Search
Now showing items 11-20 of 113
Dynamic Topic Modeling to Infer the Influence of Research Citations on IPCC Assessment Reports
(IEEE, 2016-12-05)
A common Big Data problem is the need to integrate large temporal data sets from various data sources into one comprehensive structure. Having the ability to correlate evolving facts between data sources can be especially ...
App behavioral analysis using system calls
(IEEE, 2017-05-01)
System calls provide an interface to the services made available by an operating system. As a result, any functionality provided by a software application eventually reduces to a set of fixed system calls. Since system ...
Preserving User Privacy and Security in Context-Aware Mobile Platforms
(IGA Global, 2016-10-31)
Contemporary smartphones are capable of generating and transmitting large amounts of data about their users. Recent advances in collaborative context modeling combined with a lack of adequate permission model for handling ...
Semantic knowledge and privacy in the physical web
(CEUR, 2016-10-18)
In the past few years, the Internet of Things has started to become a reality; however, its growth has been hampered by privacy and security concerns. One promising approach is to use Semantic Web technologies to mitigate ...
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage
(IEEE, 2017-09-11)
Securing their critical documents on the cloud from data threats is a major challenge faced by organizations today. Controlling and limiting access to such documents requires a robust and trustworthy access control mechanism. ...
Personalizing context-aware access control on mobile platforms
(IEEE, 2017-12-14)
Context-sensitive access control has been a research topic within mobile computing for more than a decade. Much of the work has focused on modeling context and representing policies. Choosing an appropriate policy for a ...
UMBC at SemEval-2018 Task 8: Understanding Text about Malware
(2018-06-05)
We describe the systems developed by the UMBC team for 2018 SemEval Task 8, SecureNLP (Semantic Extraction from CybersecUrity REports using Natural Language Processing). We participated in three of the sub-tasks: (1) ...
Semantic Approach to Automating Management of Big Data Privacy Policies
(IEEE, 2016-12-02)
Ensuring privacy of Big Data managed on the cloud is critical to ensure consumer confidence. Cloud providers publish privacy policy documents outlining the steps they take to ensure data and consumer privacy. These documents ...
Cybersecurity 2016 Survey Summary Report of Survey Results
(UMBC and International City/County Management Association (ICMA), 2017-04-17)
In 2016, the International City/County Management Association (ICMA), in partnership with the University of Maryland, Baltimore County (UMBC), conducted a survey to better understand local government cybersecurity practices. ...
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions
(IEEE, 2016-12-19)
This paper describes a data driven approach to studying the science of cyber security (SoS). It argues that science is driven by data. It then describes issues and approaches towards the following three aspects: (i) Data ...