Searching and Integrating New Web Data Sources, September 2011, 3393 downloads.
  2. V. Mulwad, W. Li, A. Joshi, T. Finin, and K. Viswanathan, "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 3185 downloads.

2010

  1. I. Mayk, A. Patwardhan, and e., "Tactical Information Technology for Assured Network Operations Information Dissemination and Management for Battle Command Support Services", InProceedings, Proceedings of the 27th Army Science Conference, November 2010, 1375 downloads.

2009

  1. P. A. Kodeswaran and A. Joshi, "Towards a Declarative Framework For Managing Application and Network Adaptations", Proceedings, IEEE GlobeCom, December 2009, 1905 downloads.
  2. D. Chinavle, P. Kolari, T. Oates, and T. Finin, "Ensembles in Adversarial Classification for Spam", InProceedings, Proceedings of the 18th ACM Conference on Information and Knowledge Management, November 2009, 4268 downloads, 1 citation.
  3. P. McNamee, M. Dredze, A. Gerber, N. Garera, T. Finin, J. Mayfield, C. Piatko, D. Rao, D. Yarowsky, and M. Dreyer, "HLTCOE Approaches to Knowledge Base Population at TAC 2009", InProceedings, Proceedings of the 2009 Text Analysis Conference, November 2009, 1511 downloads, 6 citations.
  4. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 2037 downloads, 7 citations.

2008

  1. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2232 downloads, 1 citation.
  2. Y. Shi, "An Investigation of Linguistic Information for Speech Recognition Error Detection", PhdThesis, University of Maryland, Baltimore County, October 2008, 3413 downloads.
  3. A. Karandikar, A. Java, A. Joshi, T. Finin, Y. Yesha, and Y. Yesha, "Second Space: A Generative Model For The Blogosphere", InProceedings, Proceedings of the International Conference on Web and Social Media (ICWSM), March 2008, 4999 downloads, 1 citation.
  4. K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2748 downloads.

2007

  1. M. Halem, Y. Yesha, C. Tilmes, D. Chapman, M. Goldberg, and L. Zhou, "A Web Service Tool (SOAR) for the Dynamic Generation of L1 Grids of Coincident AIRS, AMSU and MODIS Satellite Sounding Radiance Data for Climate Studies", Article, EOS Transactions, June 2007.
  2. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3332 downloads, 16 citations.
  3. A. Karandikar, "Generative Model To Construct Blog and Post Networks In Blogosphere", MastersThesis, University of Maryland at Baltimore County, May 2007, 8973 downloads, 3 citations.
  4. A. Java, "A Framework for Modeling Influence, Opinions and Structure in Social Media", InProceedings, 22nd Conference on Artificial Intelligence (AAAI 2007), April 2007, 5328 downloads, 4 citations.
  5. P. Kolari, T. Finin, A. Java, and A. Joshi, "Spam in Blogs and Social Media, Tutorial", InProceedings, ICWSM 2007, March 2007, 3715 downloads, 3 citations.

2006

  1. J. Parker, A. Patwardhan, and A. Joshi, "Cross-layer Analysis for Detecting Wireless Misbehaviour", Proceedings, IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 4174 downloads, 13 citations.

2005

  1. S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 3383 downloads.
  2. V. Parekh, "Applying Ontologies and Semantic Web technologies to Environmental Sciences and Engineering", MastersThesis, University of Maryland, Baltimore County, May 2005, 14234 downloads, 1 citation.
  3. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7414 downloads, 96 citations.

2004

  1. Z. Ding, Y. Peng, and R. Pan, "A Bayesian Approach to Uncertainty Modeling in OWL Ontology", InProceedings, Proceedings of the International Conference on Advances in Intelligent Systems - Theory and Applications, November 2004, 4222 downloads, 2 citations.
  2. L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 8603 downloads, 23 citations.
  3. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  4. L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", PhdThesis, University of Maryland Baltimore County, September 2004, 10 citations.
  5. A. Patwardhan, V. Korolev, L. Kagal, and A. Joshi, "Enforcing Policies in Pervasive Environments", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 5599 downloads, 30 citations.
  6. M. Cornwell, J. E. Just, and L. Kagal, "Autonomic Policy-Based Collaboration for Cross-Agency Human Teams", InProceedings, Conference on the Human Impact and Application of Autonomic Computing Systems (CHIACS2), April 2004, 3791 downloads.
  7. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 4921 downloads, 15 citations.
  8. , "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 7365 downloads.
  9. A. Joshi, T. Finin, and J. Pinkston, "Using DAML+ OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, January 2004, 1392 downloads, 3 citations.
  10. Z. Ding and Y. Peng, "A Probabilistic Extension to Ontology Language OWL", InProceedings, Proceedings of the 37th Hawaii International Conference On System Sciences (HICSS-37)., January 2004, 6110 downloads, 154 citations.

2003

  1. Y. Zou, T. Finin, L. Ding, H. Chen, and R. Pan, "Using Semantic web technology in Multi-Agent systems: a case study in the TAGA Trading agent environment", InProceedings, Proceeding of the 5th International Conference on Electronic Commerce, September 2003, 4116 downloads, 47 citations.
  2. A. Joshi and J. Pinkston, "Modeling Computer Attacks: An Ontology for Intrusion Detection", InProceedings, The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 4740 downloads, 19 citations.
  3. L. Ding, Y. Shi, Y. Zou, Z. Ding, R. Pan, and T. Finin, "Strategies and heuristics used by the UMBCTAC agent in the third Trading Agent Competition", InProceedings, Workshop on Trading Agent Design and Analysis, held in conjunction with the Eighteenth International Joint Conference on Artificial Intelligence, August 2003, 3060 downloads, 3 citations.
  4. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003, 38 downloads.
  5. Y. Zou, T. Finin, L. Ding, H. Chen, and R. Pan, "TAGA: Travel Market Framework in Agentcities (Demonstration)", InProceedings, Proceedings of the 18th International Joint Conference on Artificial Intelligence, August 2003, 83 downloads.
  6. Y. Zou, T. Finin, L. Ding, H. Chen, and R. Pan, "TAGA: Trading Agent Competition in Agentcities", InProceedings, Workshop on Trading Agent Design and Analysis, held at 18th Int. Joint Conf. on Artificial Intelligence,, August 2003, 66 downloads.
  7. B. Grosof, M. Gandhe, and T. Finin, "SweetJess: Inferencing in Situated Courteous RuleML via Translation to and from Jess Rules", TechReport, May 2003, 2175 downloads.
  8. A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 3385 downloads, 4 citations.
  9. A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 38 downloads, 51 citations.

2002

  1. L. Ding, Y. Shi, Z. Ding, R. Pan, and T. Finin, "UMBCTAC: A Balanced Bidding Agent", TechReport, UMBC Technical Report TR-02-15, December 2002, 4236 downloads.
  2. M. Gandhe, T. Finin, and B. Grosof, "SweetJess: Translating DamlRuleML to Jess", InProceedings, International Workshop on Rule Markup Languages for Business Rules on the Semantic Web in conjunction with ISWC2002, June 2002, 2724 downloads, 51 citations.

2000

  1. Y. K. Labrou and T. Finin, "History, State of the Art and Challenges for Agent Communication Languages", Article, Informatik/Informatique, January 2000, 2618 downloads, 9 citations.

1997

  1. J. Mayfield and T. Finin, "A Security Architecture for Agent Communication Languages", TechReport, UMBC, January 1997, 66 downloads.

1995

  1. C. Thirunavukkarasu, T. Finin, and J. Mayfield, "Secret Agents - A Security Architecture for the KQML Agent Communication Language", InProceedings, CIKM'95 Intelligent Information Agents Workshop, October 1995, 379 downloads.
  2. M. A. Grasso, "Automated speech recognition in medical applications", Article, MD Computing, January 1995, 33 downloads, 15 citations.

1987

  1. E. Schuster and T. Finin, "VP 2 : the role of user modelling in correcting errors in second language learning", InBook, Artificial Intelligence and its Applications, January 1987, 68 downloads.

1986

  1. T. Finin, "Constraining the Interpretation of Nominal Compounds in a Limited Context", InBook, Analyzing Language in Restricted Domains: Sublanguage Description and Processing, January 1986, 80 downloads.

1984

  1. T. Finin and B. Webber, "BUP, a bottom up parser", TechReport, University of Pennsylvania, November 1984, 90 downloads.

1976

  1. D. L. Waltz, T. Finin, F. Green, F. Conrad, B. Goodman, and G. D. Hadden, "The Planes System: Natural Language Access to a Large Data Base", TechReport, University of Illinois, Urbana Champaign, November 1976, 129 downloads.

Web Site

  1. TAGA