All Stories

  1. We can help computers learn on their own how to better protect themselves from cyber attacks
  2. Quantum-Assisted Greedy Algorithms
  3. CAPD: a context-aware, policy-driven framework for secure and resilient IoBT operations
  4. Computational Understanding of Narratives: A Survey
  5. CyBERT: Contextualized Embeddings for the Cybersecurity Domain
  6. Delegated Authorization Framework for EHR Services Using Attribute-Based Encryption
  7. Multi-qubit correction for quantum annealers
  8. Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
  9. Understanding Cybersecurity Threat Trends Through Dynamic Topic Modeling
  10. A BERT Based Approach to Measure Web Services Policies Compliance With GDPR
  11. Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior
  12. An Ensemble Approach for Compressive Sensing with Quantum Annealers
  13. Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata
  14. Temporal Understanding of Cybersecurity Threats
  15. Managing cybersecurity at the grassroots: Evidence from the first nationwide survey of local government cybersecurity
  16. Extracting Cybersecurity Event Information from Text
  17. Creating Cybersecurity Knowledge Graphs From Malware After Action Reports
  18. Knowledge graph fact prediction via knowledge-enriched tensor factorization
  19. Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity
  20. Early Detection of Cybersecurity Threats Using Collaborative Cognition
  21. Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security
  22. Attribute Based Encryption for Secure Access to Cloud Based EHR Systems
  23. Deep Understanding of a Document's Structure
  24. Personalizing Context-Aware Access Control on Mobile Platforms
  25. Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage
  26. Preserving User Privacy and Security in Context-Aware Mobile Platforms
  27. A Data Driven Approach for the Science of Cyber Security: Challenges and Directions
  28. Semantic Interpretation of Structured Log Files
  29. Robust semantic text similarity using LSA, machine learning, and linguistic resources
  30. SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks
  31. Querying RDF data with text annotated graphs
  32. Platys: From Position to Place‐Oriented Mobile Computing
  33. Entity Type Recognition for Heterogeneous Semantic Graphs
  34. UMBC_Ebiquity-SFQ: Schema Free Querying System
  35. The GeoLink Modular Oceanography Ontology
  36. Demo
  37. Automating Cloud Services Life Cycle through Semantic Technologies
  38. Rafiki: A Semantic and Collaborative Approach to Community Health-care in Underserved Areas
  39. Extracting Cybersecurity Related Linked Data from Text
  40. Type Prediction for Efficient Coreference Resolution in Heterogeneous Semantic Graphs
  41. Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy
  42. David L. Waltz, in Memoriam
  43. CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
  44. A Collaborative Approach to Situational Awareness for CyberSecurity
  45. SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks
  46. Preserving Privacy in Context-Aware Systems
  47. How is the Semantic Web evolving? A dynamic social network perspective
  48. Enforcing security in semantics driven policy based networks
  49. Enforcing secure and robust routing with declarative policies
  50. Assured Information Sharing Life Cycle
  51. Policy-Based Malicious Peer Detection in Ad Hoc Networks
  52. The Information Ecology of Social Media and Online Communities
  53. Security policies and trust in ubiquitous computing
  54. Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection
  55. RDF123: From Spreadsheets to RDF
  56. Using a Natural Language Understanding System to Generate Semantic Web Content
  57. Why we twitter
  58. A Pervasive Computing System for the Operating Room of the Future
  59. Report on the Models of Trust for the Web workshop (MTW'06)
  60. Modeling conversation policies using permissions and obligations
  61. Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
  62. Security and Privacy Challenges in Open and Dynamic Environments
  63. Toward Distributed service discovery in pervasive computing environments
  64. Research Directions for Service-Oriented Multiagent Systems
  65. Search on the Semantic Web
  66. Social networking on the semantic web
  67. A semantic Web services architecture
  68. Service Composition for Mobile Environments
  69. Collaborative joins in a pervasive computing environment
  70. Service Discovery in Agent-Based Pervasive Computing Environments
  71. Intelligent agents meet the semantic Web in smart spaces
  72. Authorization and privacy for semantic Web services
  73. On data management in pervasive computing environments
  74. Semantic Web in the context broker architecture
  75. An ontology for context-aware pervasive computing environments
  76. Using DAML+OIL to classify intrusive behaviours
  77. Creating Context-Aware Software Agents
  78. Agents, trust, and information access on the semantic web
  79. On experiments with a transport protocol for pervasive computing environments
  80. INTELLIGENT AGENTS FOR MOBILE AND EMBEDDED DEVICES
  81. Enhanced service discovery in Bluetooth
  82. Introduction to the special issue on ontologies in agent systems
  83. ITtalks: a case study in the Semantic Web and DAML+OIL
  84. Trust-based security in pervasive computing environments
  85. Yahoo! as an ontology
  86. Agent communication languages: the current landscape
  87. Agent-based approach for manufacturing integration: The ciimplex experience
  88. Mobile agents can benefit from standards efforts on interagent communication
  89. Task integration in multimodal speech recognition environments
  90. <title>Integrating manufacturing softwares for intelligent planning execution: a CIIMPLEX perspective</title>
  91. The KERNEL text understanding system
  92. Meta-interpreters for rule-based inference under uncertainty
  93. The role of user models in cooperative interactive systems
  94. Abductive reasoning in multiple fault diagnosis
  95. CHARACTERIZING KNOWLEDGE DEPTH IN INTELLIGENT SAFETY SYSTEMS
  96. General User Modelling
  97. A general user modelling facility
  98. Natural Language Interactions with Artificial Experts
  99. Interactive classification: A technique for acquiring and maintaining knowledge bases
  100. Natural language interactions with artificial experts
  101. Intelligent Assistance for Complex Systems
  102. Policy Management of Enterprise Systems: A Requirements Study
  103. Enhancing Web Privacy Protection through Declarative Policies
  104. The SOUPA Ontology for Pervasive Computing
  105. A policy language for a pervasive computing environment
  106. PatientService: electronic patient record redaction and delivery in pervasive environments
  107. Using peer-to-peer data routing for infrastructure-based wireless networks
  108. Centaurus: a framework for intelligent services in a mobile environment
  109. Transport protocols in wireless networks
  110. Using automatic memoization as a software engineering tool in real-world AI systems
  111. Adding forward chaining and truth maintenance to Prolog