Section 20: MEDIA REPORTSTelevision InterviewsHow Technology Tracks Most Of Wh<strong>at</strong> You Dohttp://www.the33tv.com/about/st<strong>at</strong>ion/newsteam/kdaf-how-technology-tracks-much-<strong>of</strong>wh<strong>at</strong>-you-do-20111109,0,7814325.storyFacebook Privacyhttp://www.the33tv.com/news/kdaf-facebook-privacy-story,0,5566137.storyCyber Securityhttp://www.the33tv.com/news/kdaf-jim-cyber-czar-story,0,571554.storyExternal ArticlesThuraisingham receives IEEE Computer Society’s 1997 Technical Achievement Award;IEEE Computer Magazine, October 1997http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=625320Managing the Web, Silicon India, May 2002 (on Leading Seven Technology Innov<strong>at</strong>ors <strong>of</strong>South Asian Origin in USA)http://www.siliconindia.com/magazine/articledesc.php?articleid=HPK497612166&errid=7Security Be<strong>at</strong>, N<strong>at</strong>ional Defense Magazine, 2004http://www.n<strong>at</strong>ionaldefensemagazine.org/archive/2004/July/Pages/Security_Be<strong>at</strong>3512.aspxTaking a Byte out <strong>of</strong> Cyber Crime, <strong>Dallas</strong> Morning News, Sunday Edition, February 26,2005Dr. Bhavani Thuraisingham, AFCEA-PDC Instructor Pr<strong>of</strong>ile, SIGNAL Magazine,February 2005<strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, Faculty pr<strong>of</strong>ile, June 2005, December 2005http://www.utdallas.edu/pr<strong>of</strong>iles/thuraisingham.html<strong>The</strong> Terrorist Hunter, D-Magazine, July 2005 (Monthly Magazine for DFW)http://www.dmagazine.com/Home/2005/07/01/Pulse.aspx?p=1Cyber Security, DFW Metroplex Technology Magazine, January 2006Lonely <strong>at</strong> the Top, <strong>Dallas</strong> Morning News Educ<strong>at</strong>ion Supplement, February 22, 2006<strong>The</strong> Semantic Web, Deep in the Heart <strong>of</strong> <strong>Texas</strong>, Semanticweb.com, November 19, 2008http://semanticweb.com/the-semantic-web-deep-in-the-heart-<strong>of</strong>-texas_b195Air Safety D<strong>at</strong>a Mining Research Ongoing (Avi<strong>at</strong>ion Safety Week), July 14, 2008122
http://findarticles.com/p/articles/mi_m0UBT/is_27_22/ai_n27916054/Seminar <strong>at</strong> Purdue <strong>University</strong>, Video Present<strong>at</strong>ionhttp://www.cerias.purdue.edu/news_and_events/events/security_seminar/flash.php?uid=ckjq5ef1oaga6g2kquu42f7350@google.comAFOSR-Funded Initi<strong>at</strong>ive Cre<strong>at</strong>es More Secure Environment for Cloud Computinghttp://www.wpafb.af.mil/news/story.asp?id=123209377Raytheon Enters New Arena, <strong>Dallas</strong> Business Journal, October 22, 2010http://www.bizjournals.com/dallas/print-edition/2010/10/22/raytheon-enters-newarena.htmlMTBC Supports Cloud Computing Trend With New Special Interest Grouphttp://www.metroplextbc.org/index.php?src=news&refno=56&c<strong>at</strong>egory=L<strong>at</strong>est%20NewsMassacre Forces New Look <strong>at</strong> Security in Europehttp://news.yahoo.com/massacre-forces-look-security-europe-102740973.htmlAccuvant Launches Advisory Boardhttp://www.reuters.com/article/2011/09/13/idUS195401+13-Sep-2011+BW20110913$$517704580Cyber Center Joins D<strong>at</strong>a Security Efforthttp://www.insideindianabusiness.com/newsitem.asp?ID=51155UT <strong>Dallas</strong> Press ReleasesNSF Grant Funds Search for Ways to Ensure D<strong>at</strong>a Authenticityhttp://www.utdallas.edu/news/2011/12/12-14651_NSF-Grant-Funds-Search-for-Ways-to-Ensure-D<strong>at</strong>a-Aut_article-wide.htmlResearcher Seeks Ways to Keep Old D<strong>at</strong>a Securehttp://www.utdallas.edu/news/2011/11/14-14021_Researcher-Seeks-Ways-to-Keep-Old-D<strong>at</strong>a-Secure_article.htmlNSF Funds Search for New Computer Virus Defensehttp://www.utdallas.edu/news/2011/8/29-12341_NSF-Funds-Search-for-New-Computer-Virus-Defense_article.htmlComputer Scientist Receives Prestigious Degree from <strong>University</strong> <strong>of</strong> Bristolhttp://ecs.utdallas.edu/news-events/news/thuraisingham-degree.html123
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36:
3. CIA: As manager of fifteen resea
- Page 37 and 38:
15. Multilevel Security Issues in D
- Page 39 and 40:
48. E-Mail Worm Detection Using Dat
- Page 41 and 42:
79. Information Demands Drive Data
- Page 43 and 44:
2. Foundations of Multilevel Databa
- Page 45 and 46:
32. Parallel Processing and Trusted
- Page 47 and 48:
66. Privacy Preserving Data Mining,
- Page 49 and 50:
99. Data Mining for Cyber Security
- Page 51 and 52:
130. Object-oriented Implementation
- Page 53 and 54:
161. XIMKON- An Expert Simulation a
- Page 55 and 56:
194. Ontology Alignment Using Multi
- Page 57 and 58:
225. RETRO: A Framework for Semanti
- Page 59 and 60:
5. Inference Problem in Database Se
- Page 61 and 62:
I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64:
12. Proceedings ISI Conference, IEE
- Page 65 and 66:
Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68:
UTDCS-32-08A Practical Approach to
- Page 69 and 70:
UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH