Management System (Rome Labor<strong>at</strong>ory); Development <strong>of</strong> Engineering Inform<strong>at</strong>ion Systems (WrightLabor<strong>at</strong>ory); Design <strong>of</strong> a Distributed D<strong>at</strong>a Dictionary System (Honeywell’s Residential Control Division);AI Applic<strong>at</strong>ions in Process Control Systems (Honeywell Industrial Autom<strong>at</strong>ion Systems Division);Design <strong>of</strong> a Network Oper<strong>at</strong>ing System for a Multicomp<strong>at</strong>ible Network Interface Unit (NASA);Development <strong>of</strong> a Pay<strong>of</strong>f Model <strong>of</strong> Altern<strong>at</strong>ive Communic<strong>at</strong>ion Str<strong>at</strong>egies (Honeywell Corpor<strong>at</strong>e); Design<strong>of</strong> Innov<strong>at</strong>ive S<strong>of</strong>tware Architectures for Industrial and Buildings Control Systems (Honeywell BuildingControls Systems); and Design <strong>of</strong> Knowledge Transform<strong>at</strong>ion Str<strong>at</strong>egies (Honeywell IndustrialAutom<strong>at</strong>ion Systems Division).IV. Control D<strong>at</strong>a Corpor<strong>at</strong>ion, Arden Hills, MN (December 1983 - January 1986)http://en.wikipedia.org/wiki/Control_D<strong>at</strong>a_Corpor<strong>at</strong>ionPosition: Senior Programmer/Analyst, Arden Hills Programming DivisionI was involved in the design and development <strong>of</strong> the CDCNET (Control D<strong>at</strong>a Communic<strong>at</strong>ions Network)product. Company proprietary documents were also written. Specifically, I was responsible for thefollowing: design, development and testing <strong>of</strong> CDCNET Transport layer (Generic and Xerox transportprotocols); design, development and testing <strong>of</strong> the first version <strong>of</strong> the CDCNET session layer, whichenabled the ASYNC Terminal Interface Program to communic<strong>at</strong>e with the Cyber 170 G<strong>at</strong>eway; design,development and testing <strong>of</strong> X25 support for CDCNET, which would enable CDCNET to communic<strong>at</strong>ewith an X25 Network; development and testing <strong>of</strong> CDCNET Network Layer; implement<strong>at</strong>ion <strong>of</strong> theIntranetwork layer, which supported HDLC, Ethernet and MCI Networks; design, and development andtesting <strong>of</strong> a set <strong>of</strong> command processors (transport St<strong>at</strong>us command processor), which g<strong>at</strong>hered inform<strong>at</strong>ionabout the Transport connections, and also a set <strong>of</strong> command processors to configure an MCI network;development and testing <strong>of</strong> CDCNET memory management unit, which was responsible for releasing thebuffers depending on the congestion; acting as the Task Lead for testing CDCNET with other Cyberproducts. (Official start d<strong>at</strong>e <strong>of</strong> January 1984; consulted in December 1983)V. Bhavani Security Consulting (June 2005 – Present) www.dr-bhavani.orgI am the founding president <strong>of</strong> Bhavani Security Consulting, a consulting and training company. I consultfor the Department <strong>of</strong> Treasury through a contract from the MITRE Corpor<strong>at</strong>ion on corpor<strong>at</strong>e researchcredit as well as being an expert witness in s<strong>of</strong>tware. I also handle p<strong>at</strong>ent litig<strong>at</strong>ion cases as an expertwitness. I teach AFCEA (Armed Forces Communic<strong>at</strong>ions and Electronics Associ<strong>at</strong>ion) courses in d<strong>at</strong>amanagement, d<strong>at</strong>a mining for counter-terrorism and d<strong>at</strong>a security. Through AFCEA, I teach classes <strong>at</strong> AirForce bases including Offutt, Eglin, Lackland, Edwards and Kirkland. I consult for corpor<strong>at</strong>ions intechnology futures and write books on d<strong>at</strong>a management and d<strong>at</strong>a security.VI. Knowledge and Security Analytics, LLC (UTD spin-<strong>of</strong>f)http://www.knowledge-security.com/home.htmlA spin-<strong>of</strong>f company was established in August 2010 based on UT <strong>Dallas</strong> research, focusing on d<strong>at</strong>asecurity, geosp<strong>at</strong>ial d<strong>at</strong>a management, d<strong>at</strong>a mining and social networking. Partners: Dr. L<strong>at</strong>ifur Khan andDr. Mur<strong>at</strong> Kantarcioglu.VII. Evolving Malware Security, LLC (UTD Spin-<strong>of</strong>f)www.evolvingmalwaresecurity.comA second spin<strong>of</strong>f company was established in September 2011 to commercialize our malware products.Dr. L<strong>at</strong>ifur Khan is the main technical lead for this company.VII. Personal Tutors, England (1979-1980)http://www.personal-tutors.co.uk/home.htmlTaught high school students M<strong>at</strong>hem<strong>at</strong>ics and prepared them for GCE OL and GCE AL exams.Section 7: TEACHING EXPERIENCEI. Academic Teaching Experience (1980 – Present)22
Current (2004 – Present)<strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>Position: Pr<strong>of</strong>essor <strong>of</strong> Computer Science and Director <strong>of</strong> Cyber Security Research Center D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Spring 2005, Spring 2006, Spring 2007, Spring 2008, Spring2009, Fall 2009, Fall 2010, Fall 2011 (based on my book D<strong>at</strong>abase and Applic<strong>at</strong>ions Security:Integr<strong>at</strong>ing D<strong>at</strong>a Management and Inform<strong>at</strong>ion Security, CRC Press/Auerbach, June 2005)Gradu<strong>at</strong>e level Biometrics, Fall 2005, Gradu<strong>at</strong>e level Building Trustworthy Semantic Webs, Fall 2006, Fall 2008, Spring 2010, Spring 2011 (based onmy book Building Trustworthy Semantic Webs, CRC Press, 2007) Ph.D. level D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Spring 2007, Spring 2008, Spring 2011 (Inform<strong>at</strong>ion Assurance,Minor Core course) Undergradu<strong>at</strong>e level Digital Forensics, Fall 2007, Fall 2008, Fall 2009, Fall 2010, Fall 2011 (Inform<strong>at</strong>ion AssuranceMinor, Core course) Undergradu<strong>at</strong>e level Inform<strong>at</strong>ion and Security Analytics, (based on CISSP 10 Domains) Summer 2010, Summer 2011 Inform<strong>at</strong>ion Assurance, Minor: D<strong>at</strong>a and Applic<strong>at</strong>ions Security, as well as Digital Forensics, aretwo <strong>of</strong> the three mand<strong>at</strong>ory security courses for a minor in Inform<strong>at</strong>ion Assurance <strong>at</strong> theUndergradu<strong>at</strong>e level. Students work with ENCASE tool and conduct forensics analysis. Inform<strong>at</strong>ion Assurance Masters TrackPrevious (1980 – 2001)(i) New Mexico Institute <strong>of</strong> Technology, Socorro, New MexicoPosition: Visiting Pr<strong>of</strong>essor 1980 – 1981Dept. Head: Pr<strong>of</strong>. Tom Nartker (now <strong>at</strong> UNLV)1. Department <strong>of</strong> Computer Science<strong>The</strong>ory <strong>of</strong> Comput<strong>at</strong>ionPh.D. level course on theory <strong>of</strong> comput<strong>at</strong>ion covering topics such as autom<strong>at</strong>a theory, complexitytheory and recursion theory, using the text book <strong>The</strong>ory <strong>of</strong> Comput<strong>at</strong>ion by Barinard andLandweberD<strong>at</strong>e: Fall Semester 1980 (August – December 1980)M<strong>at</strong>hem<strong>at</strong>ical Logic for Computer ScientistsSenior undergradu<strong>at</strong>e/ 1 st yr MS level course covering logic, theorem proving. Developed my ownlecture notes. References used: <strong>The</strong>orem Proving by Chang and Lee, M<strong>at</strong>hem<strong>at</strong>ical Logic by E.MendelssohnD<strong>at</strong>e: Spring Semester 1981 (January – May 19812. Department <strong>of</strong> M<strong>at</strong>hem<strong>at</strong>icsCalculusUndergradu<strong>at</strong>e level course in calculusD<strong>at</strong>e: Spring Semester, 1981 (January – May 1981)(ii ) <strong>University</strong> <strong>of</strong> MinnesotaPosition: Visiting Pr<strong>of</strong>essor, 1981 – 1982Adjunct Pr<strong>of</strong>essor and Member <strong>of</strong> the Gradu<strong>at</strong>e Faculty, September 1984 – December 1988Schedule Coordin<strong>at</strong>or: Pr<strong>of</strong>. Sartaj Sahni (now <strong>at</strong> <strong>University</strong> <strong>of</strong> Florida)1. Department <strong>of</strong> Computer ScienceFortran ProgrammingUndergradu<strong>at</strong>e course in FORTRAN programming23
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21: management to discuss projects as w
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74:
14. Concurrency Control in Real-tim
- Page 75 and 76:
17. Data Management Systems Evoluti
- Page 77 and 78:
54. Data Mining for National Securi
- Page 79 and 80:
5. Recent Developments in Some Trus
- Page 81 and 82:
44. Data Engineering Directions, IE
- Page 83 and 84:
6. Towards a Global Multilevel Data
- Page 85 and 86:
19. Object Technology for C4I Appli
- Page 87 and 88:
59. Assured Cloud Computing, AFOSR
- Page 89 and 90:
2. A Seminar on Secure Database Sys
- Page 91 and 92:
VIII. The University of Texas at Da
- Page 93 and 94:
5. Secure Distributed Query Process
- Page 95 and 96:
Simulated algorithms for informatio
- Page 97 and 98:
1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH