Mehedy Masud, Stream Mining, Defended <strong>The</strong>sis, October 2009S<strong>at</strong>yen Abrol, 2009 – PresentSunitha Ramanujam Toward an Integr<strong>at</strong>ed Semantic Web Interoperability Between D<strong>at</strong>a Models(completed December 2011)James McGlothlin, Efficient Semantic Web Knowledge Management (completed December 2011)Non-<strong>The</strong>sis MS Students (supported as Students Workers/RAs; with research papers):Parveen Pallabi (2005 – 2006) Face Recognition, RFID, Gradu<strong>at</strong>ed, <strong>Texas</strong> InstrumentsAlam Ashraful (2006) Secure Geosp<strong>at</strong>ial D<strong>at</strong>a Management, Gradu<strong>at</strong>ed, AT&TSai Ch<strong>at</strong>anya (2006) Privacy Preserving SurveillanceDilshad Cavus (2006) D<strong>at</strong>a Mining for Assured Inform<strong>at</strong>ion SharingAmy Tan (2007) Mining Massive D<strong>at</strong>a SetsRamaya N<strong>at</strong>arajan (2007) Secure Motion ManagementJyothsna Rachapalli (2008 – 2009) Semantic WebGreg Hellings (2009) Geosp<strong>at</strong>ial D<strong>at</strong>a ManagementClay Woolam (2009) D<strong>at</strong>a MiningOther non-<strong>The</strong>sis MS Students on IARPA Project:Geosp<strong>at</strong>ial Proximity Team (2008 – 2009)Aniruddh Bajirao, Siddharth Manu, Laveesh BansalLucene & Hadoop Model Team (2008 – 2009)Phillip White, Abhishek Shanbhag, John George, Julie RauerSPARQL over Hadoop Team (2008 – 2009)Asif MohammedVariable Ontology Team (2008 – 2009)Mohit Pawar, Vijay Bahirji, Gaurav Kumar, Nilesh Singhania, Abhilash Kannan, Sandip GaikwadSemantic Support and S<strong>of</strong>tware Pr<strong>of</strong>essionaliz<strong>at</strong>ion Team ( 2008 – 2010)Pralabh Kumar, Shar<strong>at</strong>h Jagann<strong>at</strong>hCVE/NVD on Blackbook (Collabor<strong>at</strong>ion with NIST on the NVD Project) (2008 – 2009)Aniruddh BajiraoPost-Doctoral Research Associ<strong>at</strong>es:Dr. Mamoun Awad (February 2006 – August 2006) Assured Inform<strong>at</strong>ion Sharing, Ph.D. UT <strong>Dallas</strong>(currently Associ<strong>at</strong>e Pr<strong>of</strong>essor U <strong>of</strong> UAE)Dr. Chuan Li (September 2006 – December 2006) Geosp<strong>at</strong>ial D<strong>at</strong>a Mining, Ph.D. UT <strong>Dallas</strong> (JoinedBrown <strong>University</strong> as Post Doctoral Research Associ<strong>at</strong>e)Dr. Ebru Celikel (June 2006 – June 2007) Risk-based Access Control, Ph.D. Turkey (Senior Lecturer,UNT)Dr. Greg Lee (August 2007 – July 2009) Surgical/Secure Robots, Ph.D. <strong>University</strong> <strong>of</strong> Washington (Asst,Pr<strong>of</strong>. Case Western)Dr. Mehedy Masud (March 2010 –December 2011) Malware Detection, Ph.D. UT <strong>Dallas</strong> (Joining as Asst.Pr<strong>of</strong>. U <strong>of</strong> UAE)Research Scientist:Irina Sakharova (2010 – Present) Tracking Terrorist FinancingDr. Yan Zhou (2010 – Present) D<strong>at</strong>a Security and Privacy, Ph.D. Washington <strong>University</strong>, St. LouisDr. Tyrone Cadenhead (2011 – Present) D<strong>at</strong>a Provenance and Assured Cloud Computing, Ph.D., UT<strong>Dallas</strong>Visiting Scholar:Dr. Jan Kallberg (2011-Present), Social and Policy Aspects <strong>of</strong> Security28
<strong>The</strong>sis Committees: Serving/served on numerous internal and external MS and Ph.D. Committees sincejoining UT <strong>Dallas</strong>. External committees include <strong>University</strong> <strong>of</strong> Milan (2005 – 2009), <strong>University</strong> <strong>of</strong> Ottowa(2006), <strong>University</strong> <strong>of</strong> Maryland, Baltimore County (2005 – 2007).Research is proceeding in the following areas: D<strong>at</strong>a and Applic<strong>at</strong>ions Security and Privacy (AssuredInform<strong>at</strong>ion Sharing, Secure Geosp<strong>at</strong>ial D<strong>at</strong>a Management, D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions,Secure Grid, Storage and Web Services, Secure Social Networks) and Inform<strong>at</strong>ion Management(Semantic Web, Inform<strong>at</strong>ion Integr<strong>at</strong>ing). Topics include the following:1. D<strong>at</strong>a Security and PrivacyArea 1: Assured Inform<strong>at</strong>ion SharingTrustworthy partners experiment<strong>at</strong>ion, semi-trustworthy partners and game theory, untrustworthy partnersand worm detection, agent-based trust management, peer-to-peer trust management, d<strong>at</strong>a integrity andprovenance, risk-based access control and d<strong>at</strong>a sharingArea 2: Secure Geosp<strong>at</strong>ial D<strong>at</strong>a ManagementSecure geosp<strong>at</strong>ial semantic web and web services, geosp<strong>at</strong>ial d<strong>at</strong>a management for emergencypreparedness, privacy for geosp<strong>at</strong>ial d<strong>at</strong>aArea 3: Secure Semantic Web and Social NetworksPolicy management, inference control, security and privacy for social networksArea 4: D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ionsIntrusion, buffer overflow and worm detection, autom<strong>at</strong>ic face recognition and RFID technologies, d<strong>at</strong>amining for surveillance applic<strong>at</strong>ions, secure robots for disaster recovery, d<strong>at</strong>a mining for fault detection,privacy preserving d<strong>at</strong>a miningArea 5: Secure Grid, Clouds, and Web ServicesAccountability for grids, deleg<strong>at</strong>ion-based model for secure web servicesOther: Complexity <strong>The</strong>oryExamining complexity results for sensor networks and security problems.2. Inform<strong>at</strong>ion ManagementOntology Alignment for Semantic Web, Geosp<strong>at</strong>ial D<strong>at</strong>a Mining, Knowledge Management, ManagingLarge RDF graphs, Query Processing in Clouds, Geosp<strong>at</strong>ial D<strong>at</strong>a MiningResearch Supervision: Previous (1980 – 2004)New Mexico Institute <strong>of</strong> TechnologyWhile I taught courses in theory <strong>of</strong> comput<strong>at</strong>ion and M<strong>at</strong>hem<strong>at</strong>ics Logic, I conducted research inComplexity theory and published several journal papers including ones in the Journal <strong>of</strong> Computer andSystems Sciences and the Notre Dame Journal <strong>of</strong> Formal Logic. I developed a concept called SystemFunction Language in 1981 which was published l<strong>at</strong>er in 1993 in the Journal <strong>of</strong> M<strong>at</strong>hem<strong>at</strong>ical Logic.<strong>University</strong> <strong>of</strong> MinnesotaAs a member <strong>of</strong> the gradu<strong>at</strong>e faculty, together with Pr<strong>of</strong>. Wei-Tek Tsai (now <strong>at</strong> Arizona St<strong>at</strong>e <strong>University</strong>),I co-supervised the following students from 1984 to 1988.Tom Keefe, Ph.D.29
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27: Section 8: ACADEMIC RESEARCH SUPERV
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80:
5. Recent Developments in Some Trus
- Page 81 and 82:
44. Data Engineering Directions, IE
- Page 83 and 84:
6. Towards a Global Multilevel Data
- Page 85 and 86:
19. Object Technology for C4I Appli
- Page 87 and 88:
59. Assured Cloud Computing, AFOSR
- Page 89 and 90:
2. A Seminar on Secure Database Sys
- Page 91 and 92:
VIII. The University of Texas at Da
- Page 93 and 94:
5. Secure Distributed Query Process
- Page 95 and 96:
Simulated algorithms for informatio
- Page 97 and 98:
1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH