10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

54. D<strong>at</strong>a Mining for N<strong>at</strong>ional Security Applic<strong>at</strong>ions, keynote address, Pacific Asia D<strong>at</strong>a MiningConference Workshop, Singapore, April 2006 (proceedings abstract).55. D<strong>at</strong>a Mining for Surveillance Applic<strong>at</strong>ions, fe<strong>at</strong>ured address, Pacific Asia D<strong>at</strong>a Mining Conference,Singapore, April 2006 (proceedings abstract).56. Identity Management and RFID Technologies, keynote address, Identity Solutions Conference,Jonesboro, Arkansas, February 2007.57. D<strong>at</strong>a Mining for Cyber Security Applic<strong>at</strong>ions, ARES Conference, Vienna, Austria, April 2007.58. CPT for the Semantic Web, IEEE Policy, Bologna, Italy, June 2007. (proceedings paper).59. Multimedia Systems Security, ACM Multimedia Systems Security Workshop, <strong>Dallas</strong>, TX, September2007 (proceedings abstract).60. Privacy Preserving D<strong>at</strong>a Mining, ICDM Workshop, Omaha, Nebraska, October 2007.61. Inform<strong>at</strong>ion Security, Privacy and Governance for Assured Inform<strong>at</strong>ion Sharing, fe<strong>at</strong>ured address,ISIG 1 st Intern<strong>at</strong>ional Conference on Global Inform<strong>at</strong>ion Governance, Pisa, Italy, March 2008.62. D<strong>at</strong>a Mining for Cyber Security Applic<strong>at</strong>ions, Invited Plenary Talk, Cyber Security Symposium,Arizona St<strong>at</strong>e U, Tempe, AZ, April 2008.63. D<strong>at</strong>a Analytics for Security Applic<strong>at</strong>ions, Intelligence and Security Inform<strong>at</strong>ics, Taipei, Taiwan, 2008.64. Confidentiality, Privacy and Trust for D<strong>at</strong>a Mining, ACM KDD Workshop on Privacy and D<strong>at</strong>aMining, Las Vegas, NV, August 2008 (proceedings published by Springer Verlag).65. D<strong>at</strong>a Mining for Malicious Code Detection and Security Applic<strong>at</strong>ions, TRUST, Shanghai, Cjina,December 2008.66. Building Trustworthy Semantic Webs, TSP, Shanghai, China, December 2008.67. Assured Inform<strong>at</strong>ion Sharing, ASIA-CCS, Sydney, Australia, March 2009.68. Assured Inform<strong>at</strong>ion Sharing for Trustworthy, Untrustworthy and Semi-trustworthy Partners, DoECyber Security Conference, Knoxville, TN April 2009.69. Geosocial Semantic Web for Military Stabiliz<strong>at</strong>ion and Reconstruction, Pacific Asia Intelligence andSecurity Inform<strong>at</strong>ics, Bangkok, Thailand, April 2009.70. Security Engineering: Developments and Directions, IEEE Intern<strong>at</strong>ional Conference on SecureS<strong>of</strong>tware Integr<strong>at</strong>ion and Reliability Improvement (SSIRI), Shanghai, China, July 2009.71. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions, WI/IAT Conference, Milan, Italy September 2009.72. Trustworthy Semantic Webs, IEEE Conference on Inform<strong>at</strong>ion Reuse and Integr<strong>at</strong>ion, Las Vegas,NV, August 2009.73. D<strong>at</strong>a Security and Integrity: Developments and Directions, SIGKDD workshop on Intelligence andSecurity Inform<strong>at</strong>ics, Paris, France, June 2009.77

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!