10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

66. Privacy Preserving D<strong>at</strong>a Mining, Proceedings IEEE ICDM Workshop on Privacy preserving D<strong>at</strong>aMining, Houston, TX, 2005.67. Dependable and Secure TMO Scheme, Proceedings <strong>of</strong> the 9th IEEE ISORC, Gyeongju, South Korea,April 2006 (co-author: J. Kim).68. Design <strong>of</strong> a Secure CAMIN Applic<strong>at</strong>ion Systems based on Secure and Dependable TMO, ProceedingsISORC, May 2007, Santorini, Greec, (co-author: J. Kim).69. Security for Web Services, Proceedings ACM Workshop in Secure Web Services, May 2006 (coauthor:C. Farkas et al) (California)70. Detection and Resolution <strong>of</strong> Anomalies in Firewall Policy Rules, Proceedings IFIP D<strong>at</strong>a andApplic<strong>at</strong>ions Security Conference, Sophia Antipolis, France, 2006 (co-author: M. Abedin et al).71. A Knowledge Based Approach to Detect New Malicious Executables, Proceedings Second SKMWorkshop, Brooklyn, NY, September 2006 (co-author: L. Khan et al; enhanced version appeared inInform<strong>at</strong>ion Systems Frontiers).72. Access Control for Geosp<strong>at</strong>ial Web Services, Proceedings ACM CCS Conference Workshop, andNovember 2006. Fairfax, VA (co-author: A. Ashraful et al).73. Geosp<strong>at</strong>ial RDF, ISWC Conference on Geosp<strong>at</strong>ial Semantic Web, Athens, GA, Nov. 2006 (coauthor:A. Ashraful).74. Face Recognition Using Multiple Classifiers, IEEE ICTAI Conference Proceedings, November 2006Washington DC, (co-author: P. Parveen).75. <strong>The</strong> Applicability <strong>of</strong> the Perturb<strong>at</strong>ion Model-based Privacy-preserving D<strong>at</strong>a Mining, ProceedingsIEEE ICDM Conference Workshop on Privacy Preserving D<strong>at</strong>a Mining, Hong Kong, December2006. (enhanced version appeared in DKE 2008) (co-author: L. Liu).76. Design and Simul<strong>at</strong>ion <strong>of</strong> Trust Management Techniques for a Coalition D<strong>at</strong>a Sharing Environment,Proceedings FTDCS, 2007, Sedona, Arizona (co-author: S. Iyer).77. Fingerprint M<strong>at</strong>ching Algorithm, Proceedings ARES, Vienna, Austria, April 2007.78. Extended RBAC - Based Design and Implement<strong>at</strong>ion for a Secure D<strong>at</strong>a Warehouse, ProceedingsARES, April 2007, Vienna Austria, (enhanced version appeared in d<strong>at</strong>a warehousing journal) (coauthor:S. Iyer).79. Risk Management and Security, Proceedings Decision and Risk Analysis Conference, Richardson,TX, May 2007.80. Geosp<strong>at</strong>ial D<strong>at</strong>a Mining for N<strong>at</strong>ional Security, Proceedings ISI, New Brunswick, NJ, May 2007 (coauthor:Chuanjun et al).81. Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web, Proceedings <strong>of</strong> the 8 thIEEE Intern<strong>at</strong>ional Workshop on Policies for Distributed Systems and Networks (POLICY), Bologna,Italy, June 2007.82. A Hybrid Model to Detect Malicious Executables, Proceedings ICC 2007, Glasgow, Scotland (coauthors:M. Masud, L. Khan).47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!