D<strong>at</strong>e: Fall Quarter 1984, Winter 1985, Spring 1985, Fall 1985, Winter 1986, Spring 1986, Fall1986, Winter 1987, Spring 1987, Summer I and II 1987, Fall 1987, Winter 1988, Spring 1988,Summer I and II 1988Basic and Advanced Assembly Language ProgrammingJunior and senior undergradu<strong>at</strong>e as well as 1 st year MS level course in M68000 programmingD<strong>at</strong>e: Fall 1985, Winter 1986, Spring 1986, Fall 1986Algorithms and D<strong>at</strong>a StructuresJunior undergradu<strong>at</strong>e course in algorithmsD<strong>at</strong>e: Winter 1987, Winter 1988Programming Languages using SchemeJunior undergradu<strong>at</strong>e course in Scheme programming and principlesD<strong>at</strong>e: Spring 1987, Spring 1988Discrete Structure <strong>of</strong> Computer ScienceJunior undergradu<strong>at</strong>e course in Combin<strong>at</strong>orial m<strong>at</strong>hem<strong>at</strong>ics for computer scientistsD<strong>at</strong>e: Summer I, 1986Principles <strong>of</strong> Programming LanguagesSenior undergradu<strong>at</strong>e/1 st year MS level course on principles <strong>of</strong> programming languages includingprinciples <strong>of</strong> FORTRAN, Pascal, Algal, Lisp, Prolog, and SmalltalkD<strong>at</strong>abase Security, Ph.D. level seminar; D<strong>at</strong>e: Fall 19872. Department <strong>of</strong> M<strong>at</strong>hem<strong>at</strong>icsCalculus and AlgebraUndergradu<strong>at</strong>e level courses on calculus and algebraD<strong>at</strong>e: Fall 1981, Winter 1982, Spring 1982, Spring 1985, Fall 1985, Winter 1986(iii) Boston <strong>University</strong>Position: Adjunct Pr<strong>of</strong>essor <strong>of</strong> Computer Science, 1999 – 2001Point <strong>of</strong> Contact: Linda Goldberg1. Department <strong>of</strong> Computer ScienceAdvanced D<strong>at</strong>a ManagementGradu<strong>at</strong>e level course which covered rel<strong>at</strong>ional d<strong>at</strong>abases, object d<strong>at</strong>abases, distributed d<strong>at</strong>abasesheterogeneous d<strong>at</strong>abases, migr<strong>at</strong>ing legacy d<strong>at</strong>abases, d<strong>at</strong>a mining, d<strong>at</strong>a warehousing, webd<strong>at</strong>abases.Based on my two books D<strong>at</strong>a Management System Evolution and Interoper<strong>at</strong>ion, CRC Press,May 1997, and D<strong>at</strong>a Mining, Technologies, Techniques, Tools and Trends, CRC Press, December1998D<strong>at</strong>e: Spring Semester 2000, Spring Semester 2001.II. Pr<strong>of</strong>essional Teaching Experience (1990 – Present)(i) <strong>The</strong> MITRE Institute (1990 – 2000)Position: InstructorSchedule Coordin<strong>at</strong>or: Phil TrudeauCourses taught:D<strong>at</strong>abase Security (Four two hour lectures, 1990)Introduction to D<strong>at</strong>abases (3 hour, 10 week course, 1992, 1993)Heterogeneous D<strong>at</strong>abase Integr<strong>at</strong>ion (1 day course taught several times in 1993 – 1994)24
Object D<strong>at</strong>abases (1 day course taught several times in 1993 – 1994)Real-time D<strong>at</strong>abases (1 day course taught several times in 1994)D<strong>at</strong>a Management Systems Evolution and Interoper<strong>at</strong>ion (2 day course taught several times in1997 -1999), based on my bookD<strong>at</strong>a Mining (1 day course taught several times in 1998 – 2000), based on my bookThrough the MITRE Corpor<strong>at</strong>ion, I taught courses to several government agencies(1992 – 2000)Topics: secure d<strong>at</strong>abases, d<strong>at</strong>a management and d<strong>at</strong>a mining (based on my books)US Government (DoD and Intelligence)Agencies: Air Force (ESC, AIA, SPACECOM), Navy (SPAWAR, NRaD), Army (CECOM),Other: DISA, DISA/JPO, NSA, EUCOM(ii) AFCEA Pr<strong>of</strong>essional Development Center (1998 – Present)Position: Instructor (helps in developing contacts with the DoD)Schedule Coordin<strong>at</strong>or: Ann BeckhamCourses Taught (all courses based on my books – see public<strong>at</strong>ions)D<strong>at</strong>a Management (3 day course in September 1998, June 1999)D<strong>at</strong>a Management, D<strong>at</strong>a Mining and E-Commerce (3 day course in October 2000)D<strong>at</strong>a Management, Inform<strong>at</strong>ion Management and Knowledge Management (3 day course inOctober 2001, October 2002, October 2003, September 2004, October 2005)D<strong>at</strong>a Mining (3 day course in June 2003, December 2003, December 2004, March 2006,December 2006, November 2007, May 2008, November 2008)Knowledge Management through Semantic Web and Social Network (April 2008, October 2009,April 2010, October 2010)D<strong>at</strong>a Mining for Counter-terrorism (3 day course, June 2010)D<strong>at</strong>a Management, Inform<strong>at</strong>ion Management and Knowledge Management: to the Air Forcethrough AFCEA (3 day course)Offutt AFB, October 2004Eglin AFB, March 2005Lackland AFB, August 2006Edwards AFB, June 2006Kirkland AFB, September 2006(iii) <strong>University</strong> <strong>of</strong> California, San Diego (2008)Security for Service Oriented Architecture portion <strong>of</strong> the Certific<strong>at</strong>e Course on Systems Engineering,<strong>of</strong>fered <strong>at</strong> UCSD under the directorship <strong>of</strong> Pr<strong>of</strong>. Hal Sorenson. This course was also taught as part <strong>of</strong> theArchitecture course <strong>at</strong> AFCEA under the directorship <strong>of</strong> Pr<strong>of</strong>. Alex Levis.(iv) <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>Cyber Security Certific<strong>at</strong>e Course, Planned in 2012 (Course utilizing Shon Harris’ CISSP Trainingbook). Students will learn the 10 CISSP domains.NSF Scholarship for Service (SFS) Award 2010 - 2013In January 2010, I worked with my colleagues and submitted a proposal to the NSF SFS Program whichwas subsequently awarded. I visited several universities (e.g., NYU Poly, Mississippi St<strong>at</strong>e and<strong>University</strong> <strong>of</strong> Tulsa) to learn from their successful experiences to put together this proposal.25
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23: Current (2004 - Present)The Univers
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76:
17. Data Management Systems Evoluti
- Page 77 and 78:
54. Data Mining for National Securi
- Page 79 and 80:
5. Recent Developments in Some Trus
- Page 81 and 82:
44. Data Engineering Directions, IE
- Page 83 and 84:
6. Towards a Global Multilevel Data
- Page 85 and 86:
19. Object Technology for C4I Appli
- Page 87 and 88:
59. Assured Cloud Computing, AFOSR
- Page 89 and 90:
2. A Seminar on Secure Database Sys
- Page 91 and 92:
VIII. The University of Texas at Da
- Page 93 and 94:
5. Secure Distributed Query Process
- Page 95 and 96:
Simulated algorithms for informatio
- Page 97 and 98:
1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH