35. Sensor Web and Sensor D<strong>at</strong>a Management, keynote address <strong>at</strong> ISE, San Diego, July 2002. (ReceivedSCSC award for this keynote, abstract in proceedings).36. Feder<strong>at</strong>ed D<strong>at</strong>abases for Bioinform<strong>at</strong>ics, 4 th Annual Bioinform<strong>at</strong>ics Conference, September 2002,Boston, MA.37. Security for Multimedia D<strong>at</strong>abase Management, IEEE Multimedia S<strong>of</strong>tware Engineering,Conference, December 2002, Newport Beach, CA.38. Security for Multimedia D<strong>at</strong>abase Management, Distributed Multimedia Conference, Miami,Florida, September 2003.39. Secure Semantic Web, XML Security and Privacy, keynote address <strong>at</strong> Conference on AppliedInform<strong>at</strong>ics, Innsbruck, Austria, February 2003.40. Secure Semantic Web, XML Security and Privacy, fe<strong>at</strong>ured address <strong>at</strong> Knowledge ManagementConference, Washington DC, March 2003.41. Secure Semantic Web, XML Security and Privacy keynote address <strong>at</strong> ICCS Las Vegas, April 2003.42. Dependable Sensor Inform<strong>at</strong>ion Management, fe<strong>at</strong>ured address IEEE WORDS, Capri Island, Italy,October 2003.43. D<strong>at</strong>a Mining and Cyber Security, keynote address <strong>at</strong> Quality S<strong>of</strong>tware Conference, <strong>Dallas</strong>, <strong>Texas</strong>,November 2003 (abstract in proceedings).44. D<strong>at</strong>a Mining and Cyber Security, keynote <strong>at</strong> 3 rd Applied Technology Conference, <strong>University</strong> <strong>of</strong>Arkansas, Little Rock, February 2004.45. D<strong>at</strong>a Mining for Biometrics, fe<strong>at</strong>ured address <strong>at</strong> Society for Women Engineers Conference,Baltimore, MD, March 2004.46. Security and Privacy for Web D<strong>at</strong>abases and Services, keynote address, EDBT Conference, Crete,Greece, March 2004 (complete paper in EDBT Proceedings Springer, co-author: E. Ferrari).47. Access Control in D<strong>at</strong>abases: Developments and Directions, keynote address <strong>at</strong> ACM SACMAT,New York, June 2004.48. Secure Knowledge Management, NSF Workshop on Secure Knowledge Management, SUNYBuffalo, September 2004.49. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions, keynote address, Intern<strong>at</strong>ional Conference on MachineLearning, Louisville, Kentucky, December 2004.50. Sensor Inform<strong>at</strong>ion Management, fe<strong>at</strong>ured address, MITRE Community Workshop, Tyson’s Corner,October 2005.51. Voice Over IP Security, IASTED Conference on Communic<strong>at</strong>ions, Phoenix, AZ, November 2005.52. D<strong>at</strong>a Mining for Counter-terrorism Applic<strong>at</strong>ions, fe<strong>at</strong>ured address, SAS D<strong>at</strong>a Mining Conference,Las Vegas, October 2005.53. D<strong>at</strong>a Mining for Malicious Code Detection, keynote address, ASTRNET Workshop, Kings College,London, April 2006.76
54. D<strong>at</strong>a Mining for N<strong>at</strong>ional Security Applic<strong>at</strong>ions, keynote address, Pacific Asia D<strong>at</strong>a MiningConference Workshop, Singapore, April 2006 (proceedings abstract).55. D<strong>at</strong>a Mining for Surveillance Applic<strong>at</strong>ions, fe<strong>at</strong>ured address, Pacific Asia D<strong>at</strong>a Mining Conference,Singapore, April 2006 (proceedings abstract).56. Identity Management and RFID Technologies, keynote address, Identity Solutions Conference,Jonesboro, Arkansas, February 2007.57. D<strong>at</strong>a Mining for Cyber Security Applic<strong>at</strong>ions, ARES Conference, Vienna, Austria, April 2007.58. CPT for the Semantic Web, IEEE Policy, Bologna, Italy, June 2007. (proceedings paper).59. Multimedia Systems Security, ACM Multimedia Systems Security Workshop, <strong>Dallas</strong>, TX, September2007 (proceedings abstract).60. Privacy Preserving D<strong>at</strong>a Mining, ICDM Workshop, Omaha, Nebraska, October 2007.61. Inform<strong>at</strong>ion Security, Privacy and Governance for Assured Inform<strong>at</strong>ion Sharing, fe<strong>at</strong>ured address,ISIG 1 st Intern<strong>at</strong>ional Conference on Global Inform<strong>at</strong>ion Governance, Pisa, Italy, March 2008.62. D<strong>at</strong>a Mining for Cyber Security Applic<strong>at</strong>ions, Invited Plenary Talk, Cyber Security Symposium,Arizona St<strong>at</strong>e U, Tempe, AZ, April 2008.63. D<strong>at</strong>a Analytics for Security Applic<strong>at</strong>ions, Intelligence and Security Inform<strong>at</strong>ics, Taipei, Taiwan, 2008.64. Confidentiality, Privacy and Trust for D<strong>at</strong>a Mining, ACM KDD Workshop on Privacy and D<strong>at</strong>aMining, Las Vegas, NV, August 2008 (proceedings published by Springer Verlag).65. D<strong>at</strong>a Mining for Malicious Code Detection and Security Applic<strong>at</strong>ions, TRUST, Shanghai, Cjina,December 2008.66. Building Trustworthy Semantic Webs, TSP, Shanghai, China, December 2008.67. Assured Inform<strong>at</strong>ion Sharing, ASIA-CCS, Sydney, Australia, March 2009.68. Assured Inform<strong>at</strong>ion Sharing for Trustworthy, Untrustworthy and Semi-trustworthy Partners, DoECyber Security Conference, Knoxville, TN April 2009.69. Geosocial Semantic Web for Military Stabiliz<strong>at</strong>ion and Reconstruction, Pacific Asia Intelligence andSecurity Inform<strong>at</strong>ics, Bangkok, Thailand, April 2009.70. Security Engineering: Developments and Directions, IEEE Intern<strong>at</strong>ional Conference on SecureS<strong>of</strong>tware Integr<strong>at</strong>ion and Reliability Improvement (SSIRI), Shanghai, China, July 2009.71. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions, WI/IAT Conference, Milan, Italy September 2009.72. Trustworthy Semantic Webs, IEEE Conference on Inform<strong>at</strong>ion Reuse and Integr<strong>at</strong>ion, Las Vegas,NV, August 2009.73. D<strong>at</strong>a Security and Integrity: Developments and Directions, SIGKDD workshop on Intelligence andSecurity Inform<strong>at</strong>ics, Paris, France, June 2009.77
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75: 17. Data Management Systems Evoluti
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH