Skip to Main Content

Research Publications

 

Professional Press

Drs. Richard Forno and Anupam Joshi are regular authors at The Conversation, where they distill cybersecurity issues, technologies, and research into understandable articles for the general public.

UCYBR Recent Talks

UMBC’s Cybersecurity Center leadership are often invited to speak at prominent local, national, and international events, workshops, and conferences.  Here’s just a sampling of where they’ve been recently!

Dr. Richard Forno speaking engagements:
  • Plenary Panelist (Town Hall) at the DreamPort Election Integrity 2020 Conference. Columbia, MD (October 2019)
  • Testimony before Maryland’s Joint Committee on Cybersecurity, Information Technology, and Biotechnology regarding cybersecurity and the Maryland Technology Intern Program (MTIP). Annapolis, MD (July 2019)
  • “Cybersecurity Trends For Businesses,” Keynote, KatzAboch Government Contracting Symposium, Jessup, MD (January 2019)
  • The Cognitive Dimension of Cyber”. Evening talk to the Virginia Tech Intelligent Systems Lab (ISL), Arlington, VA. (November 2018)
  • “Weaponized Information, crafting reality, and targeting the world’s most exploitable information systems” Evening talk to the Information Systems Security Association (ISSA) National Capitol Chapter, Washington, DC. (October 2018)
  • “Thinking Differently — And Beyond – Cyber.” Keynote, 13th International Conference on Cyber Warfare and Cybersecurity (ICCWS). Washington, DC.(2018)
  • “The Chaos of Context: Presentation, Perception, and Agency.” Keynote, Association of Computing Machinery SIGDOC 2016. Washington, DC. (2016)
  • Plenary Panelist, “The Dark Side of Data: When Information is Weaponized” at the SAP NS2 Summit, Tysons Corner, VA (October 2018)
  • Plenary Panelist, “Cyber Wars, the Secrets, the Spies” at the inaugural GreatTalks Speaker Series. Baltimore, MD. (December 2017)
  • Panelist, “Growing and Sustaining Talent to Cultivate the Future Workforce” at the 2017 Intelligence Community (IC) Science, Technology, Engineering, and Mathematics (STEM) Recruitment Summit. Bethesda, MD (June 2017)
  • “Crypto, Security, and Policy: Grey areas, meta-issues and more.” Invited Lecture to InternetNZ, Wellington, NZ. (November 2016)
  • Closing Plenary Panelist, “Information Security Programs in Academia” at Schmoocon 2016. Washington, DC. (January 2016)

Selected Scholarly Research

Forno, R.  “Risk Awareness and the User Experience.” Proceedings of SIGDOC ’19 The 37th ACM International Conference on the Design of Communication. Portland, OR. (2019)

D. Norris, L. Mateczun, A. Joshi, and T. Finin, “Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity”, Article, Public Administration Review, February 2019

Forno, R. “Political Realities of Cyber” in The Edinburgh Companion to Political Realism, Robert Schuett and Miles Hollingworth (eds.) Edinburgh University Press (2018)

P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, “Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems“, In Proceedings, IEEE International Symposium on Technologies for Homeland Security, October 2018

S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, “Early Detection of Cybersecurity Threats Using Collaborative Cognition“, InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018

D. Norris, L. Mateczun, A. Joshi, and T. Finin, “Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security“, Article, Journal of Homeland Security and Emergency Management, September 2018

L. Neil, S. Mittal, and A. Joshi, “Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports“, In Proceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, September 2018

N. Khurana, S. Mittal, and A. Joshi, “Preventing Poisoning Attacks on AI based Threat Intelligence Systems“, July 2018

A. Padia, A. Roy, T. W. Satyapanich, F. Ferraro, S. Pan, Y. Park, A. Joshi, and T. Finin, “UMBC at SemEval-2018 Task 8: Understanding Text about Malware“, InProceedings, Proceedings of International Workshop on Semantic Evaluation (SemEval-2018), June 2018

S. K. Singh, R. Bose, and A. Joshi, “Entropy Based Electricity Theft Detection in AMI Network“, Article, IET Cyber-Physical Systems: Theory and Applications, October 2017

Pearson, E., and Forno, R. (2017). “The persuasion of perception: Internet security narratives in the public consciousness.” Proceedings of SIGDOC ’17 The 35th ACM International Conference on the Design of Communication. Halifax, NS, Canada — August 11 – 13, 2017.

P. K. Das, A. Joshi, and T. Finin, “Personalizing context-aware access control on mobile platforms“, In Proceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017

K. Khanna and A. Joshi, “AI based approach to identify compromised meters in data integrity attacks on smart grid“, Article, IET Generation, Transmission and Distribution, October 2017

S. K. Singh, K. Khanna, R. Bose, and A. Joshi, “Joint transformation based detection of false data injection attacks in smart grid“, Article, IEEE Transactions on Industrial Informatics, June 2017

D. Norris, L. Mateczun, A. Joshi, and T. Finin, “Cybersecurity Challenges to American Local Governments“, InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017

P. K. Das, A. Joshi, and T. Finin, “App behavioral analysis using system calls“, InProceedings, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): MobiSec 2017: Security, Privacy, and Digital Forensics of Mobile Systems and Networks, May 2017

K. Chopra, R. Bose, and A. Joshi, “Secrecy Outage of Cooperative Relay Network With and Without Eavesdropper’s Direct Link“, InProceedings, 23rd National Conference on Communications (NCC), March 2017

K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, “Semantic Approach to Automating Management of Big Data Privacy Policies“, InProceedings, IEEE BigData 2016, December 2016

K. Khanna, R. Bose, and A. Joshi, “On Detecting False Data Injection with Limited Network Information using Statistical Techniques“, InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016

P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, “Semantic knowledge and privacy in the physical web“, InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web – Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016

S. N. Narayanan, S. Mittal, and A. Joshi, “Using Semantic Technologies to Mine Vehicular Context for Security“, In Proceedings, 37th IEEE Sarnoff Symposium (2016), September 2016

S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, “CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities“, In Proceedings, International Symposium on Foundations of Open Source Intelligence and Security Informatics, August 2016

P. Jain, P. Kumaraguru, and A. Joshi, “Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks“, Article, Social Network Analysis and Mining, September 2016

David Chaum et. al., “cMix: Anonymization by High-Performance Scalable Mixing” Cryptology ePrint Archive, Report 2016/008 January 2016

P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, “Context-Sensitive Policy Based Security in Internet of Things“, InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016

S. N. Narayanan, S. Mittal, and A. Joshi, “OBD SecureAlert: An Anomaly Detection System for Vehicles“, In Proceedings, IEEE Workshop on Smart Service Systems (SmartSys 2016), May 2016

M. L. Mathews, A. Joshi, and T. Finin, “Detecting Botnets Using a Collaborative Situational-aware IDPS“, InProceedings, Second International Conference on Information Systems Security and Privacy, February 2016

Z. Syed, A. Padia, M. L. Mathews, T. Finin, and A. Joshi, “UCO: A Unified Cybersecurity Ontology“, InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security, February 2016

Forno, R. “Hack, Play, Win: Lessons Learned Running The Maryland Cyber Challenge” USENIX ;login; Journal of the Advanced Computing Systems Association. (Vol. 40 (6)) (2015)

Weinstein, S. and Forno, R. “Cybersecurity Education” in Encyclopedia of Educational Technology. J. Michael Spector, editor. Thousand Oaks, CA: Sage. (pp.169-172) (2015)

Josiah Dykstra et. al., “Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform” Digital Investigation August 2013

Roberto Yus et. al., “Semantics for Privacy and Shared Context” Proc. 2nd Workshop on Society, Privacy and the Semantic Web – Policy and Technology October 2014

R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, “Semantics for Privacy and Shared Context“, InProceedings, Second International Workshop on Society, Privacy and the Semantic Web – Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014

P. Pappachan, R. Yus, P. K. Das, T. Finin, E. Mena, and A. Joshi, “A Semantic Context-Aware Privacy Model for FaceBlock“, InProceedings, Second International Workshop on Society, Privacy and the Semantic Web – Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014

T. Finin, A. Joshi, P. Pappachan, R. Yus, P. K. Das, and E. Mena, “Privacy in a World of Mobile Devices“, InProceedings, NSF Workshop on Big Data Security and Privacy, September 2014

R. Yus, P. Pappachan, P. K. Das, E. Mena, A. Joshi, and T. Finin, “FaceBlock: Privacy-Aware Pictures for Google Glass“, InProceedings, Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, June 2014

P. Sharma, A. Joshi, and T. Finin, “Detecting Data Exfiltration by Integrating Information Across Layers“, InProceedings, 14th IEEE International Conference on Information Reuse and Integration, August 2013

W. Li, A. Joshi, and T. Finin, “CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies“, Article, Distributed and Parallel Databases, June 2013

H. Lamba, P. Kumaraguru, and A. Joshi, “Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy“, InProceedings, Second International Workshop on Privacy and Security in Online Social Media (PSOSM), May 2013

Josiah Dykstra et. al., “Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing” Richmond Journal of Law and Technology November 2012

M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, “A Collaborative Approach to Situational Awareness for CyberSecurity“, InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012

S. More, M. L. Mathews, A. Joshi, and T. Finin, “A Knowledge-Based Approach To Intrusion Detection Modeling“, InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012

Dibyajyoti Ghosh et. al., “Privacy control in smart phones using semantically rich reasoning and context modeling” Proceedings of the IEEE Workshop on Semantic Computing and Security May 2012

W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, “Managing and Securing Critical Infrastructure – A Semantic Policy and Trust Driven Approach“, InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012

Forno, R.  “Looking Within to Improve American Cybersecurity” USENIX ;login; Journal of the Advanced Computing Systems Association. (Vol. 37 (4)). (2012)

Josiah Dykstra et. al., “Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies” Proceedings of the 2011 ADSFL Conference on Digital Forensics, Security, and Law December 2011

Pramod Jagtap et. al., “Privacy Preservation in Context Aware Geosocial Networking Applications” May 2011

P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, “A Declarative Approach for Secure and Robust Routing“, InProceedings, Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010

W. Li, A. Joshi, and T. Finin, “Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach“, InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010

S. Gupta, A. Joshi, and T. Finin, “A Framework for Secure Knowledge Management in Pervasive Computing“, In Proceedings, Proceedings of the Workshop on Secure Knowledge Management, November 2008

Forno. R., and Feinbloom, W. (2001). “PKI: A Matter of Trust and Value” Inside Risks 132, Communications of the ACM 44. (p. 120)

Yuill, J, Wu, F, Settle, J., Gong, F., Forno, R., Huang, M., Asbery, J. (2000). “Applying the Intelligence Preparation of the Battlefield Process to Network Incident Response.” International Journal of Computer and Telecommunications Networking (Vol. 34 (4) pp. 671-697.