default search action
Bhavani Thuraisingham
Person information
- affiliation: University of Texas at Dallas, Cyber Security Research and Education Institute (CSI), Richardson, TX, USA
- affiliation (DEng 2010): University of Bristol, UK
- affiliation (former): MITRE Corporation, Bedford, MA, USA
- affiliation (former): Honeywell Computer Sciences Center, Golden Valley, MN, USA
- affiliation (former): New Mexico Institute of Mining and Technology, Department of Computer Science, Socorro, NM, USA
- affiliation (PhD 1979): University of Wales, Swansea, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j136]Sihem Amer-Yahia, Divyakant Agrawal, Yael Amsterdamer, Sourav S. Bhowmick, Renata Borovica-Gajic, Jesús Camacho-Rodríguez, Jinli Cao, Barbara Catania, Panos K. Chrysanthis, Carlo Curino, Amr El Abbadi, Avrilia Floratou, Juliana Freire, Stratos Idreos, Vana Kalogeraki, Sujaya Maiyya, Alexandra Meliou, Madhulika Mohanty, Fatma Özcan, Liat Peterfreund, Soror Sahri, Sana Sellami, Roee Shraga, Utku Sirin, Wang-Chiew Tan, Bhavani Thuraisingham, Yuanyuan Tian, Genoveva Vargas-Solar, Meihui Zhang, Wenjie Zhang:
Diversity, Equity and Inclusion Activities in Database Conferences: A 2023 Report. SIGMOD Rec. 53(2): 63-67 (2024) - [j135]Yi-Fan Li, Yang Gao, Gbadebo Ayoade, Latifur Khan, Anoop Singhal, Bhavani Thuraisingham:
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data. IEEE Trans. Dependable Secur. Comput. 21(1): 1-11 (2024) - [c334]Bhavani Thuraisingham, Kim Nimon, Latifur Khan:
An Education Program for Big Data Security and Privacy. BigDataSecurity 2024: 1-4 - [c333]Clara Bertolissi, Maribel Fernández, Bhavani Thuraisingham:
An Axiomatic Category-Based Access Control Model for Smart Homes. LOPSTR 2024: 131-148 - [c332]Brian Ricks, Patrick Tague, Bhavani Thuraisingham, Sriraam Natarajan:
Utilizing Threat Partitioning for More Practical Network Anomaly Detection. SACMAT 2024 - [c331]Bhavani Thuraisingham:
Trustworthy Artificial Intelligence for Securing Transportation Systems. SACMAT 2024 - 2023
- [j134]S. S. Iyengar, Bhavani Thuraisingham, Marek Zmuda:
Special Issue on Actionable Information for Digital Threat Discovery Using Contextualized Data or Multi Sensor Data Fusion. DTRAP 4(2): 23:1-23:2 (2023) - [j133]Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham:
Con2Mix: A semi-supervised method for imbalanced tabular security data. J. Comput. Secur. 31(6): 705-726 (2023) - [j132]Sihem Amer-Yahia, Divyakant Agrawal, Yael Amsterdamer, Sourav S. Bhowmick, Angela Bonifati, Renata Borovica-Gajic, Jesús Camacho-Rodríguez, Barbara Catania, Panos K. Chrysanthis, Carlo Curino, Jérôme Darmont, Gillian Dobbie, Amr El Abbadi, Avrilia Floratou, Juliana Freire, Alekh Jindal, Vana Kalogeraki, Sujaya Maiyya, Alexandra Meliou, Madhulika Mohanty, Behrooz Omidvar-Tehrani, Fatma Özcan, Liat Peterfreund, Wenny Rahayu, Shazia Sadiq, Sana Sellami, Utku Sirin, Wang-Chiew Tan, Bhavani Thuraisingham, Yuanyuan Tian, Pinar Tözün, Genoveva Vargas-Solar, Neeraja J. Yadwadkar, Victor Zakhary, Meihui Zhang:
Diversity, Equity and Inclusion Activities in Database Conferences: A 2022 Report. SIGMOD Rec. 52(2): 38-42 (2023) - [j131]Maribel Fernández, Jenjira Jaimunk, Bhavani Thuraisingham:
A Privacy-Preserving Architecture and Data-Sharing Model for Cloud-IoT Applications. IEEE Trans. Dependable Secur. Comput. 20(4): 3495-3507 (2023) - [j130]Khandakar Ashrafi Akbar, Yigong Wang, Gbadebo Ayoade, Yang Gao, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham, Kangkook Jee:
Advanced Persistent Threat Detection Using Data Provenance and Metric Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 3957-3969 (2023) - [j129]Keke Gai, Yue Zhang, Meikang Qiu, Bhavani Thuraisingham:
Blockchain-Enabled Service Optimizations in Supply Chain Digital Twin. IEEE Trans. Serv. Comput. 16(3): 1673-1685 (2023) - [c330]Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:
Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts. CCS 2023: 801-814 - [c329]Khandakar Ashrafi Akbar, Sadaf Md. Halim, Anoop Singhal, Basel Abdeen, Latifur Khan, Bhavani Thuraisingham:
The Design of an Ontology for ATT&CK and its Application to Cybersecurity. CODASPY 2023: 295-297 - [c328]Khandakar Ashrafi Akbar, Fariha Ishrat Rahman, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham:
The Design and Application of a Unified Ontology for Cyber Security. ICISS 2023: 23-41 - [c327]Sadaf Md. Halim, Saquib Irtiza, Yibo Hu, Latifur Khan, Bhavani Thuraisingham:
WokeGPT: Improving Counterspeech Generation Against Online Hate Speech by Intelligently Augmenting Datasets Using a Novel Metric. IJCNN 2023: 1-10 - [c326]Indrajit Ray, Bhavani Thuraisingham, Jaideep Vaidya, Sharad Mehrotra, Vijayalakshmi Atluri, Indrakshi Ray, Murat Kantarcioglu, Ramesh Raskar, Babak Salimi, Steve Simske, Nalini Venkatasubramanian, Vivek K. Singh:
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups. SACMAT 2023: 145-155 - [c325]Latifur Khan, Bhavani Thuraisingham, Sadaf Md. Halim:
A Transparent Blockchain-Based College Admissions Platform. SmartCloud 2023: 116-123 - [c324]Bhavani Thuraisingham:
Secure Multimedia Data Systems in the Era of Artificial Intelligence: Significant Progress and Vision for the Future. TPS-ISA 2023: 180-183 - [i12]Feng Mi, Chen Zhao, Zhuoyi Wang, Sadaf Md. Halim, Xiaodi Li, Zhouxiang Wu, Latifur Khan, Bhavani Thuraisingham:
An Automated Vulnerability Detection Framework for Smart Contracts. CoRR abs/2301.08824 (2023) - 2022
- [j128]Bhavani Thuraisingham:
Trustworthy Machine Learning. IEEE Intell. Syst. 37(1): 21-24 (2022) - [j127]Md Shihabul Islam, Bo Dong, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham:
GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game. IEEE Trans. Dependable Secur. Comput. 19(2): 804-816 (2022) - [j126]Sagar Samtani, Hsinchun Chen, Murat Kantarcioglu, Bhavani Thuraisingham:
Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI). IEEE Trans. Dependable Secur. Comput. 19(4): 2149-2150 (2022) - [j125]Yang Gao, Swarup Chandra, Yifan Li, Latifur Khan, Bhavani Thuraisingham:
SACCOS: A Semi-Supervised Framework for Emerging Class Detection and Concept Drift Adaption Over Data Streams. IEEE Trans. Knowl. Data Eng. 34(3): 1416-1426 (2022) - [j124]Mu-Yen Chen, Bhavani Thuraisingham, Erol Egrioglu, José de Jesús Rubio:
Introduction to the Special Issue on Smart Systems for Industry 4.0 and IoT. ACM Trans. Manag. Inf. Syst. 13(4): 35:1-35:3 (2022) - [c323]Sadaf Md. Halim, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Md Delwar Hossain:
A Federated Approach for Learning from Electronic Health Records. BigDataSecurity/HPSC/IDS 2022: 218-223 - [c322]Elisa Bertino, Ravi S. Sandhu, Bhavani Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal:
Security and Privacy for Emerging IoT and CPS Domains. CODASPY 2022: 336-337 - [c321]Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham:
MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data. DBSec 2022: 48-67 - [c320]Khandakar Ashrafi Akbar, Sadaf Md. Halim, Yibo Hu, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham:
Knowledge Mining in Cybersecurity: From Attack to Defense. DBSec 2022: 110-122 - [c319]Xiaodi Li, Zhuoyi Wang, Dingcheng Li, Latifur Khan, Bhavani Thuraisingham:
LPC: A Logits and Parameter Calibration Framework for Continual Learning. EMNLP (Findings) 2022: 7142-7155 - [c318]Wentao Wang, Han Xu, Xiaorui Liu, Yaxin Li, Bhavani Thuraisingham, Jiliang Tang:
Imbalanced Adversarial Training with Reweighting. ICDM 2022: 1209-1214 - [c317]Hemeng Tao, Latifur Khan, Bhavani Thuraisingham:
Personalized Hashtag Recommendation with User-level Meta-learning. IJCNN 2022: 1-8 - [c316]Zhuoyi Wang, Yibo Hu, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham:
CAPT: Contrastive Pre-Training based Semi-Supervised Open-Set Learning. MIPR 2022: 7-13 - [c315]Bhavani Thuraisingham:
Trustworthy Machine Learning for Securing IoT Systems. SmartCloud 2022: 197-199 - 2021
- [j123]Meikang Qiu, Bhavani Thuraisingham, Mahmoud Daneshmand, Huansheng Ning, Payam M. Barnaghi:
Special Issue on Robustness and Efficiency in the Convergence of Artificial Intelligence and IoT. IEEE Internet Things J. 8(12): 9460-9462 (2021) - [j122]Khaled Al-Naami, Amir El-Ghamry, Md Shihabul Islam, Latifur Khan, Bhavani Thuraisingham, Kevin W. Hamlen, Mohammed F. Alrahmawy, Magdi Zakria Rashad:
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks. IEEE Trans. Dependable Secur. Comput. 18(2): 505-517 (2021) - [j121]Han Qiu, Qinkai Zheng, Gérard Memmi, Jialiang Lu, Meikang Qiu, Bhavani Thuraisingham:
Deep Residual Learning-Based Enhanced JPEG Compression in the Internet of Things. IEEE Trans. Ind. Informatics 17(3): 2124-2133 (2021) - [j120]Cuneyt Gurcan Akcora, Yulia R. Gel, Murat Kantarcioglu, Vyacheslav Lyubchich, Bhavani Thuraisingham:
GraphBoot: Quantifying Uncertainty in Node Feature Learning on Large Networks. IEEE Trans. Knowl. Data Eng. 33(1): 116-127 (2021) - [c314]Haoyu He, Jing Zhang, Bhavani Thuraisingham, Dacheng Tao:
Progressive One-shot Human Parsing. AAAI 2021: 1522-1530 - [c313]Han Qiu, Yi Zeng, Shangwei Guo, Tianwei Zhang, Meikang Qiu, Bhavani Thuraisingham:
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation. AsiaCCS 2021: 363-377 - [c312]Zhuoyi Wang, Yu Lin, Yifan Li, Feng Mi, Zachary Tian, Latifur Khan, Bhavani Thuraisingham:
Unsupervised Perturbation based Self-Supervised Adversarial Training. BigDataSecurity 2021: 20-25 - [c311]Raul Quinonez, Sleiman Safaoui, Tyler H. Summers, Bhavani Thuraisingham, Alvaro A. Cárdenas:
Shared Reality: Detecting Stealthy Attacks Against Autonomous Vehicles. CPSIOTSEC@CCS 2021: 15-26 - [c310]Clara Bertolissi, Maribel Fernández, Bhavani Thuraisingham:
Graph-Based Specification of Admin-CBAC Policies. CODASPY 2021: 173-184 - [c309]Yi-Fan Li, Bo Dong, Latifur Khan, Bhavani Thuraisingham, Patrick T. Brandt, Vito D'Orazio:
Data-Driven Time Series Forecasting for Social Studies Using Spatio-Temporal Graph Neural Networks. GoodIT 2021: 61-66 - [c308]Bhavani Thuraisingham:
Integrating Big Data, Data Science and Cyber Security with Applications in Cloud and Internet of Things. KDIR 2021: 7 - [c307]Khandakar Ashrafi Akbar, Yigong Wang, Md Shihabul Islam, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham:
Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces. ICISS 2021: 3-25 - [c306]Hemeng Tao, Yang Gao, Zhuoyi Wang, Latifur Khan, Bhavani Thuraisingham:
An Episodic Learning based Geolocation Detection Framework for Imbalanced Data. IJCNN 2021: 1-8 - [c305]Chen Zhao, Feng Chen, Bhavani Thuraisingham:
Fairness-Aware Online Meta-learning. KDD 2021: 2294-2304 - [c304]Brian Ricks, Patrick Tague, Bhavani Thuraisingham:
DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection. TPS-ISA 2021: 217-224 - [i11]Yang Gao, Yi-Fan Li, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham:
Towards Self-Adaptive Metric Learning On the Fly. CoRR abs/2104.01495 (2021) - [i10]Wentao Wang, Han Xu, Xiaorui Liu, Yaxin Li, Bhavani Thuraisingham, Jiliang Tang:
Imbalanced Adversarial Training with Reweighting. CoRR abs/2107.13639 (2021) - [i9]Chen Zhao, Feng Chen, Bhavani Thuraisingham:
Fairness-Aware Online Meta-learning. CoRR abs/2108.09435 (2021) - [i8]Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani M. Thuraisingham:
Multi-concept adversarial attacks. CoRR abs/2110.10287 (2021) - 2020
- [j119]Elena Ferrari, Bhavani Thuraisingham:
Digital Trust: Trust Management in Cyberspace. IEEE Internet Comput. 24(6): 6-7 (2020) - [c303]Bhavani Thuraisingham:
Cloud Governance. CLOUD 2020: 86-90 - [c302]Bhavani Thuraisingham:
Data Science, COVID-19 Pandemic, Privacy and Civil Liberties. IEEE BigData 2020: 2634-2638 - [c301]Bhavani Thuraisingham:
Multi-Generational Database Inference Controllers. BigDataSecurity/HPSC/IDS 2020: 8-12 - [c300]Bhavani M. Thuraisingham:
Can AI be for Good in the Midst of Cyber Attacks and Privacy Violations?: A Position Paper. CODASPY 2020: 1-4 - [c299]Clara Bertolissi, Maribel Fernández, Bhavani Thuraisingham:
Admin-CBAC: An Administration Model for Category-Based Access Control. CODASPY 2020: 73-84 - [c298]Sadaf Md. Halim, Latifur Khan, Bhavani Thuraisingham:
Next - Location Prediction Using Federated Learning on a Blockchain. CogMI 2020: 244-250 - [c297]Bhavani Thuraisingham:
Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation Systems. CSCloud/EdgeCom 2020: 8-10 - [c296]Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:
Attacking Machine Learning Models for Social Good. GameSec 2020: 457-471 - [c295]Bhavani Thuraisingham:
Cyber Security Meets Big Knowledge: Towards a Secure HACE Theorem. ICKG 2020: 1-3 - [c294]Bhavani Thuraisingham:
Keynote I Cyber Security Meets Big Knowledge: Towards a Secure HACE Theorem. ICKG 2020: 1-6 - [c293]Bhavani Thuraisingham:
Keynote Speech 1: Integrating Big Data, Data Science and Cyber Security with Applications in Internet of Transportation and Infrastructures. IDSTA 2020: 1-2 - [c292]Bhavani Thuraisingham:
The Role of Artificial Intelligence and Cyber Security for Social Networks and Internet of Transportation. IoTSMS 2020: 1 - [c291]Bhavani Thuraisingham:
The Role of Artificial Intelligence and Cyber Security for Social Media. IPDPS Workshops 2020: 1116-1118 - [c290]Bhavani Thuraisingham:
Artificial Intelligence and Data Science Governance: Roles and Responsibilities at the C-Level and the Board. IRI 2020: 314-318 - [c289]Maribel Fernández, Alex Franch Tapia, Jenjira Jaimunk, Manuel Martinez Chamorro, Bhavani Thuraisingham:
A Data Access Model for Privacy-Preserving Cloud-IoT Architectures. SACMAT 2020: 191-202 - [c288]Bhavani Thuraisingham:
Blockchain Technologies and Their Applications in Data Science and Cyber Security. SmartBlock 2020: 1-4 - [c287]Meikang Qiu, Han Qiu, Hui Zhao, Meiqin Liu, Bhavani Thuraisingham:
Secure Data Sharing Through Untrusted Clouds with Blockchain-enhanced Key Management. SmartBlock 2020: 11-16 - [c286]Vibha Belavadi, Yan Zhou, Jonathan Z. Bakdash, Murat Kantarcioglu, Daniel C. Krawczyk, Linda Nguyen, Jelena Rakic, Bhavani Thuraisingham:
MultiModal Deception Detection: Accuracy, Applicability and Generalizability. TPS-ISA 2020: 99-106 - [e21]Vassil Roussev, Bhavani Thuraisingham, Barbara Carminati, Murat Kantarcioglu:
CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020. ACM 2020, ISBN 978-1-4503-7107-0 [contents]Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020. - [i7]Jan Kallberg, Rosemary A. Burk, Bhavani Thuraisingham:
COVID-19: The Information Warfare Paradigm Shift. CoRR abs/2009.01267 (2020) - [i6]Yi Zeng, Han Qiu, Shangwei Guo, Tianwei Zhang, Meikang Qiu, Bhavani Thuraisingham:
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation. CoRR abs/2012.07006 (2020) - [i5]Haoyu He, Jing Zhang, Bhavani Thuraisingham, Dacheng Tao:
Progressive One-shot Human Parsing. CoRR abs/2012.11810 (2020)
2010 – 2019
- 2019
- [c285]Maribel Fernández, Ian Mackie, Bhavani Thuraisingham:
Specification and Analysis of ABAC Policies via the Category-based Metamodel. CODASPY 2019: 173-184 - [c284]Maryam Bahojb Imani, Latifur Khan, Bhavani Thuraisingham:
Where Did the Political News Event Happen? Primary Focus Location Extraction in Different Languages. CIC 2019: 61-70 - [c283]Nazmiye Ceren Abay, Cuneyt Gurcan Akcora, Yulia R. Gel, Murat Kantarcioglu, Umar D. Islambekov, Yahui Tian, Bhavani Thuraisingham:
ChainNet: Learning on Blockchain Graphs with Topological Features. ICDM 2019: 946-951 - [c282]Maribel Fernández, Jenjira Jaimunk, Bhavani Thuraisingham:
Privacy-Preserving Architecture for Cloud-IoT Platforms. ICWS 2019: 11-19 - [c281]Brian Ricks, Bhavani Thuraisingham, Patrick Tague:
Mimicking Human Behavior in Shared-Resource Computer Networks. IRI 2019: 356-363 - [c280]Bhavani Thuraisingham:
Cyber Security and Data Governance Roles and Responsibilities at the C-Level and the Board. ISI 2019: 231-236 - [c279]Sultan Alsarra, I-Ling Yen, Yongtao Huang, Farokh B. Bastani, Bhavani Thuraisingham:
An OpenRBAC Semantic Model for Access Control in Vehicular Networks. SACMAT 2019: 93-102 - [c278]Yang Gao, Yifan Li, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham:
Towards Self-Adaptive Metric Learning On the Fly. WWW 2019: 503-513 - [c277]Yi-Fan Li, Yang Gao, Gbadebo Ayoade, Hemeng Tao, Latifur Khan, Bhavani Thuraisingham:
Multistream Classification for Cyber Threat Data with Heterogeneous Feature Space. WWW 2019: 2992-2998 - [e20]Gail-Joon Ahn, Bhavani Thuraisingham, Murat Kantarcioglu, Ram Krishnan:
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019. ACM 2019, ISBN 978-1-4503-6099-9 [contents] - [i4]Nazmiye Ceren Abay, Cuneyt Gurcan Akcora, Yulia R. Gel, Umar D. Islambekov, Murat Kantarcioglu, Yahui Tian, Bhavani Thuraisingham:
ChainNet: Learning on Blockchain Graphs with Topological Features. CoRR abs/1908.06971 (2019) - 2018
- [j118]Meikang Qiu, Keke Gai, Bhavani Thuraisingham, Lixin Tao, Hui Zhao:
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. 80: 421-429 (2018) - [c276]Bo Dong, Md Shihabul Islam, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham:
GCI: A Transfer Learning Approach for Detecting Cheats of Computer Game. IEEE BigData 2018: 1188-1197 - [c275]Gbadebo Ayoade, Swarup Chandra, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham:
Automated Threat Report Classification over Multi-Source Data. CIC 2018: 236-245 - [c274]Maribel Fernández, Jenjira Jaimunk, Bhavani Thuraisingham:
Graph-Based Data-Collection Policies for the Internet of Things. ICSS 2018: 9-16 - [c273]Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan:
Integrating Cyber Security and Data Science for Social Media: A Position Paper. IPDPS Workshops 2018: 1163-1165 - [c272]Brian Ricks, Patrick Tague, Bhavani Thuraisingham:
Large-Scale Realistic Network Data Generation on a Budget. IRI 2018: 23-30 - [c271]Cuneyt Gurcan Akcora, Jonathan Z. Bakdash, Yulia R. Gel, Murat Kantarcioglu, Laura R. Marusich, Bhavani Thuraisingham:
Attacklets: Modeling High Dimensionality in Real World Cyberattacks. ISI 2018: 55-57 - [c270]Brian Ricks, Bhavani Thuraisingham, Patrick Tague:
Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack. ISI 2018: 130-135 - [c269]Nazmiye Ceren Abay, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham, Latanya Sweeney:
Privacy Preserving Synthetic Data Release Using Deep Learning. ECML/PKDD (1) 2018: 510-526 - [c268]Bhavani Thuraisingham, Murat Kantarcioglu, Elisa Bertino, Jonathan Z. Bakdash, Maribel Fernández:
Towards a Privacy-Aware Qunatified Self Data Management Framework. SACMAT 2018: 173-184 - [r9]Bhavani Thuraisingham:
Mandatory Access Control. Encyclopedia of Database Systems (2nd ed.) 2018 - [r8]Bhavani Thuraisingham:
Multilevel Secure Database Management System. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [j117]Alan T. Sherman, Melissa Dark, Agnes H. Chan, Rylan Chong, Thomas H. Morris, Linda Oliva, John A. Springer, Bhavani Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel:
INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research. IEEE Secur. Priv. 15(4): 72-78 (2017) - [c267]Bhavani Thuraisingham, Murat Kantarcioglu, Elisa Bertino, Chris Clifton:
Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper. BigData Congress 2017: 256-265 - [c266]Ahmad M. Mustafa, Gbadebo Ayoade, Khaled Al-Naami, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Frederico Araujo:
Unsupervised deep embedding for novel class detection over data stream. IEEE BigData 2017: 1830-1839 - [c265]Maryam Bahojb Imani, Swarup Chandra, Samuel Ma, Latifur Khan, Bhavani Thuraisingham:
Focus location extraction from political news reports with bias correction. IEEE BigData 2017: 1956-1964 - [c264]Yasmeen Alufaisan, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:
From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency. CIC 2017: 257-266 - [c263]Swarup Chandra, Vishal Karande, Zhiqiang Lin, Latifur Khan, Murat Kantarcioglu, Bhavani Thuraisingham:
Securing Data Analytics on SGX with Randomization. ESORICS (1) 2017: 352-369 - [c262]Ramkumar Paranthaman, Bhavani Thuraisingham:
Malware Collection and Analysis. IRI 2017: 26-31 - [c261]Yasmeen Alufaisan, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:
Hacking social network data mining. ISI 2017: 54-59 - [e19]Bhavani Thuraisingham, David Evans, Tal Malkin, Dongyan Xu:
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017. ACM 2017, ISBN 978-1-4503-4946-8 [contents] - [e18]Bhavani Thuraisingham, Battista Biggio, David Mandell Freeman, Brad Miller, Arunesh Sinha:
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5202-4 [contents] - [e17]Bhavani Thuraisingham, Ghassan Karame, Angelos Stavrou:
Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS 2017, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5204-8 [contents] - [e16]Bhavani Thuraisingham, Rakesh B. Bobba, Awais Rashid:
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5394-6 [contents] - [e15]Rakesh M. Verma, Bhavani Thuraisingham:
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. ACM 2017, ISBN 978-1-4503-4909-3 [contents] - [e14]Bhavani Thuraisingham, Adam J. Lee:
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30 - November 3, 2017. ACM 2017, ISBN 978-1-4503-5175-1 [contents] - [r7]Bhavani Thuraisingham, Latifur Khan, Ganesh Subbiah, Ashraful Alam, Murat Kantarcioglu:
Geospatial Semantic Web, Definition. Encyclopedia of GIS 2017: 746 - [r6]Bhavani Thuraisingham, Latifur Khan, Ganesh Subbiah, Ashraful Alam, Murat Kantarcioglu:
Privacy and Security Challenges in GIS. Encyclopedia of GIS 2017: 1641-1647 - [i3]Alan T. Sherman, Melissa Dark, Agnes H. Chan, Rylan Chong, Thomas H. Morris, Linda Oliva, John A. Springer, Bhavani Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel:
The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research. CoRR abs/1703.08859 (2017) - 2016
- [j116]Mohiuddin Solaimani, Mohammed Iftekhar, Latifur Khan, Bhavani Thuraisingham, Joey Burton Ingram, Sadi Evren Seker:
Online anomaly detection for multi-source VMware using a distributed streaming framework. Softw. Pract. Exp. 46(11): 1479-1497 (2016) - [j115]Wei She, Wei Zhu, I-Ling Yen, Farokh B. Bastani, Bhavani Thuraisingham:
Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems. IEEE Trans. Serv. Comput. 9(6): 940-953 (2016) - [c260]Khaled Al-Naami, Swarup Chandra, Ahmad Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani Thuraisingham:
Adaptive encrypted traffic fingerprinting with bi-directional dependence. ACSAC 2016: 177-188 - [c259]Mohiuddin Solaimani, Rajeevardhan Gopalan, Latifur Khan, Patrick T. Brandt, Bhavani Thuraisingham:
Spark-Based Political Event Coding. BigDataService 2016: 14-23 - [c258]Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:
Message from the SEPT Organizing Committee. COMPSAC 2016: 399 - [c257]Ahsanul Haque, Latifur Khan, Michael Baron, Bhavani Thuraisingham, Charu C. Aggarwal:
Efficient handling of concept drift and concept evolution over Stream Data. ICDE 2016: 481-492 - [c256]Maribel Fernández, Murat Kantarcioglu, Bhavani Thuraisingham:
A Framework for Secure Data Collection and Management for Internet of Things. ICSS 2016: 30-37 - [c255]Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan, Barbara Carminati, Elena Ferrari, Leila Bahri:
Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper. IPDPS Workshops 2016: 1813-1820 - [c254]Bhavani Thuraisingham, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Tim Finin, Anupam Joshi, Tim Oates, Elisa Bertino:
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions. IRI 2016: 1-10 - [c253]Mohiuddin Solaimani, Sayeed Salam, Ahmad M. Mustafa, Latifur Khan, Patrick T. Brandt, Bhavani Thuraisingham:
Near real-time atrocity event coding. ISI 2016: 139-144 - 2015
- [j114]Louise E. Moser, Bhavani Thuraisingham, Jia Zhang:
Services in the Cloud. IEEE Trans. Serv. Comput. 8(2): 172-174 (2015) - [j113]Bhavani Thuraisingham, Liang-Jie Zhang, Louise E. Moser:
Emerging Web Services. IEEE Trans. Serv. Comput. 8(3): 341-342 (2015) - [c252]Bhavani Thuraisingham:
Database Security: Past, Present, and Future. BigData Congress 2015: 772-774 - [c251]Wenyaw Chan, George Cybenko, Murat Kantarcioglu, Ernst L. Leiss, Thamar Solorio, Bhavani Thuraisingham, Rakesh M. Verma:
Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students. IWSPA@CODASPY 2015: 55-57 - [c250]Bhavani Thuraisingham:
Big Data Security and Privacy. CODASPY 2015: 279-280 - [c249]Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:
Message from SEPT Symposium Organizing Committee. COMPSAC 2015: 421 - [c248]Keke Gai, Meikang Qiu, Bhavani Thuraisingham, Lixin Tao:
Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry. HPCC/CSS/ICESS 2015: 1332-1337 - [c247]Satyen Abrol, Gunasekar Rajasekar, Latifur Khan, Vaibhav Khadilkar, Siddarth Nagarajan, Nathan McDaniel, Gautam Ganesh, Bhavani Thuraisingham:
Real-Time Stream Data Analytics for Multi-purpose Social Media Applications. IRI 2015: 25-30 - [c246]Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar:
Design and Implementation of a Semantic Web-Based Inference Controller: A Summary. IRI 2015: 451-456 - [c245]Huseyin Ulusoy, Murat Kantarcioglu, Bhavani Thuraisingham, Latifur Khan:
Honeypot based unauthorized data access detection in MapReduce systems. ISI 2015: 126-131 - [c244]Khaled Al-Naami, Gbadebo Ayoade, Asim Siddiqui, Nicholas Ruozzi, Latifur Khan, Bhavani Thuraisingham:
P2V: Effective Website Fingerprinting Using Vector Space Representations. SSCI 2015: 59-66 - [e13]Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran:
Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 164, Springer 2015, ISBN 978-3-319-28864-2 [contents] - 2014
- [b3]Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar:
Secure Data Provenance and Inference Control with Semantic Web. CRC Press 2014, ISBN 978-1-4665-6943-0, pp. I-XXX, 1-448 - [j112]Chengcui Zhang, Elisa Bertino, Bhavani Thuraisingham, James B. D. Joshi:
Guest editorial: Information reuse, integration, and reusable systems. Inf. Syst. Frontiers 16(5): 749-752 (2014) - [j111]Lidan Fan, Zaixin Lu, Weili Wu, Yuanjun Bi, Ailian Wang, Bhavani Thuraisingham:
An individual-based model of information diffusion combining friends' influence. J. Comb. Optim. 28(3): 529-539 (2014) - [j110]Elisa Bertino, Gabriel Ghinita, Murat Kantarcioglu, Dang Nguyen, Jae Park, Ravi S. Sandhu, Salmin Sultana, Bhavani Thuraisingham, Shouhuai Xu:
A roadmap for privacy-enhanced secure data provenance. J. Intell. Inf. Syst. 43(3): 481-501 (2014) - [c243]Ahsanul Haque, Brandon Parker, Latifur Khan, Bhavani Thuraisingham:
Evolving Big Data Stream Classification with MapReduce. IEEE CLOUD 2014: 570-577 - [c242]Mohiuddin Solaimani, Mohammed Iftekhar, Latifur Khan, Bhavani Thuraisingham:
Statistical technique for online anomaly detection using Spark over heterogeneous data from multi-source VMware performance data. IEEE BigData 2014: 1086-1094 - [c241]Mohiuddin Solaimani, Mohammed Iftekhar, Latifur Khan, Bhavani Thuraisingham, Joey Burton Ingram:
Spark-based anomaly detection over multi-source VMware performance data in real-time. CICS 2014: 66-73 - [c240]Ahmad Mustafa, Ahsanul Haque, Latifur Khan, Michael Baron, Bhavani Thuraisingham:
Evolving stream classification using change detection. CollaborateCom 2014: 154-162 - [c239]Swarup Chandra, Justin Sahs, Latifur Khan, Bhavani Thuraisingham, Charu C. Aggarwal:
Stream Mining Using Statistical Relational Learning. ICDM 2014: 743-748 - [c238]Nathan McDaniel, Bhavani Thuraisingham, Latifur Khan:
Deploying malware detection software for smart phones. IRI 2014: 24-27 - [c237]Mohiuddin Solaimani, Latifur Khan, Bhavani Thuraisingham:
Real-time anomaly detection over VMware performance data using storm. IRI 2014: 458-465 - [c236]Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:
Towards fine grained RDF access control. SACMAT 2014: 165-176 - [c235]Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:
Redaction based RDF access control language. SACMAT 2014: 177-180 - [c234]Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:
RDF-X: a language for sanitizing RDF graphs. WWW (Companion Volume) 2014: 363-364 - [e12]James Joshi, Elisa Bertino, Bhavani Thuraisingham, Ling Liu:
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, IRI 2014, Redwood City, CA, USA, August 13-15, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5880-1 [contents] - 2013
- [j109]Kevin W. Hamlen, Bhavani Thuraisingham:
Data security services, solutions and standards for outsourcing. Comput. Stand. Interfaces 35(1): 1-5 (2013) - [j108]Pallabi Parveen, Nathan McDaniel, Zackary R. Weger, Jonathan Evans, Bhavani Thuraisingham, Kevin W. Hamlen, Latifur Khan:
Evolving Insider Threat Detection Stream Mining Perspective. Int. J. Artif. Intell. Tools 22(5) (2013) - [j107]Jan Kallberg, Bhavani Thuraisingham:
State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks. IT Prof. 15(3): 32-35 (2013) - [j106]Mehmet Engin Tozal, Yongge Wang, Ehab Al-Shaer, Kamil Saraç, Bhavani Thuraisingham, Bei-tseng Chu:
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications. Mob. Networks Appl. 18(5): 697-711 (2013) - [j105]Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham:
Preventing Private Information Inference Attacks on Social Networks. IEEE Trans. Knowl. Data Eng. 25(8): 1849-1862 (2013) - [j104]Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino:
Security-Aware Service Composition with Fine-Grained Information Flow Control. IEEE Trans. Serv. Comput. 6(3): 330-343 (2013) - [c233]Ahsanul Haque, Brandon Parker, Latifur Khan, Bhavani Thuraisingham:
Intelligent MapReduce Based Framework for Labeling Instances in Evolving Data Stream. CloudCom (2) 2013: 299-304 - [c232]Pallabi Parveen, Pratik Desai, Bhavani Thuraisingham, Latifur Khan:
MapReduce-guided scalable compressed dictionary construction for evolving repetitive sequence streams. CollaborateCom 2013: 345-352 - [c231]Huseyin Ulusoy, Murat Kantarcioglu, Bhavani Thuraisingham, Ebru Celikel Cankaya, Erman Pattuk:
Analysis of heuristic based access pattern obfuscation. CollaborateCom 2013: 537-544 - [c230]Jan Kallberg, Bhavani Thuraisingham, Erik Lakomaa:
Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security. EISIC 2013: 212-215 - [c229]Lidan Fan, Zaixin Lu, Weili Wu, Bhavani Thuraisingham, Huan Ma, Yuanjun Bi:
Least Cost Rumor Blocking in Social Networks. ICDCS 2013: 540-549 - [c228]Sheikh M. Qumruzzaman, Latifur Khan, Bhavani Thuraisingham:
Behavioral sequence prediction for evolving data stream. IRI 2013: 482-488 - [c227]Daniel C. Krawczyk, James Bartlett, Murat Kantarcioglu, Kevin W. Hamlen, Bhavani Thuraisingham:
Measuring expertise and bias in cyber security using cognitive and neuroscience approaches. ISI 2013: 364-367 - [c226]Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:
REDACT: a framework for sanitizing RDF data. WWW (Companion Volume) 2013: 157-158 - [e11]Hui Xiong, George Karypis, Bhavani Thuraisingham, Diane J. Cook, Xindong Wu:
2013 IEEE 13th International Conference on Data Mining, Dallas, TX, USA, December 7-10, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5108-1 [contents] - [e10]Wei Ding, Takashi Washio, Hui Xiong, George Karypis, Bhavani Thuraisingham, Diane J. Cook, Xindong Wu:
13th IEEE International Conference on Data Mining Workshops, ICDM Workshops, TX, USA, December 7-10, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5109-8 [contents] - 2012
- [j103]Gregory S. Lee, Bhavani Thuraisingham:
Cyberphysical systems security applied to telesurgical robotics. Comput. Stand. Interfaces 34(1): 225-229 (2012) - [j102]Neda Alipanah, Latifur Khan, Bhavani Thuraisingham:
Optmized ontology-driven query expansion using map-reduce framework to facilitate federated queries. Comput. Syst. Sci. Eng. 27(2) (2012) - [j101]Scott Hand, Zhiqiang Lin, Guofei Gu, Bhavani Thuraisingham:
Bin-Carver: Automatic recovery of binary executable files. Digit. Investig. 9(Supplement): S108-S117 (2012) - [j100]Zhong Wang, Wei Wang, Joonmo Kim, Bhavani Thuraisingham, Weili Wu:
PTAS for the minimum weighted dominating set in growth bounded graphs. J. Glob. Optim. 54(3): 641-648 (2012) - [j99]Bhavani Thuraisingham, Tahseen Al-Khateeb, Latifur Khan, Mehedy Masud, Kevin W. Hamlen, Vaibhav Khadilkar, Satyen Abrol:
Design and Implementation of a Data Mining System for Malware Detection. J. Integr. Des. Process. Sci. 16(2): 33-49 (2012) - [j98]Elena Ferrari, Bhavani Thuraisingham:
Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy. IEEE Trans. Dependable Secur. Comput. 9(5): 625-626 (2012) - [j97]W. Eric Wong, Vidroha Debroy, Richard M. Golden, Xiaofeng Xu, Bhavani Thuraisingham:
Effective Software Fault Localization Using an RBF Neural Network. IEEE Trans. Reliab. 61(1): 149-169 (2012) - [c225]Kerim Yasin Oktay, Vaibhav Khadilkar, Bijit Hore, Murat Kantarcioglu, Sharad Mehrotra, Bhavani Thuraisingham:
Risk-Aware Workload Distribution in Hybrid Clouds. IEEE CLOUD 2012: 229-236 - [c224]Tahseen Al-Khateeb, Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
Cloud Guided Stream Classification Using Class-Based Ensemble. IEEE CLOUD 2012: 694-701 - [c223]Satyen Abrol, Latifur Khan, Bhavani Thuraisingham:
Tweecalization: Efficient and intelligent location mining in twitter using semi-supervised learning. CollaborateCom 2012: 514-523 - [c222]Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani Thuraisingham:
Randomizing Smartphone Malware Profiles against Statistical Mining Techniques. DBSec 2012: 239-254 - [c221]James R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani Thuraisingham:
Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement Documents. EISIC 2012: 148-155 - [c220]Tahseen Al-Khateeb, Mohammad M. Masud, Latifur Khan, Charu C. Aggarwal, Jiawei Han, Bhavani Thuraisingham:
Stream Classification with Recurring and Novel Class Detection Using Class-Based Ensemble. ICDM 2012: 31-40 - [c219]Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:
Self-Training with Selection-by-Rejection. ICDM 2012: 795-803 - [c218]Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:
Sparse Bayesian Adversarial Learning Using Relevance Vector Machine Ensembles. ICDM 2012: 1206-1211 - [c217]Gordon K. Lee, Elisa Bertino, Stuart Harvey Rubin, Taghi M. Khoshgoftaar, Bhavani Thuraisingham, James D. McCaffrey:
Panel: Using information re-use and integration principles in big data. IRI 2012 - [c216]Pranav Parikh, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham, Latifur Khan:
Secure information integration with a semantic web-based framework. IRI 2012: 659-663 - [c215]Jan Kallberg, Bhavani Thuraisingham:
Towards cyber operations - The new role of academic cyber security research and education. ISI 2012: 132-134 - [c214]Pallabi Parveen, Bhavani Thuraisingham:
Unsupervised incremental sequence learning for insider threat detection. ISI 2012: 141-143 - [c213]James R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani Thuraisingham:
Extracting semantic information structures from free text law enforcement data. ISI 2012: 177-179 - [c212]Satyen Abrol, Latifur Khan, Vaibhav Khadilkar, Bhavani Thuraisingham, Tyrone Cadenhead:
Design and implementation of SNODSOC: Novel class detection for social network analysis. ISI 2012: 215-220 - [c211]Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham, Bowei Xi:
Adversarial support vector machine learning. KDD 2012: 1059-1067 - [c210]Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham:
Design and Implementation of a Cloud-Based Assured Information Sharing System. MMM-ACNS 2012: 36-50 - [c209]Bhavani Thuraisingham, Vaibhav Khadilkar, Jyothsna Rachapalli, Tyrone Cadenhead, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Mohammad Farhan Husain:
Cloud-Centric Assured Information Sharing. PAISI 2012: 1-26 - [c208]Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:
A cloud-based RDF policy engine for assured information sharing. SACMAT 2012: 113-116 - [c207]James R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani Thuraisingham:
Expanded Semantic Graph Representation for Matching Related Information of Interest across Free Text Documents. ICSC 2012: 60-66 - [c206]Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham, Paolo Castagna:
Jena-HBase: A Distributed, Scalable and Effcient RDF Triple Store. ISWC (Posters & Demos) 2012 - [c205]Pallabi Parveen, Nate McDaniel, Varun S. Hariharan, Bhavani Thuraisingham, Latifur Khan:
Unsupervised Ensemble Based Learning for Insider Threat Detection. SocialCom/PASSAT 2012: 718-727 - [c204]Satyen Abrol, Latifur Khan, Bhavani Thuraisingham:
Tweeque: Spatio-Temporal Analysis of Social Networks for Location Mining Using Graph Partitioning. SocialInformatics 2012: 145-148 - [c203]Jyothsna Rachapalli, Murat Kantarcioglu, Bhavani Thuraisingham:
Tag-based Information Flow Analysis for Document Classification in Provenance. TaPP 2012 - [c202]Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:
StormRider: harnessing "storm" for social networks. WWW (Companion Volume) 2012: 543-544 - [e9]Chengcui Zhang, James Joshi, Elisa Bertino, Bhavani Thuraisingham:
IEEE 13th International Conference on Information Reuse & Integration, IRI 2012, Las Vegas, NV, USA, August 8-10, 2012. IEEE 2012, ISBN 978-1-4673-2282-9 [contents] - 2011
- [j96]Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham:
Semantic web-based social network access control. Comput. Secur. 30(2-3): 108-115 (2011) - [j95]Barbara Carminati, Bhavani Thuraisingham:
Introduction to secure Semantic Web. Comput. Stand. Interfaces 33(1): 1 (2011) - [j94]Ashraful Alam, Latifur Khan, Bhavani Thuraisingham:
Geospatial Resource Description Framework (GRDF) and security constructs. Comput. Stand. Interfaces 33(1): 35-41 (2011) - [j93]Kevin W. Hamlen, Bhavani Thuraisingham:
Secure Semantic Computing. Int. J. Semantic Comput. 5(2): 121-131 (2011) - [j92]Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani M. Thuraisingham:
Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints. IEEE Trans. Knowl. Data Eng. 23(6): 859-874 (2011) - [j91]Mohammad Farhan Husain, James P. McGlothlin, Mohammad M. Masud, Latifur R. Khan, Bhavani M. Thuraisingham:
Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing. IEEE Trans. Knowl. Data Eng. 23(9): 1312-1327 (2011) - [j90]Mohammad M. Masud, Tahseen Al-Khateeb, Kevin W. Hamlen, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Cloud-based malware detection for evolving data streams. ACM Trans. Manag. Inf. Syst. 2(3): 16:1-16:27 (2011) - [j89]Jeffrey Partyka, Pallabi Parveen, Latifur Khan, Bhavani Thuraisingham, Shashi Shekhar:
Enhanced geographically typed semantic schema matching. J. Web Semant. 9(1): 52-70 (2011) - [c201]Mohammad Farhan Husain, James P. McGlothlin, Latifur Khan, Bhavani Thuraisingham:
Scalable Complex Query Processing over Large Semantic Web Data Using Cloud. IEEE CLOUD 2011: 187-194 - [c200]Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:
A language for provenance access control. CODASPY 2011: 133-144 - [c199]Mohamed Nabeel, Elisa Bertino, Murat Kantarcioglu, Bhavani Thuraisingham:
Towards privacy preserving access control in the cloud. CollaborateCom 2011: 172-180 - [c198]Kevin W. Hamlen, Peng Liu, Murat Kantarcioglu, Bhavani Thuraisingham, Ting Yu:
Identity management for cloud computing: developments and directions. CSIIRW 2011: 32 - [c197]Bhavani Thuraisingham:
Data Mining for Malicious Code Detection and Security Applications. EISIC 2011: 4-5 - [c196]Mohammad M. Masud, Tahseen Al-Khateeb, Latifur Khan, Charu C. Aggarwal, Jing Gao, Jiawei Han, Bhavani Thuraisingham:
Detecting Recurring and Novel Classes in Concept-Drifting Data Streams. ICDM 2011: 1176-1181 - [c195]Pallabi Parveen, Zackary R. Weger, Bhavani Thuraisingham, Kevin W. Hamlen, Latifur Khan:
Supervised Learning for Insider Threat Detection Using Stream Mining. ICTAI 2011: 1032-1039 - [c194]Wei She, I-Ling Yen, Bhavani Thuraisingham, San-Yih Huang:
Rule-Based Run-Time Information Flow Control in Service Cloud. ICWS 2011: 524-531 - [c193]Neda Alipanah, Pallabi Parveen, Latifur Khan, Bhavani Thuraisingham:
Ontology-Driven Query Expansion Using Map/Reduce Framework to Facilitate Federated Queries. ICWS 2011: 712-713 - [c192]James P. McGlothlin, Latifur Khan, Bhavani Thuraisingham:
RDFKB: A Semantic Web Knowledge Base. IJCAI 2011: 2830-2831 - [c191]James R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani Thuraisingham, Murat Kantarcioglu:
Identification of related information of interest across free text documents. ISI 2011: 101-106 - [c190]James R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani Thuraisingham, Murat Kantarcioglu:
Extraction of expanded entity phrases. ISI 2011: 107-112 - [c189]Richard Wartell, Yan Zhou, Kevin W. Hamlen, Murat Kantarcioglu, Bhavani Thuraisingham:
Differentiating Code from Data in x86 Binaries. ECML/PKDD (3) 2011: 522-536 - [c188]Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:
Transforming provenance using redaction. SACMAT 2011: 93-102 - [c187]Pallabi Parveen, Jonathan Evans, Bhavani Thuraisingham, Kevin W. Hamlen, Latifur Khan:
Insider Threat Detection Using Stream Mining and Graph Mining. SocialCom/PASSAT 2011: 1102-1110 - [c186]Wei She, I-Ling Yen, Farokh B. Bastani, Bao N. Tran, Bhavani Thuraisingham:
Role-based integrated access control and data provenance for SOA based net-centric systems. SOSE 2011: 225-234 - [c185]Tyrone Cadenhead, Murat Kantarcioglu, Bhavani Thuraisingham:
A Framework for Policies over Provenance. TaPP 2011 - [i2]Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham, Sharad Mehrotra:
Secure Data Processing in a Hybrid Cloud. CoRR abs/1105.1982 (2011) - 2010
- [b2]Bhavani Thuraisingham:
Research contributions in secure dependable data management. University of Bristol, UK, 2010 - [j88]Bhavani Thuraisingham, Stefanos Gritzalis:
Information and communications security, privacy and trust: Standards and regulations. Comput. Stand. Interfaces 32(5-6): 229 (2010) - [j87]Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida, Bhavani Thuraisingham:
Relationalization of provenance data in complex RDF reification nodes. Electron. Commer. Res. 10(3-4): 389-421 (2010) - [j86]Kevin W. Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham:
Security Issues for Cloud Computing. Int. J. Inf. Secur. Priv. 4(2): 36-48 (2010) - [j85]Mamoun Awad, Latifur Khan, Bhavani Thuraisingham:
Policy Enforcement System for Inter-Organizational Data Sharing. Int. J. Inf. Secur. Priv. 4(3): 22-39 (2010) - [j84]Sunitha Ramanujam, Vaibhav Khadilkar, Latifur Khan, Murat Kantarcioglu, Bhavani Thuraisingham, Steven Seida:
Update-Enabled Triplification of Relational Data into Virtual RDF Stores. Int. J. Semantic Comput. 4(4): 423-451 (2010) - [j83]Wei She, I-Ling Yen, Bhavani Thuraisingham:
Enhancing Security Modeling for Web Services Using Delegation and Pass-On. Int. J. Web Serv. Res. 7(1): 1-21 (2010) - [j82]Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thuraisingham, Latifur Khan:
Secure Data Objects Replication in Data Grid. IEEE Trans. Dependable Secur. Comput. 7(1): 50-64 (2010) - [j81]Bhavani Thuraisingham:
Editorial SACMAT 2007. ACM Trans. Inf. Syst. Secur. 13(3): 23:1-23:2 (2010) - [c184]Mohammad Farhan Husain, Latifur Khan, Murat Kantarcioglu, Bhavani Thuraisingham:
Data Intensive Query Processing for Large RDF Graphs Using Cloud Computing Tools. IEEE CLOUD 2010: 1-10 - [c183]Arindam Khaled, Mohammad Farhan Husain, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham:
A Token-Based Access Control System for RDF Data in the Clouds. CloudCom 2010: 104-111 - [c182]Bhavani Thuraisingham, Vaibhav Khadilkar, Anuj Gupta, Murat Kantarcioglu, Latifur Khan:
Secure data storage and retrieval in the cloud. CollaborateCom 2010: 1-8 - [c181]Bhavani Thuraisingham, Kevin W. Hamlen:
Challenges and Future Directions of Software Technology: Secure Software Development. COMPSAC 2010: 17-20 - [c180]Wei She, I-Ling Yen, Bhavani Thuraisingham:
WS-Sim: A Web Service Simulation Toolset with Realistic Data Support. COMPSAC Workshops 2010: 109-114 - [c179]Tyrone Cadenhead, Murat Kantarcioglu, Bhavani Thuraisingham:
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. DBSec 2010: 209-224 - [c178]Latifur Khan, Jeffrey Partyka, Satyen Abrol, Bhavani Thuraisingham:
Geospatial Schema Matching with High-Quality Cluster Assurance and Location Mining from Social Network. ICDM Workshops 2010: 517 - [c177]Mohammad M. Masud, Qing Chen, Latifur Khan, Charu C. Aggarwal, Jing Gao, Jiawei Han, Bhavani Thuraisingham:
Addressing Concept-Evolution in Concept-Drifting Data Streams. ICDM 2010: 929-934 - [c176]Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino:
Policy-Driven Service Composition with Information Flow Control. ICWS 2010: 50-57 - [c175]Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Classification and Novel Class Detection in Data Streams with Active Mining. PAKDD (2) 2010: 311-324 - [c174]Mohammad M. Masud, Qing Chen, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Classification and Novel Class Detection of Data Streams in a Dynamic Feature Space. ECML/PKDD (2) 2010: 337-352 - [c173]Sunitha Ramanujam, Vaibhav Khadilkar, Latifur Khan, Steven Seida, Murat Kantarcioglu, Bhavani Thuraisingham:
Bi-directional Translation of Relational Data into Virtual RDF Stores. ICSC 2010: 268-276 - [c172]Vaibhav Khadilkar, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham:
Efficient Processing of Large RDF Streams Using Memory Management Algorithms. ISWC (Posters & Demos) 2010 - [c171]Neda Alipanah, Pallabi Parveen, Sheetal Menezes, Latifur Khan, Steven Seida, Bhavani Thuraisingham:
Ontology-driven query expansion methods to facilitate federated queries. SOCA 2010: 1-8 - [c170]Bhavani Thuraisingham, Kevin W. Hamlen:
Secure Semantic Sensor Web and Pervasive Computing. SUTC/UMC 2010: 5-10 - [c169]Neda Alipanah, Piyush Srivastava, Pallabi Parveen, Bhavani Thuraisingham:
Ranking Ontologies Using Verified Entities to Facilitate Federated Queries. Web Intelligence 2010: 332-337
2000 – 2009
- 2009
- [j80]Na Li, Nan Zhang, Sajal K. Das, Bhavani Thuraisingham:
Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7(8): 1501-1514 (2009) - [j79]Kevin W. Hamlen, Vishwath Mohan, Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
Exploiting an antivirus interface. Comput. Stand. Interfaces 31(6): 1182-1189 (2009) - [j78]Ryan Layfield, Bhavani Thuraisingham, Latifur Khan, Murat Kantarcioglu:
Design and implementation of a secure social network system. Comput. Syst. Sci. Eng. 24(2) (2009) - [j77]Zengti Li, Suogang Gao, Zhong Wang, Bhavani Thuraisingham, Weili Wu:
A Construction of Cartesian Authentication Code from Orthogonal Spaces over a Finite Field of odd Characteristic. Discret. Math. Algorithms Appl. 1(1): 105-114 (2009) - [j76]Wei Wang, Donghyun Kim, James Willson, Bhavani Thuraisingham, Weili Wu:
A Better Approximation for Minimum Average Routing Path Clustering Problem in 2-d Underwater Sensor Networks. Discret. Math. Algorithms Appl. 1(2): 175-192 (2009) - [j75]Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Bhavani Thuraisingham, Steven Seida:
R2d: a Framework for the Relational Transformation of RDF Data. Int. J. Semantic Comput. 3(4): 471-498 (2009) - [j74]Jiang Wu, D. Manivannan, Bhavani Thuraisingham:
Necessary and sufficient conditions for transaction-consistent global checkpoints in a distributed database system. Inf. Sci. 179(20): 3659-3672 (2009) - [j73]Ebru Celikel, Murat Kantarcioglu, Bhavani Thuraisingham, Elisa Bertino:
A risk management approach to RBAC. Risk Decis. Anal. 1(1): 21-33 (2009) - [c168]Bhavani Thuraisingham:
Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners. AsiaCCS 2009: 2 - [c167]Mohammad Farhan Husain, Pankil Doshi, Latifur Khan, Bhavani Thuraisingham:
Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce. CloudCom 2009: 680-686 - [c166]Wei Hao, I-Ling Yen, Bhavani Thuraisingham:
Dynamic Service and Data Migration in the Clouds. COMPSAC (2) 2009: 134-139 - [c165]Bhavani Thuraisingham:
Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners. CSIIRW 2009: 9 - [c164]Jeffrey Partyka, Latifur Khan, Bhavani Thuraisingham:
Geographically-typed semantic schema matching. GIS 2009: 456-459 - [c163]Li Liu, Murat Kantarcioglu, Bhavani Thuraisingham:
Privacy Preserving Decision Tree Mining from Perturbed Data. HICSS 2009: 1-10 - [c162]Bhavani Thuraisingham, Latifur Khan, Murat Kantarcioglu, Sonia Chib, Jiawei Han, Sang Hyuk Son:
Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis. HICSS 2009: 1-12 - [c161]Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino:
The SCIFC Model for Information Flow Control in Web Service Composition. ICWS 2009: 1-8 - [c160]Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida, Bhavani Thuraisingham:
A Relational Wrapper for RDF Reification. IFIPTM 2009: 196-214 - [c159]Bhavani Thuraisingham:
Building Trustworthy Semantic Webs. IRI 2009 - [c158]Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham:
On the mitigation of bioterrorism through game theory. ISI 2009: 1-6 - [c157]Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham:
Social network classification incorporating link type values. ISI 2009: 19-24 - [c156]Ryan Layfield, Bhavani Thuraisingham, Latifur Khan, Murat Kantarcioglu, Jyothsna Rachapalli:
Design and implementation of a secure social network system. ISI 2009: 236-247 - [c155]Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic:
Assured Information Sharing Life Cycle. ISI 2009: 307-309 - [c154]Bhavani Thuraisingham:
Data security and integrity: developments and directions. KDD Workshop on CyberSecurity and Intelligence Informatics 2009: 43 - [c153]Bhavani Thuraisingham, Latifur Khan, Murat Kantarcioglu, Vaibhav Khadilkar:
Design of a temporal geosocial semantic web for military stabilization and reconstruction operations. KDD Workshop on CyberSecurity and Intelligence Informatics 2009: 63-74 - [c152]Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan:
Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations. PAISI 2009: 1 - [c151]Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams. PAKDD 2009: 363-375 - [c150]Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams. ECML/PKDD (2) 2009: 79-94 - [c149]Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham:
A semantic web based framework for social network access control. SACMAT 2009: 177-186 - [c148]Chenyun Dai, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, Bhavani Thuraisingham:
Query Processing Techniques for Compliance with Data Confidence Policies. Secure Data Management 2009: 49-67 - [c147]Sancho C. Sebastine, Bhavani Thuraisingham, Balakrishnan Prabhakaran:
Semantic Web for Content Based Video Retrieval. ICSC 2009: 103-108 - [c146]Jeffrey Partyka, Latifur Khan, Bhavani Thuraisingham:
Semantic Schema Matching without Shared Instances. ICSC 2009: 297-302 - [c145]Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida, Bhavani Thuraisingham:
R2D: A Bridge between the Semantic Web and Relational Visualization Tools. ICSC 2009: 303-311 - [c144]Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino:
Effective and efficient implementation of an information flow control protocol for service composition. SOCA 2009: 1-8 - [c143]Bhavani Thuraisingham:
Security Engineering: Developments and Directions. SSIRI 2009: 2-3 - [c142]Bhavani Thuraisingham:
Data Mining for Malicious Code Detection and Security Applications. Web Intelligence 2009: 6-7 - [c141]Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida, Bhavani Thuraisingham:
R2D: Extracting Relational Structure from RDF Stores. Web Intelligence 2009: 361-366 - [c140]Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida, Bhavani Thuraisingham:
Relationalizing RDF stores for tools reusability. WWW 2009: 1059-1060 - [c139]Jack Lindamood, Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham:
Inferring private information using social network data. WWW 2009: 1145-1146 - [r5]Bhavani Thuraisingham:
Homeland Security Data Mining and Link Analysis. Encyclopedia of Data Warehousing and Mining 2009: 982-986 - [r4]Bhavani Thuraisingham:
Mandatory Access Control. Encyclopedia of Database Systems 2009: 1684-1685 - [r3]Bhavani Thuraisingham:
Multilevel Secure Database Management System. Encyclopedia of Database Systems 2009: 1789-1792 - 2008
- [j72]Li Liu, Murat Kantarcioglu, Bhavani Thuraisingham:
The applicability of the perturbation based privacy preserving data mining for real-world data. Data Knowl. Eng. 65(1): 5-21 (2008) - [j71]Bhavani Thuraisingham, Yashaswini Harsha Kumar, Latifur Khan:
Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries. Int. J. Inf. Secur. Priv. 2(4): 67-90 (2008) - [j70]Pavan Kumar Chitumalla, Douglas Harris, Bhavani Thuraisingham, Latifur Khan:
Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing. IEEE Internet Comput. 12(1): 38-44 (2008) - [j69]Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
A scalable multi-level feature extraction technique to detect malicious executables. Inf. Syst. Frontiers 10(1): 33-45 (2008) - [j68]Mamoun Awad, Latifur Khan, Bhavani Thuraisingham:
Predicting WWW surfing using multiple evidence combination. VLDB J. 17(3): 401-417 (2008) - [c138]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. ARES 2008: 237-244 - [c137]Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham:
Incentive and Trust Issues in Assured Information Sharing. CollaborateCom 2008: 113-125 - [c136]Elisa Bertino, Wonjun Lee, Anna Cinzia Squicciarini, Bhavani Thuraisingham:
End-to-end accountability in grid computing systems for coalition information sharing. CSIIRW 2008: 29:1-29:3 - [c135]Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Peer to peer botnet detection for cyber-security: a data mining approach. CSIIRW 2008: 39:1-39:2 - [c134]Steve Barker, David W. Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham:
Panel Session: What Are the Key Challenges in Distributed Security?. DBSec 2008: 219-221 - [c133]Bhavani Thuraisingham, Pranav Parikh:
Trustworthy Semantic Web Technologies for Secure Knowledge Management. EUC (2) 2008: 186-193 - [c132]Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen:
Data Mining for Security Applications. EUC (2) 2008: 585-589 - [c131]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. Financial Cryptography 2008: 323-324 - [c130]Elisa Bertino, Bhavani Thuraisingham, Michael Gertz, Maria Luisa Damiani:
Security and privacy for geospatial data: concepts and research directions. SPRINGL 2008: 6-19 - [c129]Jeffrey Partyka, Neda Alipanah, Latifur Khan, Bhavani Thuraisingham, Shashi Shekhar:
Content-based ontology matching for GIS datasets. GIS 2008: 51 - [c128]Gregory S. Lee, Bhavani Thuraisingham:
Differences in Fitts' Law Task Performance Based on Environment Scaling. EuroHaptics 2008: 295-300 - [c127]Yunqi Ye, I-Ling Yen, Liangliang Xiao, Bhavani Thuraisingham:
Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems. HASE 2008: 383-391 - [c126]Bhavani Thuraisingham, Barbara Carminati:
Message from the SSW'08 organizers. ICDE Workshops 2008: 445 - [c125]Ashraful Alam, Latifur Khan, Bhavani Thuraisingham:
Geospatial Resource Description Framework (GRDF) and security constructs. ICDE Workshops 2008: 475-481 - [c124]Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data. ICDM 2008: 929-934 - [c123]Wei She, I-Ling Yen, Bhavani Thuraisingham:
Enhancing Security Modeling for Web Services Using Delegation and Pass-On. ICWS 2008: 545-552 - [c122]Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu:
Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189 - [c121]Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham:
Simulating bioterrorism through epidemiology approximation. ISI 2008: 82-87 - [c120]Bhavani Thuraisingham:
Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic. ISI 2008 - [c119]Vana Kalogeraki, Dimitrios Gunopulos, Ravi S. Sandhu, Bhavani Thuraisingham:
QoS Aware Dependable Distributed Stream Processing. ISORC 2008: 69-75 - [c118]Bhavani Thuraisingham:
Data Mining for Security Applications and Its Privacy Implications. PinKDD 2008: 1-6 - [c117]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
The SCRUB security data sharing infrastructure. NOMS 2008: 630-644 - [c116]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. NOMS 2008: 991-994 - [c115]Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham:
Role Based Access Control and OWL. OWLED (Spring) 2008 - [c114]Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham:
ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82 - [c113]Jeffrey Partyka, Neda Alipanah, Latifur Khan, Bhavani Thuraisingham, Shashi Shekhar:
Ontology Alignment Using Multiple Contexts. ISWC (Posters & Demos) 2008 - [c112]Lei Wang, Latifur Khan, Bhavani Thuraisingham:
An Effective Evidence Theory Based K-Nearest Neighbor (KNN) Classification. Web Intelligence 2008: 797-801 - [p4]Bhavani Thuraisingham:
Secure Semantic Web Services. Handbook of Database Security 2008: 231-245 - [p3]Bhavani Thuraisingham, B. Prabhakaran, Latifur Khan, Lei Wang:
Managing and Mining Multimedia Data, Animations and Annotations. Wiley Encyclopedia of Computer Science and Engineering 2008 - [p2]Bhavani Thuraisingham:
Assured Information Sharing: Technologies, Challenges and Directions. Intelligence and Security Informatics 2008: 1-15 - [p1]Bhavani Thuraisingham:
On the Complexity of the Privacy Problem in Databases. Data Mining: Foundations and Practice 2008: 353-374 - [r2]Bhavani Thuraisingham, Latifur Khan, Ganesh Subbiah, Ashraful Alam, Murat Kantarcioglu:
Geospatial Semantic Web, Definition. Encyclopedia of GIS 2008: 398 - [r1]Bhavani Thuraisingham, Latifur Khan, Ganesh Subbiah, Ashraful Alam, Murat Kantarcioglu:
Privacy and Security Challenges in GIS. Encyclopedia of GIS 2008: 898-902 - 2007
- [j67]Douglas Harris, Latifur Khan, Raymond Paul, Bhavani Thuraisingham:
Standards for secure data sharing across organizations. Comput. Stand. Interfaces 29(1): 86-96 (2007) - [j66]Lei Wang, Latifur Khan, Bhavani Thuraisingham:
A framework for automated image annotation. Comput. Syst. Sci. Eng. 22(1-2) (2007) - [j65]Bhavani Thuraisingham, Murat Kantarcioglu, Srinivasan Iyer:
Extended RBAC-based design and implementation for a secure data warehouse. Int. J. Bus. Intell. Data Min. 2(4): 367-382 (2007) - [j64]Bhavani Thuraisingham, Natasha Tsybulnik, Ashraful Alam:
Administering the Semantic Web: Confidentiality, Privacy, and Trust Management. Int. J. Inf. Secur. Priv. 1(1): 18-34 (2007) - [j63]Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
E-Mail Worm Detection Using Data Mining. Int. J. Inf. Secur. Priv. 1(4): 47-61 (2007) - [j62]Wei She, Bhavani Thuraisingham:
Security for Enterprise Resource Planning Systems. Inf. Secur. J. A Glob. Perspect. 16(3): 152-163 (2007) - [j61]Bhavani Thuraisingham:
Security and privacy for multimedia database management systems. Multim. Tools Appl. 33(1): 13-29 (2007) - [j60]Gal Lavee, Latifur Khan, Bhavani Thuraisingham:
A framework for a video analysis tool for suspicious event detection. Multim. Tools Appl. 35(1): 109-123 (2007) - [j59]Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani Thuraisingham:
PP-trust-X: A system for privacy preserving trust negotiations. ACM Trans. Inf. Syst. Secur. 10(3): 12 (2007) - [j58]Latifur Khan, Mamoun Awad, Bhavani Thuraisingham:
A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J. 16(4): 507-521 (2007) - [c111]Abinandhan Chandrasekaran, Bhavani Thuraisingham:
Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances. ARES 2007: 273-280 - [c110]Bhavani Thuraisingham, Srinivasan Iyer:
Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. ARES 2007: 821-828 - [c109]Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani Thuraisingham:
Centralized Security Labels in Decentralized P2P Networks. ACSAC 2007: 315-324 - [c108]Kevin W. Hamlen, Bhavani Thuraisingham:
Secure peer-to-peer networks for trusted collaboration. CollaborateCom 2007: 58-63 - [c107]Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham:
Enforcing Honesty in Assured Information Sharing Within a Distributed System. DBSec 2007: 113-128 - [c106]Srinivasan Iyer, Bhavani Thuraisingham:
Design and Simulation of Trust Management Techniques for a Coalition Data Sharing Environment. FTDCS 2007: 73-79 - [c105]Ashraful Alam, Ganesh Subbiah, Latifur Khan, Bhavani Thuraisingham:
DAGIS: A Geospatial Semantic Web Services Discovery and Selection Framework. GeoS 2007: 268-277 - [c104]Ganesh Subbiah, Ashraful Alam, Latifur Khan, Bhavani Thuraisingham:
Geospatial data qualities as web services performance metrics. GIS 2007: 66 - [c103]Wei She, Bhavani Thuraisingham, I-Ling Yen:
Delegation-Based Security Model for Web Services. HASE 2007: 82-91 - [c102]Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
A Hybrid Model to Detect Malicious Executables. ICC 2007: 1443-1448 - [c101]Chuanjun Li, Latifur Khan, Bhavani Thuraisingham, M. Husain, Shaofei Chen, Fang Qiu:
Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping. ISI 2007: 254-261 - [c100]Jungin Kim, Bhavani Thuraisingham:
Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON. ISORC 2007: 146-155 - [c99]Bhavani Thuraisingham:
Multimedia systems security. MM&Sec 2007: 1-2 - [c98]Ebru Celikel, Murat Kantarcioglu, Bhavani Thuraisingham, Elisa Bertino:
Managing Risks in RBAC Employed Distributed Environments. OTM Conferences (2) 2007: 1548-1566 - [c97]Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
Feature Based Techniques for Auto-Detection of Novel Email Worms. PAKDD 2007: 205-216 - [c96]Bhavani Thuraisingham:
Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web. POLICY 2007: 8-11 - [c95]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs. SecureComm 2007: 49-56 - [e8]Volkmar Lotz, Bhavani Thuraisingham:
12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings. ACM 2007, ISBN 978-1-59593-745-2 [contents] - [i1]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs. CoRR abs/0710.3979 (2007) - 2006
- [b1]Elena Ferrari, Bhavani Thuraisingham:
Web and information security. IRM Press 2006, ISBN 978-1-59140-588-7, pp. I-XII, 1-318 - [j57]Barbara Carminati, Elena Ferrari, Bhavani Thuraisingham:
Access control for web data: models and policy languages. Ann. des Télécommunications 61(3-4): 245-266 (2006) - [j56]Elisa Bertino, Latifur R. Khan, Ravi S. Sandhu, Bhavani Thuraisingham:
Secure knowledge management: confidentiality, trust, and privacy. IEEE Trans. Syst. Man Cybern. Part A 36(3): 429-438 (2006) - [j55]Elena Ferrari, Bhavani Thuraisingham:
Guest editorial: special issue on privacy preserving data management. VLDB J. 15(4): 291-292 (2006) - [c94]Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham:
Detection and Resolution of Anomalies in Firewall Policy Rules. DBSec 2006: 15-29 - [c93]Li Liu, Bhavani Thuraisingham:
The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data. ICDM Workshops 2006: 507-512 - [c92]Pallabi Parveen, Bhavani Thuraisingham:
Face Recognition Using Multiple Classifiers. ICTAI 2006: 179-186 - [c91]Jungin Kim, Bhavani Thuraisingham:
Dependable and Secure TMO Scheme. ISORC 2006: 133-140 - [c90]Bhavani M. Thuraisingham:
Data Mining for Surveillance Applications. PAKDD 2006: 12-14 - [c89]Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan:
Access control, confidentiality and privacy for video surveillance databases. SACMAT 2006: 1-10 - [c88]Ernesto Damiani, Alban Gabillon, Anne Anderson, David Staggs, Bhavani Thuraisingham, Marianne Winslett:
Directions and trends of XML and web service security. SWS 2006: 1-2 - [c87]Ashraful Alam, Ganesh Subbiah, Bhavani Thuraisingham, Latifur Khan:
Reasoning with semantics-aware access control policies for geospatial web services. SWS 2006: 69-76 - [c86]Bhavani M. Thuraisingham:
Data Mining for Security Applications. WISI 2006: 1-3 - [e7]Sharad Mehrotra, Daniel Dajun Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue Wang:
Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings. Lecture Notes in Computer Science 3975, Springer 2006, ISBN 3-540-34478-0 [contents] - [e6]Paul Dowland, Steven Furnell, Bhavani Thuraisingham, Xiaoyang Sean Wang:
Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference [18-19 November 2004, Fairfax, Virginia; USA]. IFIP 193, Springer 2006, ISBN 978-0-387-29826-9 [contents] - 2005
- [j54]Bhavani Thuraisingham:
Directions for security and privacy for semantic e-business applications. Commun. ACM 48(12): 71-73 (2005) - [j53]Bhavani Thuraisingham:
Security standards for the semantic web. Comput. Stand. Interfaces 27(3): 257-268 (2005) - [j52]Bhavani Thuraisingham:
Privacy constraint processing in a privacy-enhanced database management system. Data Knowl. Eng. 55(2): 159-188 (2005) - [j51]Bhavani Thuraisingham:
Privacy-Preserving Data Mining: Development and Directions. J. Database Manag. 16(1): 75-87 (2005) - [c85]Bhavani Thuraisingham:
Trust Management in a Distributed Environment. COMPSAC (1) 2005: 561-562 - [c84]Inja Youn, Csilla Farkas, Bhavani Thuraisingham:
Multilevel Secure Teleconferencing over Public Switched Telephone Network. DBSec 2005: 99-113 - [c83]Guang-Lei Song, Kang Zhang, Bhavani Thuraisingham, Jun Kong:
Secure Model Management Operations for the Web. DBSec 2005: 237-251 - [c82]Guang-Lei Song, Kang Zhang, Bhavani Thuraisingham, Jiannong Cao:
Towards Access Control for Visual Web Model Management. EEE 2005: 722-727 - [c81]Bhavani Thuraisingham, Latifur Khan, Chris Clifton, John A. Maurer, Marion G. Ceruti:
Dependable Real-Time Data Mining. ISORC 2005: 158-165 - [c80]Gal Lavee, Latifur Khan, Bhavani Thuraisingham:
A framework for a video analysis tool for suspicious event detection. MDM@KDD 2005: 79-84 - [c79]Ryan Layfield, Latifur Khan, Bhavani Thuraisingham:
Message correlation in automated communication surveillance through singular value decomposition and word frequency association. MDM@KDD 2005: 85-88 - 2004
- [j50]Bhavani Thuraisingham:
Managing and Mining Multimedia Databases. Int. J. Artif. Intell. Tools 13(3): 739- (2004) - [j49]Bhavani Thuraisingham:
Editorial. J. Intell. Inf. Syst. 23(3): 207-208 (2004) - [j48]Bhavani Thuraisingham:
Secure sensor information management and mining. IEEE Signal Process. Mag. 21(3): 14-19 (2004) - [j47]Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani Thuraisingham, Amar Gupta:
Selective and Authentic Third-Party Distribution of XML Documents. IEEE Trans. Knowl. Data Eng. 16(10): 1263-1278 (2004) - [c78]Barbara Carminati, Elena Ferrari, Bhavani Thuraisingham:
Using RDF for Policy Specification and Enforcement. DEXA Workshops 2004: 163-167 - [c77]Elena Ferrari, Bhavani Thuraisingham:
Security and Privacy for Web Databases and Services. EDBT 2004: 17-28 - [c76]Minos N. Garofalakis, Ioana Manolescu, Marco Mesiti, George A. Mihaila, Ralf Schenkel, Bhavani Thuraisingham, Vasilis Vassalos:
What's Next in XML and Databases? EDBT Workshops 2004: 318-324 - [c75]Bhavani Thuraisingham:
Data mining for security applications. ICMLA 2004: 3-4 - 2003
- [c74]Bhavani Thuraisingham:
Security Issues for the Semantic Web. COMPSAC 2003: 632-637 - [c73]Bhavani Thuraisingham:
Data and Applications Security: Past, Present and the Future. DBSec 2003: 375-390 - [c72]Bhavani Thuraisingham:
Dependable Computing for National Security. ISADS 2003: 333-334 - [c71]Bhavani Thuraisingham:
Data Mining and Cyber Security. QSIC 2003: 2 - [c70]Bhavani Thuraisingham:
Grand Challenges in Data Integrity and Quality: Panel Discussion. IICIS 2003: 249-253 - [c69]Bhavani Thuraisingham:
Dependable Infrastructures and Data Managers for Sensor Networks. WORDS Fall 2003: 11- - 2002
- [j46]Bhavani Thuraisingham, Reind P. van de Riet:
Data and applications security (Guest editorial). Data Knowl. Eng. 43(3): 235-236 (2002) - [j45]Bhavani Thuraisingham:
Data Mining, National Security, Privacy and Civil Liberties. SIGKDD Explor. 4(2): 1-5 (2002) - [c68]Bhavani Thuraisingham, Elena Ferrari:
Web and Information Security: Workshop Summary. COMPSAC 2002: 933 - [c67]Bhavani Thuraisingham:
Data and Applications Security: Developments and Directions. COMPSAC 2002: 963-965 - [c66]David W. Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani Thuraisingham:
Privacy and Civil Liberties. DBSec 2002: 331-346 - [c65]Bhavani Thuraisingham:
Building Secure Survivable Semantic Webs. ICTAI 2002: 395-398 - [c64]Bhavani Thuraisingham:
Secure Multimedia Data Management Research Directions. ISMSE 2002 - [c63]Bhavani Thuraisingham, Eric Hughes, Dock Allen:
Dependable Semantic Web. WORDS 2002: 305-310 - 2001
- [j44]Chris Clifton, Bhavani Thuraisingham:
Emerging standards for data mining. Comput. Stand. Interfaces 23(3): 187-193 (2001) - [j43]Bhavani Thuraisingham:
Security for Distributed Databases. Inf. Secur. Tech. Rep. 6(2): 95-102 (2001) - [j42]Lisa Cingiser DiPippo, Victor Fay Wolfe, Levon Esibov, Gregory Cooper, Ramachandra Bethmangalkar, Russell Johnston, Bhavani Thuraisingham, John A. Maurer:
Scheduling and Priority Mapping for Static Real-Time Middleware. Real Time Syst. 20(2): 155-182 (2001) - [c62]Sylvia L. Osborn, Bhavani Thuraisingham, Pierangela Samarati:
Panel on XML and Security. DBSec 2001: 317-323 - [c61]Bhavani Thuraisingham:
Database Management and the Internet: Developments and Challenges. High-Performance Web Databases 2001: 549-554 - [c60]Bhavani Thuraisingham, Chris Clifton, John A. Maurer, Marion G. Ceruti:
Real-Time Data Mining of Multimedia Objects. ISORC 2001: 360-365 - [c59]Bhavani Thuraisingham, Eric Hughes:
Data quality: developments and directions. IICIS 2001: 97-102 - [c58]Bhavani Thuraisingham, Chris Clifton, Amar Gupta, Elisa Bertino, Elena Ferrari:
Directions for Web and E-Commerce Applications Security. WETICE 2001: 200-204 - [e5]Bhavani Thuraisingham, Reind P. van de Riet, Klaus R. Dittrich, Zahir Tari:
Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000. IFIP Conference Proceedings 201, Kluwer 2001, ISBN 0-7923-7514-9 [contents] - 2000
- [j41]Victor Fay Wolfe, Lisa Cingiser DiPippo, Gregory Cooper, Russell Johnston, Peter Kortmann, Bhavani Thuraisingham:
Real-Time CORBA. IEEE Trans. Parallel Distributed Syst. 11(10): 1073-1089 (2000) - [c57]Bhavani Thuraisingham:
Network and Web Security and E-Commerce and Other Applications. COMPSAC 2000: 131 - [c56]Bhavani M. Thuraisingham, Marion G. Ceruti:
Understanding Data Mining and applying it to Command, Control, Communications and Intelligence Environments. COMPSAC 2000: 171-175 - [c55]Bhavani Thuraisingham:
Web Security and Privacy (Panel). DBSec 2000: 125-126 - [c54]Alfred Grasso, Harry Sleeper, Bhavani M. Thuraisingham, Yike Guo:
Data mining for the e-business: developments and directions. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 2000: 388-392 - [c53]Richard Freedman, John A. Maurer, Steven Wohlever, Bhavani Thuraisingham, Victor Fay Wolfe, Michael Milligan:
Benchmarking Real-Time Distributed Object Management Systems for Evolvable and Adaptable Command and Control Applications. ISORC 2000: 202-205 - [c52]Insup Lee, Mike Jones, Hermann Kopetz, K. H. Kim, Thomas F. Lawrence, Bhavani Thuraisingham:
Fundamental R&D Issues in Real-Time Distributed Computing. ISORC 2000: 215-
1990 – 1999
- 1999
- [j40]Bhavani Thuraisingham:
Web Information Management and its Application to Electronic Commerce. Int. J. Artif. Intell. Tools 8(2): 107-117 (1999) - [j39]Bhavani M. Thuraisingham, John A. Maurer:
Information Survivability for Evolvable and Adaptable Real-Time Command and Control Systems. IEEE Trans. Knowl. Data Eng. 11(1): 228-238 (1999) - [c51]Bhavani Thuraisingham, John A. Maurer:
Adaptable Object Request Brokers for Information Survivability of Evolvable Real-Time Command and Control Systems. FTDCS 1999: 242-245 - [c50]John A. Maurer, Roman Ginis, Richard Freedman, Michael Squadrito, Steven Wohlever, Bhavani Thuraisingham:
Adaptable Real-Time Distributed Object Management for Command and Control Systems. ISADS 1999: 42-57 - [c49]Bhavani Thuraisingham:
Object Technology for Building Adaptable and Evolvable Autonomous Decentralized Systems. ISADS 1999: 89-91 - [c48]Steven Wohlever, Victor Fay Wolfe, Bhavani Thuraisingham, Richard Freedman, John A. Maurer:
CORBA-based Real-time Trader Service for Adaptable Command and Control Systems. ISORC 1999: 64- - [c47]Lisa Cingiser DiPippo, Ethan Hodys, Bhavani Thuraisingham:
Towards a real-time agent architecture-a whitepaper. WORDS (Fall) 1999: 59-64 - [c46]Marion G. Ceruti, Bhavani M. Thuraisingham:
Dependable objects for databases, middleware and methodologies: a position paper. WORDS (Fall) 1999: 75-78 - [c45]Bhavani Thuraisingham:
Workshop summary discussions WORDS 99. WORDS (Jan.) 1999: 262 - 1998
- [c44]Bhavani Thuraisingham:
Panel Overview. COMPSAC 1998: 260-261 - [c43]Bhavani Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier:
Security and Privacy Issues for the World Wide Web: Panel Discussion. DBSec 1998: 269-284 - [c42]Bhavani Thuraisingham, Sandra Heiler, Arnon Rosenthal, Susan Malaika:
Migrating Legacy Databases and Applications (Panel). ICDE 1998: 314 - [c41]Michael Squadrito, Levon Esibov, Lisa Cingiser DiPippo, Victor Fay Wolfe, Gregory Cooper, Bhavani Thuraisingham, Peter C. Krupp, Michael Milligan, Russell Johnston:
Concurrency Control in Real-Time Object-Oriented Systems: The Affected Set Priority Ceiling Protocols. ISORC 1998: 96-105 - 1997
- [j38]Kingsley C. Nwosu, Bhavani Thuraisingham, P. Bruce Berra:
Multimedia Database Systems - A New Frontier (Guest Editors' Introduction). IEEE Multim. 4(3): 21-23 (1997) - [c40]Bhavani Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton:
Security Issues in Data Warehousing and Data Mining: Panel Discussion. DBSec 1997: 3-16 - [c39]Bhavani Thuraisingham:
Issues on real-time object request brokers. ISADS 1997: 339-340 - [c38]Roman Ginis, Eric Hughes, Steven Wohlever, Bhavani Thuraisingham, Peter C. Krupp, John A. Maurer:
Object-Oriented Data Management and Distribution for Real-Time Command and Control Systems. RTDB 1997: 77- - [c37]Eric Hughes, Roman Ginis, Bhavani Thuraisingham, Peter C. Krupp, John A. Maurer:
Data Manager for Evolvable Real-time Command and Control Systems. VLDB 1997: 558-561 - [c36]Mike Gates, Peter C. Krupp, John A. Maurer, Michael Squadrito, Bhavani M. Thuraisingham, Thomas Wheeler:
Object technology for the integration of the infrastructure, data manager, and tracker for command and control applications. WORDS 1997: 117-128 - 1996
- [j37]Donald G. Marks, Peter J. Sell, Bhavani Thuraisingham:
MOMT: A Multilevel Object Modeling Technique for Designing Secure Database Applications. J. Object Oriented Program. 9(4): 22-29 (1996) - [j36]Sang Hyuk Son, Rasikan David, Bhavani Thuraisingham:
Improving Timeliness in Real-Time Secure Database Systems. SIGMOD Rec. 25(1): 29-33 (1996) - [c35]Bhavani Thuraisingham, Eric Hughes, Peter C. Krupp, Gary Gengo, Alice Schafer, Michael Squadrito:
Active real-time database management for command & control applications. DART@CIKM 1996: 73-76 - [c34]Bhavani Thuraisingham:
Security Issues for Data Warehousing and Data Mining. DBSec 1996: 11-20 - [c33]Bhavani Thuraisingham, Arkady Kanevsky, Peter C. Krupp, Alice Schafer, Mike Gates, Thomas Wheeler, Edward H. Bensley, Ruth Ann Sigel, Michael Squadrito:
Evolvable Real-Time C3 Systems-II: Real-Time Infrastructure Requirements. ICECCS 1996: 473-482 - [c32]Bhavani Thuraisingham, Peter C. Krupp, Victor Fay Wolfe:
On real-time extensions to object request brokers: a panel position paper. WORDS 1996: 182-185 - [c31]Edward H. Bensley, Peter C. Krupp, Ruth Ann Sigel, Michael Squadrito, Bhavani Thuraisingham, Thomas Wheeler:
Object-oriented implementation of an infrastructure and data manager for real-time command and control systems. WORDS 1996: 201-209 - [e4]Kingsley C. Nwosu, Bhavani Thuraisingham, P. Bruce Berra:
Multimedia Database Systems: Design and Implementation Strategies. 1996 1996, ISBN 0-7923-9712-6, pp. 1-376 [contents] - [e3]Bhavani Thuraisingham, T. C. Ting:
Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology. IEEE Trans. Knowl. Data Eng. 8(1): 1-2 (1996) - 1995
- [j35]Bhavani Thuraisingham:
Multilevel security for information retrieval systems - II. Inf. Manag. 28(1): 49-61 (1995) - [j34]Bhavani Thuraisingham:
Towards the Design of a Multilevel Secure Object-Oriented Database Management System. J. Object Oriented Program. 8(3): 42-49 (1995) - [j33]P. Bruce Berra, Kingsley C. Nwosu, Bhavani Thuraisingham:
ACM Multimedia '94 Conference Workshop on Multimedia Database Management Systems. SIGMOD Rec. 24(1): 70-72 (1995) - [j32]Arnon Rosenthal, Leonard J. Seligman, Catherine D. McCollum, Barbara T. Blaustein, Bhavani Thuraisingham, Edward Lafferty:
Data Management Research at The MITRE Corporation. SIGMOD Rec. 24(3): 77-82 (1995) - [j31]Bhavani Thuraisingham, William R. Ford:
Security Constraints in a Multilevel Secure Distributed Database Management System. IEEE Trans. Knowl. Data Eng. 7(2): 274-293 (1995) - [c30]Bhavani Thuraisingham:
Application of Object-Oriented Technology for Integrating Heterogeneous Database Systems. ACM Conference on Computer Science 1995: 216-221 - [c29]Sang Hyuk Son, Rasikan David, Bhavani Thuraisingham:
An Adaptive Policy for Improved Timeliness in Secure Database Systems. DBSec 1995: 199-214 - [c28]Tsau Young Lin, Thomas H. Hinke, Donald G. Marks, Bhavani Thuraisingham:
Security and Data Mining. DBSec 1995: 391-399 - [c27]Daniel A. Keim, John Peter Lee, Bhavani Thuraisingham, Craig M. Wittenbrink:
Database Issues for Data Visualization: Supporting Interactive Database Explorartion. Workshop on Database Issues for Data Visualization 1995: 12-25 - [c26]Georges G. Grinstein, Bhavani Thuraisingham:
Data Mining and Data Visualization. Workshop on Database Issues for Data Visualization 1995: 54-56 - [c25]Edward H. Bensley, Lawrence Fisher, Mike Gates, James Houchens, Arkady Kanevsky, Soohee Kim, Peter C. Krupp, Alice Schafer, Bhavani Thuraisingham:
Evolvable real-time C3 systems. ICECCS 1995: 153- - 1994
- [j30]Bhavani Thuraisingham:
Security issues for federated database systems. Comput. Secur. 13(6): 509-525 (1994) - [c24]Harvey Rubinovitz, Bhavani Thuraisingham:
Security Constraint Processing in a Distributed Database Environment. ACM Conference on Computer Science 1994: 356-363 - [c23]Donald G. Marks, Leonard J. Binns, Bhavani Thuraisingham:
Hypersemantic Data Modeling for Inference Analysis. DBSec 1994: 157-180 - [c22]Arnon Rosenthal, James G. Williams, William R. Herndon, Bhavani Thuraisingham:
A Fine-grained Access Control Model for Object-Oriented DBMSs. DBSec 1994: 319-334 - [c21]Shail Arora, Mamdouh Ibrahim, Bhavani Thuraisingham, T. C. Ting:
Object-oriented technology for health care and medical information systems. OOPSLA Addendum 1994: 122-126 - [e2]Bhavani Thuraisingham, Ravi S. Sandhu, T. C. Ting:
Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. Workshops in Computing, Springer 1994, ISBN 3-540-19877-6 [contents] - 1993
- [j29]Bhavani Thuraisingham, William R. Ford, Marie Collins, J. O'Keeffe:
Design and Implementation of a Database Inference Controller. Data Knowl. Eng. 11(3): 271-297 (1993) - [j28]Bhavani Thuraisingham:
Multilevel security for information retrieval systems. Inf. Manag. 24(2): 93-103 (1993) - [j27]Harvey Rubinovitz, Bhavani Thuraisingham:
Simulation of join query processing algorithms for a trusted distributed database management system. Inf. Softw. Technol. 35(5): 287-299 (1993) - [j26]Harvey Rubinovitz, Bhavani Thuraisingham:
Design and implementation of a query processor for a trusted distributed data base management system. J. Syst. Softw. 21(1): 49-69 (1993) - [j25]Bhavani M. Thuraisingham:
System Function Languages. Math. Log. Q. 39: 357-366 (1993) - [j24]Bhavani Thuraisingham, Hai-Ping Ko:
Concurrency Control in Trusted Database Management Systems: A Survey. SIGMOD Rec. 22(4): 52-59 (1993) - [c20]Bhavani Thuraisingham, William R. Ford:
Parallel Processing and Trusted Database Management Systems. ACM Conference on Computer Science 1993: 162-167 - [c19]Bhavani Thuraisingham, Harvey H. Rubinovitz, David Foti, Andres Abreu:
Design and implementation of a distributed database. COMPSAC 1993: 152-158 - [c18]Peter J. Sell, Bhavani Thuraisingham:
Applying OMT for Designing Multilevel Database Applications. DBSec 1993: 41-64 - [c17]Bhavani Thuraisingham:
Workshop Summary. DBSec 1993: 357-362 - [c16]Bhavani Thuraisingham:
Secure computing with the actor paradigm. NSPW 1993: 76-81 - [c15]Bhavani Thuraisingham, Ravi S. Sandhu, T. C. Ting:
Security for Object-Oriented Systems: An Editorial Overview. Security for Object-Oriented Systems 1993: 1-7 - [c14]Bhavani Thuraisingham:
Integrating Object-Oriented Technolgy and Security Technology: A Panel Discussion. OOPSLA 1993: 304 - [c13]Bhavani Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe:
Integrating security technology and object-oriented technology (panel). OOPSLA Addendum 1993: 59-61 - [c12]Bhavani Thuraisingham, Ravi S. Sandhu, T. C. Ting:
Security for object-oriented systems. OOPSLA Addendum 1993: 77-78 - [e1]Bhavani Thuraisingham, Carl E. Landwehr:
Database Security, VI: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992. IFIP Transactions A-21, North-Holland 1993, ISBN 0-444-89889-1 [contents] - 1992
- [j23]Bhavani Thuraisingham, Harvey H. Rubinovitz:
Multilevel security issues in distributed database management systems - III. Comput. Secur. 11(7): 661-674 (1992) - [j22]Bhavani Thuraisingham:
Current Status of R&D in Trusted Database Management Systems. SIGMOD Rec. 21(3): 44-50 (1992) - [c11]Bhavani Thuraisingham:
A Non-monotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge - II. CSFW 1992: 135-146 - 1991
- [j21]Bhavani Thuraisingham:
Multilevel security issues in distributed database management systems II. Comput. Secur. 10(8): 727-747 (1991) - [c10]Marie Collins, William R. Ford, Bhavani Thuraisingham:
Security constraint processing during the update operation in a multilevel secure database management system. ACSAC 1991: 23-32 - [c9]Bhavani Thuraisingham:
A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems. CSFW 1991: 127-138 - [c8]Matthew Morgenstern, Teresa F. Lunt, Bhavani Thuraisingham, David L. Spooner:
Security Issues in Federated Database Systems: Panel Contributions. DBSec 1991: 131-148 - [c7]Bhavani Thuraisingham:
The Use of Conceptual Structures for Handling the Inference Problem. DBSec 1991: 333-362 - 1990
- [j20]Bhavani M. Thuraisingham:
Towards the Design of a Secure Data/Knowledge Base Management System. Data Knowl. Eng. 5: 59-72 (1990) - [j19]Bhavani Thuraisingham:
Computing Transitive Closures of Multilevel Relations. SIGMOD Rec. 19(3): 17-23 (1990) - [j18]Paul D. Stachour, Bhavani Thuraisingham:
Design of LDV: A Multilevel Secure Relational Database Management System. IEEE Trans. Knowl. Data Eng. 2(2): 190-209 (1990) - [c6]Bhavani Thuraisingham, Ammiel Kamon:
Secure query processing in distributed database management systems-design and performance studies. ACSAC 1990: 88-102 - [c5]Bhavani Thuraisingham:
Multilevel Security for Multimedia Database Systems. DBSec 1990: 99-116
1980 – 1989
- 1989
- [j17]D. J. Thomsen, Wei-Tek Tsai, Bhavani M. Thuraisingham:
Prototyping to explore MLS/DBMS design. Comput. Secur. 8(3): 229-245 (1989) - [j16]Thomas F. Keefe, Wei-Tek Tsai, Bhavani M. Thuraisingham:
SODA: A secure object-oriented database system. Comput. Secur. 8(6): 517-533 (1989) - [j15]Bhavani M. Thuraisingham:
A functional view of multilevel databases. Comput. Secur. 8(8): 721-730 (1989) - [j14]Thomas F. Keefe, Bhavani M. Thuraisingham, Wei-Tek Tsai:
Secure Query-Processing Strategies. Computer 22(3): 63-70 (1989) - [j13]Shyh-Kwei Chen, Wei-Tek Tsai, Bhavani M. Thuraisingham:
Recovery Point Selection on a Reverse Binary Tree Task Model. IEEE Trans. Software Eng. 15(8): 963-976 (1989) - [c4]Bhavani M. Thuraisingham:
Secure query processing in intelligent database management systems. ACSAC 1989: 204-214 - [c3]Hany M. Atchan, Rob Bell, Bhavani Thuraisingham:
Knowledge-Based Support for the Development of Database-Centered Applications. ICDE 1989: 394-401 - [c2]Bhavani M. Thuraisingham:
Mandatory Security in Object-Oriented Database Systems. OOPSLA 1989: 203-210 - 1988
- [j12]John McHugh, Bhavani M. Thuraisingham:
Multilevel security issues in distributed database management systems. Comput. Secur. 7(4): 387-396 (1988) - [j11]Bhavani M. Thuraisingham:
Representation of One-One Degrees by n-Cylindrical Decision Problems. Math. Log. Q. 34(6): 481-490 (1988) - [j10]Bhavani M. Thuraisingham, James A. Larson:
AI applications in distributed system design issues. IEEE Netw. 2(6): 52-60 (1988) - [c1]D. J. Thomsen, Wei-Tek Tsai, Bhavani M. Thuraisingham:
Prototyping as a Research Tool for MLS/DBMS. DBSec 1988: 63-84 - 1987
- [j9]Patricia A. Dwyer, George D. Jelatis, Bhavani M. Thuraisingham:
Multilevel Security in Database Management Systems. Comput. Secur. 6(3): 245-251 (1987) - [j8]Bhavani M. Thuraisingham:
Security checking in relational database management systems augmented with inference engines. Comput. Secur. 6(6): 479-492 (1987) - [j7]Bhavani M. Thuraisingham:
Reducibility Relationships Between Decision Problems for System Functions. Math. Log. Q. 33(4): 305-312 (1987) - 1986
- [j6]Bhavani M. Thuraisingham:
The Concept of n-Cylinder and its Application. Math. Log. Q. 32(13-16): 211-219 (1986) - 1984
- [j5]Bhavani M. Thuraisingham:
System Functions and their Decision Problems. Math. Log. Q. 30(7-8): 119-128 (1984) - 1983
- [j4]Bhavani M. Thuraisingham:
Cylindrical decision problems for system functions. Notre Dame J. Formal Log. 24(2): 188-198 (1983) - [j3]Bhavani M. Thuraisingham:
Some elementary closure properties of n-cylinders. Notre Dame J. Formal Log. 24(2): 242-254 (1983) - [j2]Bhavani M. Thuraisingham:
The concept of n-cylinder and its relationship to simple sets. Notre Dame J. Formal Log. 24(3): 328-336 (1983) - 1982
- [j1]Bhavani M. Thuraisingham:
Representation of One-One Degrees by Decision Problems for System Functions. J. Comput. Syst. Sci. 24(3): 373-377 (1982)
Coauthor Index
aka: Latifur R. Khan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-15 02:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint