10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

9. A Semantic Web Based Framework for Social Network Access Control, Proceedings <strong>of</strong> ACMSymposium on Access Control Models and Technologies (SACMAT 2009), p. 177-186, (coauthors:B. Carmin<strong>at</strong>i, E. Ferrari, R. He<strong>at</strong>herly, M Kantarcioglu). Co-AuthorMy Contribution: I conceived the idea. Much <strong>of</strong> the design was carried out by Pr<strong>of</strong>. Kantarciogluand Pr<strong>of</strong>. Carmin<strong>at</strong>i. <strong>The</strong> student (Mr. He<strong>at</strong>herly) carried out the implement<strong>at</strong>ion. <strong>The</strong> paper waswritten by all.10. <strong>The</strong> SCIFC Model for Inform<strong>at</strong>ion Flow Control in Web Service Composition, ProceedingsIEEE Intern<strong>at</strong>ional Conference on Web Services (ICWS 2009) (co-authors: W. She, I. Yen,E. Bertino). Co-AuthorMy Contribution: I conceived the initial ideas. Our student carried out the detailed designand implement<strong>at</strong>ion. Much <strong>of</strong> the paper was written by Pr<strong>of</strong>. Yen.11. Security Issues for Cloud Computing, Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy,Vol. 4, No. 2, 2010, p. 36 – 48 (co-authors: K. Hamlen, L. Khan, M. Kantarcioglu). Lead AuthorMy Contribution: I conceived the ideas and the high level design. My colleagues contributed todetails <strong>of</strong> the design. I wrote the paper.17.5 DATA MINING FOR MALWARE DETECTIONI gave several keynote present<strong>at</strong>ions on D<strong>at</strong>a Mining, Security, Privacy and Civil Liberties starting in1996 and wrote a position paper while <strong>at</strong> NSF th<strong>at</strong> resulted in significant emphasis on privacy research.However, I also continued with d<strong>at</strong>a mining for security applic<strong>at</strong>ions research both for n<strong>at</strong>ional securityand cyber security. When I joined <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, I collabor<strong>at</strong>ed with a pr<strong>of</strong>essor andstudents and together we designed and developed a number <strong>of</strong> d<strong>at</strong>a mining algorithms for malwaredetection. We have also developed a d<strong>at</strong>a mining toolkit based on our algorithm.D<strong>at</strong>a Mining for Intrusion Detection: Our initial focus was on applying d<strong>at</strong>a mining for intrusiondetection. We applied various d<strong>at</strong>a mining techniques based on Support Vector Machines (SVM) as wellas developed a novel technique called dynamical growing self-organizing tree (DGSOT) and comparedthe results to the work <strong>of</strong> others. This research was published in Paper #1 th<strong>at</strong> appeared in the prestigiousVery Large D<strong>at</strong>abase Journal. We also included this paper as part <strong>of</strong> a book th<strong>at</strong> we published in 2009 onthe Design and Implement<strong>at</strong>ion <strong>of</strong> D<strong>at</strong>a Mining Tools.D<strong>at</strong>a Mining for Malware Detection: We then started a focused research program on d<strong>at</strong>a miningapplic<strong>at</strong>ions in cyber security funded by the Air Force. In Paper #2 (ICC), we developed a hybrid modelth<strong>at</strong> examined both byte code and assembly code for detecting malicious code. This was a novel approach<strong>at</strong> th<strong>at</strong> time. <strong>The</strong>n in Paper #3 (Inform<strong>at</strong>ion Systems Frontiers), we developed scalable solutions to fe<strong>at</strong>ureextraction for detecting buffer overflow as well as malicious executables.Stream Mining for Fault Detection: <strong>The</strong> research for the last two papers are jointly carried out with the<strong>University</strong> <strong>of</strong> Illinois <strong>at</strong> Urbana Champaign and funded by NASA. Here our goal was to develop d<strong>at</strong>amining techniques for fault detection. D<strong>at</strong>a is eman<strong>at</strong>ing from multiple sources in the form <strong>of</strong> streams. Wehave developed novel stream mining techniques for classifying d<strong>at</strong>a streams. Our approach is based onexamining multiple and hierarchical chunks <strong>of</strong> d<strong>at</strong>a. <strong>The</strong> results are published in Paper #4 (ICDM).However, with our previous approach, new faults cannot be detected. <strong>The</strong>refore, we have come up with abreakthrough technique where novel classes can be detected with high accuracy. This result is publishedin Paper #5 (IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering).Active Defense: <strong>The</strong> results in Papers #2 and #3 focus on defensive detection mechanisms. <strong>The</strong> challengewe face now is th<strong>at</strong> the malicious code will change its p<strong>at</strong>terns, thereby making it very difficult to detect.<strong>The</strong>refore, we have developed a breakthrough approach to be able to detect the malicious code before thevirus is detected. Our results are published in Paper #6 (Computer Standards and Interface Journal).109

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!