10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

We also have additional papers accepted/published in prestigious conferences including IEEE ICDM andECML/PKDD. Together with our colleagues <strong>at</strong> the <strong>University</strong> <strong>of</strong> Illinois, we have applied for a p<strong>at</strong>ent onthe Novel Class Detection System with <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> as the primary inventor. Wehave assembled all <strong>of</strong> the work described in Papers 1 - 3 as well as our additional papers on this topic andhave written a book titled D<strong>at</strong>a Mining Tools for Malware Detection (to be published l<strong>at</strong>er in the year).1. A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering,VLDB Journal, Vol. 16, 2007 (co-authors: M. Awad, L. Khan). Co-AuthorMy Contribution: Pr<strong>of</strong>. Khan and his student Mr. Awad carried out the design andimplement<strong>at</strong>ion. I gave comments and wrote much <strong>of</strong> the paper from the thesis.2. A Hybrid Model to Detect Malicious Executables, Proceedings IEEE Intern<strong>at</strong>ional Conference onCommunic<strong>at</strong>ion (ICC 2007) (co-authors: M. Masud, L. Khan). Co-AuthorMy Contribution: This was a team effort. Pr<strong>of</strong>. Khan and I supervised the student (Mr. Masud).<strong>The</strong> student carried out the detailed design and implement<strong>at</strong>ion. <strong>The</strong> paper was written by thestudent and I gave comments.3. A Scalable Multi-level Fe<strong>at</strong>ure Extraction Technique to Detect Malicious Executables,Inform<strong>at</strong>ion Systems Frontiers, Vol. 10, No. 1, p.33-45, March 2008 (co-authors: M. Masud, L.Khan). Co-AuthorMy Contribution: This was a team effort. Pr<strong>of</strong>. Khan and I supervised the student (Mr. Masud).<strong>The</strong> student carried out the detailed design and implement<strong>at</strong>ion. <strong>The</strong> paper was written by thestudent and I gave comments.4. A Practical Approach to Classify Evolving D<strong>at</strong>a Streams: Training with Limited Amount <strong>of</strong>Labeled D<strong>at</strong>a, Proceedings Intern<strong>at</strong>ional Conference on D<strong>at</strong>a Mining (ICDM 2008) (co-authors:M. Masud, J. Gao, L. Kahn, J. Han). Co-AuthorMy Contribution: This was a team effort between <strong>The</strong> <strong>University</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> and the<strong>University</strong> <strong>of</strong> Illinois <strong>at</strong> Urbana Champaign. Pr<strong>of</strong>. Khan and I supervised the student (Mr. Masud).<strong>The</strong> student carried out the detailed design and implement<strong>at</strong>ion. <strong>The</strong> paper was mainly written bythe student and I gave comments.5. Classific<strong>at</strong>ion and Novel Class Detection in Concept-Drifting D<strong>at</strong>a Streams under TimeConstraints, IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering, , Vol. 23, No. 6, p. 859 –874, June 2011 (co-authors: M. Masud, J. Gao, L. Khan, J. Han). Co-AuthorMy Contribution: This was a team effort between <strong>The</strong> <strong>University</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> and the<strong>University</strong> <strong>of</strong> Illinois <strong>at</strong> Urbana Champaign. Pr<strong>of</strong>. Khan and I supervised the student (Mr. Masud).<strong>The</strong> student carried out the detailed design and implement<strong>at</strong>ion. <strong>The</strong> paper was mainly written bythe student and I gave comments.6. Exploiting an Antivirus Interface, Computer Standards and Interface Journal, Vol. 31,No.6, 2009 (co-authors: K. Hamlen, V. Mohan, M. Masud, L. Khan). Co-AuthorMy Contribution: I conceived the idea. This was a team effort between Pr<strong>of</strong>. Hamlen, Pr<strong>of</strong>. Khan,myself and our students, Mr. Masud and Mr. Mohan. <strong>The</strong> students carried out the detailed designand implement<strong>at</strong>ion. <strong>The</strong> paper was mainly written by Pr<strong>of</strong>. Hamlen and I gave comments.17.6 CONCLUSIONIn this section, I have presented a sample <strong>of</strong> my papers and described my research contributions in securedependable d<strong>at</strong>a management. Section 17.1 provided a sample <strong>of</strong> my papers in multilevel secure d<strong>at</strong>amanagement. Section 17.2 provided a sample <strong>of</strong> my papers in dependable d<strong>at</strong>a management. Section 17.3provided a sample <strong>of</strong> my papers in semantic web, web services security and Section 17.4 provided asample <strong>of</strong> my papers in d<strong>at</strong>a mining for malware detection. My research is continuing in these areas aswell as in additional areas. Below I provide an overview.110

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!