10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

48. E-Mail Worm Detection Using D<strong>at</strong>a Mining. Mohammad M. Masud, L<strong>at</strong>ifur Khan, Bhavani M.Thuraisingham: IJISP 1(4):47-61 (2007)49. Design and Implement<strong>at</strong>ion <strong>of</strong> a Framework for Assured Inform<strong>at</strong>ion Sharing AcrossOrganiz<strong>at</strong>ional Boundaries, Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy, 2008.(co-authors: Y. Harsha Kumar et al).50. A Scalable Multi-level Fe<strong>at</strong>ure Extraction Technique to Detect Malicious Executables,Inform<strong>at</strong>ion Systems Frontiers, (Springer Netherlands), Vol. 10, No. 1, Page 33-45, March2008 (co-authors: M. Masud, L. Khan).51. <strong>The</strong> Applicability <strong>of</strong> the Perturb<strong>at</strong>ion Based Privacy Preserving D<strong>at</strong>a Mining for Real-WorldD<strong>at</strong>a,, " D<strong>at</strong>a and Knowledge Engineering (DKE), Vol. 65, No. 1, p.5-21, 2008 LeadingJournal (co-authors: L. Liu, M. Kantarcioglu).52. A Risk Management Approach to RBAC, Risk and Decision Analysis Journal, 2008 (coauthors:E. Celikel, M. Kantarcioglu, E. Bertino).53. Exploiting an Antivirus Interface, Computer Standards & Interfaces, Vol. 31, No. 6, p. 1182-1189, November 2009 (co-authors: K. Hamlen, V. Mohan, M. Masud, L. Khan).54. Privacy Preserv<strong>at</strong>ion in Wireless Sensor Networks: A St<strong>at</strong>e-<strong>of</strong>-the-art Survey, Ad-HocNetworks Journal, Vol. 7, No. 8, November 2009 (co-authors: L. Na et al).55. Design and Implement<strong>at</strong>ion <strong>of</strong> a Secure Social Network System, Computer Systems Scienceand Engineering, Vol. 24, No. 2, March 2009 (co-authors: R. Layfield et al).56. Deleg<strong>at</strong>ion Model for Web Services, Journal <strong>of</strong> Web Services Research 2009 (co-authors: W.She, I. Yen).57. Rel<strong>at</strong>ionaliz<strong>at</strong>ion <strong>of</strong> Provenance D<strong>at</strong>a in Complex RDF Reific<strong>at</strong>ion Nodes, Special Issue <strong>of</strong> ElectronicCommerce Research Journal on Trust and Privacy Aspects <strong>of</strong> Electronic Commerce, 2009 (coauthors:S. Sriram et al).58. Classific<strong>at</strong>ion and Novel Class Detection in Concept-Drifting D<strong>at</strong>a Streams under TimeConstraints, Accepted and to appear in IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering,2010 (co-authors: M. Masud, L. Khan, J. Han).59. Semantic Web, D<strong>at</strong>a Mining and Security, IEEE Intelligent Systems Special Issue, 2010 (coauthors:M. Kantarcioglu and L. Khan).60. Secure D<strong>at</strong>a Objects Replic<strong>at</strong>ion in D<strong>at</strong>a Grid, IEEE Transactions on Dependable and SecureComputing, January 2010 (co-authors: Manghui Tu, Peng Li, I-Ling Yen, Bhavani Thuraisingham,and L<strong>at</strong>ifur Khan).61. Security Issues for Cloud Computing, Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy, Vol. 4, No. 2,2010, p. 36 – 48 (coauthors: K. Hamlen, L. Khan, M. Kantarcioglu).62. Policy Management for Assured Inform<strong>at</strong>ion Sharing, Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy,September 2010 (co-authors: M. Awad et al).39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!