10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Section 12: TECHNICAL REPORTSI. TECHNICAL REPORTS <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>UTDCS-05-05UTDCS-39-05D<strong>at</strong>a Mining Techniques for BiometricsSystemsUncertainty: An Extra Layer <strong>of</strong> SecurityFor Unauthorized Traffic Based WebServicesL<strong>at</strong>ifur KhanBhavani ThuraisinghamParag AgarwalB. PrabhakaranBhavani ThuraisinghamUTDCS-02-06 Dependable and Secure TMO Scheme Jung-In KimBhavani ThuraisinghamUTDCS-03-06UTDCS-04-06UTDCS-05-06UTDCS-06-06UTDCS-13-06UTDCS-14-06UTDCS-15-06UTDCS-22-06UTDCS-27-06UTDCS-32-06UTDCS-39-06UTDCS-40-06UTDCS-43-06UTDCS-44-06Geography Resource DescriptionFramework (GRDF) and Secure GRDF(S-GRDF)An Adaptable Perturb<strong>at</strong>ion Model <strong>of</strong>Privacy Preserving D<strong>at</strong>a MiningFace Recognition Using VariousClassifiers: Artificial Neural Network,Linear Discriminant and PrincipalComponent AnalysisAdministering <strong>The</strong> Semantic Web: CPT:Confidentiality, Privacy and TrustManagementOn the Complexity <strong>of</strong> the PrivacyProblem in D<strong>at</strong>abasesInference Control for Document Releaseand Dissemin<strong>at</strong>ionIndividually Adaptable Perturb<strong>at</strong>ionModel for Privacy Preserving D<strong>at</strong>aMiningDesign and Implement<strong>at</strong>ion <strong>of</strong> a SecureSocial Network SystemDetecting New Malicious ExecutablesUsing D<strong>at</strong>a MiningFingerprint M<strong>at</strong>ching Algorithm BasedOn Tree Comparison Using R<strong>at</strong>ios <strong>of</strong>Rel<strong>at</strong>ional DistancesA Scalable Clustering Method Based onDensityDetecting Malicious Executables UsingAssembly Fe<strong>at</strong>ure RetrievalAssured Inform<strong>at</strong>ion Sharing:Technologies, Challenges and DirectionsDesign and Implement<strong>at</strong>ion <strong>of</strong> PolicyEnforcement, D<strong>at</strong>a Sharing and MiningComponents for Trustworthy CoalitionsAshraful AlamBhavani ThuraisinghamLi LiuBhavani ThuraisinghamMur<strong>at</strong> KantarciogluL<strong>at</strong>ifur KhanPallabi ParveenBhavani ThuraisinghamN<strong>at</strong>halie TsybulnikBhavani Thuraisingham02/0512/0501/0601/0601/0601/0602/06Bhavani Thuraisingham 03/06Bhavani Thuraisingham 03/06Li LiuMur<strong>at</strong> KantarciogluBhavani ThuraisinghamRyan LayfieldBhavani ThuraisinghamMohammad M. MasudL<strong>at</strong>ifur KhanBhavani ThuraisinghamMamoun A. AwadAbinandhan ChandrasekaranBhavani ThuraisinghamK<strong>at</strong>hryn BeanSergey BeregL<strong>at</strong>ifur KhanBhavani ThuraisinghamMohammad M. MasudL<strong>at</strong>ifur KhanBhavani Thuraisingham03/0604/0607/0607/0609/0609/06Bhavani Thuraisingham 10/06Mamoun AwadDilsad CavusL<strong>at</strong>ifur KhanManjun<strong>at</strong>h Reddy10/0664

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!