63. Privacy-Preserved Social Network Integr<strong>at</strong>ion and Analysis for Security Inform<strong>at</strong>ics IEEEIntelligent Systems Special Issue, Vol. 25, No. 5, p. 88 – 90, 2010 (co-author: C. Yang).64. Geosp<strong>at</strong>ial Resource Description Framework (GRDF) and security constructs, Computer Standards& Interfaces, Vol. 33, No. 1, p. 35-41, 2011 (co-authors: Ashraful Alam, L<strong>at</strong>ifur Khan).65. Semantic Web-based Social Network Access Control, Computers and Security, Vol. 30, No. 2 – 3,2011 (special issue for SACMAT conference) (co-authors: B. Carmin<strong>at</strong>i et al).66. Adaptive Inform<strong>at</strong>ion Coding for Secure and Reliable Wireless Telesugery Communic<strong>at</strong>ions,Journale <strong>of</strong> Mobile Networks and Applic<strong>at</strong>ions (MONET), Springer online(http://www.springerlink.com/content/r71p755326k68814/), July 2011.67. Cyberphysical Systems Security Applied to Telesurgical Robotics, Computer Standards &Interfaces, Vol. 34, No. 1, p. 225-229, January 2012 (co-author: Gregory S. Lee).68. D<strong>at</strong>a Security Services, Solutions and Standards for Outsourcing, To appear in Computer Standardsand Interfaces Journal, 2012 (co-author: K. Hamlen).69. Security-aware Service Composition with Fine-grained Access and Inform<strong>at</strong>ion Flow Control, Toappear in IEEE Transactions on Services Computing, 2012 (co-authors: W. She et al).70. D<strong>at</strong>abase Inference Controller for 3D Motion Capture D<strong>at</strong>abase, To appear in Journal <strong>of</strong>Inform<strong>at</strong>ion Security and Privacy, 2012 (co-author: R. N<strong>at</strong>arajan et al).71. Effective S<strong>of</strong>tware Fault Localiz<strong>at</strong>ion using an RBF Neural Network, To appear in IEEETransactions on Reliability, 2012 (co-authors: W. E. Wong, V. Debroy, R. Golden, X. Xu).72. Secure Semantic Computing, To appear in the Semantic Computing Journal 2012 (co-author: K.Hamlen).73. Malware Detection in the Cloud, To appear in the ACM Transactions on Management Inform<strong>at</strong>ionSystems, 2012 (coauthor: M. Masud et al).Distributed Systems/D<strong>at</strong>a Management/AI Applic<strong>at</strong>ions/Real-time Systems74. AI Applic<strong>at</strong>ions in Distributed System Design Issues, 1988, IEEE Network, Vol. 2, No. 6, (co-author:J. Larson).75. Recovery Point Selection on a Reverse Binary Tree Task Model, August 1989, IEEE Transactions onS<strong>of</strong>tware Engineering, Vol. 15, No.8, (co-authors: W. T. Tsai and S. K Chen).76. From Rules to Frames and Frames to Rules, October 1989, AI Expert (Miller Freeman Publishers)Volume 2, No. 10. (Reviewed by Editorial Board).77. A New View <strong>of</strong> Inform<strong>at</strong>ion Modeling: A Bridge Between D<strong>at</strong>a and Inform<strong>at</strong>ion, Inform<strong>at</strong>ionSystems Management Journal (Auerbach), Vol. 9, No., Spring 1992 (co-author: V. Venk<strong>at</strong>araman;also reprinted in Handbook <strong>of</strong> D<strong>at</strong>a Management 1993, Editor: von Halle and Kull).78. On Developing Multimedia D<strong>at</strong>abase Management Systems Using the Object-Oriented Approach,Multimedia Review: Journal <strong>of</strong> Multimedia Computing, Vol. 3, No.2, 1992.40
79. Inform<strong>at</strong>ion Demands Drive D<strong>at</strong>a Base Interoperability, SIGNAL Magazine: AFCEA Journal,December 1995.80. Web Inform<strong>at</strong>ion Management and Its Applic<strong>at</strong>ion to Electronic Commerce, Intern<strong>at</strong>ional Journal onArtificial Intelligence Tools (World Scientific), Vol. 8, No. 2, June 1999.81. Real-time Transaction Processing, Computer Systems: Science and Practice (Chapman and Hall),1999 (co-authors: L. DiPippo, V. Wolfe et al).82. A Primer for Understanding D<strong>at</strong>a Mining, IEEE ITPro, Vol., 2, No. 1, January/February 2000.83. Real-time CORBA, IEEE Transactions on Parallel and Distributed Systems, Vol. 11, No. 10, October2000 (co-author: V. Wolfe et al).84. Scheduling and Priority Mapping for St<strong>at</strong>ic Real-Time Middleware, Real-time Systems Journal(Kluwer), Vol. 20, p. 155 -182, 2001 (co-author: V. Wolfe, L. DiPippo et al).85. Emerging Standards for D<strong>at</strong>a Mining, Computer Standards and Interface Journal (North Holland),Vol. 23, No. 3, 2001 (co-author: C. Clifton).86. Found<strong>at</strong>ions <strong>of</strong> D<strong>at</strong>a Mining: Position Paper, Communic<strong>at</strong>ions <strong>of</strong> Institute for Inform<strong>at</strong>ion andComputing Machinery (Taiwan Journal), May 2002. (PAKDD 2002 workshop paper published asspecial issue in journal).87. Collabor<strong>at</strong>ive Commerce and Knowledge Management, Knowledge Management Journal (WileyInterscience), 2002.88. Managing and Mining Multimedia D<strong>at</strong>abases, Intern<strong>at</strong>ional Journal <strong>of</strong> Artificial Intelligence Tools(World Scientific), Vol. 13, No. 3, 2004 (keynote <strong>at</strong> ICTAI99).89. Predicting WWW Surfing Using Multiple Evidence Combin<strong>at</strong>ion, VLDB Journal, May 2008 (coauthor:M. Awad et al).90. A Framework for Autom<strong>at</strong>ed Image Annot<strong>at</strong>ion, Intern<strong>at</strong>ional Journal <strong>of</strong> Computer Systems Scienceand Engineering, Vo1. 22, No. 1 – 2, 2007, (co-author: L Wang et al).91. A Scalable Clustering Method Based on Density, WSEAS Transactions on Computing Research, 2008(co-authors: L. Khan and S. Bereg).92. Emergency Response Applic<strong>at</strong>ions: Dynamic Plume Modeling and Real-Time Routing, IEEE InternetComputing, Vol. 12, No. 1, p. 38-44, January - February 2008,(co-authors: P. K. Chitumalla, D.Harris, L. Khan).93. R2D: A Bridge Between the Semantic Web and Rel<strong>at</strong>ional Visualiz<strong>at</strong>ion Tools, Semantic ComputingJournal, 2009. (co-authors: S. Sriram et al).94. Necessary and Sufficient Conditions for Transaction-consistent Global Checkpoints in a DistributedD<strong>at</strong>abase System, Inform<strong>at</strong>ion Sciences, Vol. 179, No. 20, p. 3659 – 3672, September 2009, (coauthors:J. Wu, D. Manivannan).95. Upd<strong>at</strong>e Enabled Triplific<strong>at</strong>ion <strong>of</strong> Rel<strong>at</strong>ional D<strong>at</strong>a into Virtual RDF Stores Intern<strong>at</strong>ional Journal <strong>of</strong>Semantic Computing, World Scientific, Vol. 4, No. 4 December 2010, p. 423 – 451 (selected fromProc. <strong>of</strong> Fourth IEEE Intern<strong>at</strong>ional Conference on Semantic Computing [IEEE ICSC 2010],41
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39: 48. E-Mail Worm Detection Using Dat
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92:
VIII. The University of Texas at Da
- Page 93 and 94:
5. Secure Distributed Query Process
- Page 95 and 96:
Simulated algorithms for informatio
- Page 97 and 98:
1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH