38. Geosp<strong>at</strong>ial Semantic Web, OGC Interoperability Working Group, October 2006, Tyson’s Corner,VA.39. Geosp<strong>at</strong>ial RDF (with A. Ashraful), W3C Working Group on Geosp<strong>at</strong>ial D<strong>at</strong>a, October 2006,Teleconference meeting (from <strong>Dallas</strong> TX).40. D<strong>at</strong>a Mining and Applic<strong>at</strong>ions in Malicious Code Detection and Security, Seminar series, <strong>University</strong><strong>of</strong> North <strong>Texas</strong>, November 2006; <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> Arlington, December 2006.41. D<strong>at</strong>a Mining for Buffer Overflow, Seminar series, Purdue <strong>University</strong> (February 2007); Polytechnic<strong>University</strong> New York, August 2007.42. D<strong>at</strong>a Security Research <strong>at</strong> UTD, Navy SPAWAR, August 2007, San Diego.43. Digital Forensics, SWE UT <strong>Dallas</strong> Chapter Meeting, October 4, 2007, <strong>Dallas</strong>, TX.44. Digital Forensics, ACM UT <strong>Dallas</strong> Chapter Meeting, October 25, 2007, <strong>Dallas</strong>, TX.45. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions, SWE <strong>Dallas</strong> TX Chapter Meeting, February 2008, <strong>Dallas</strong>, TX.46. Semantic Web Research <strong>at</strong> UT <strong>Dallas</strong>. IARPA KDD Workshop, February 2008, Oakridge, TN.47. Blackbook Experiences, RDEC User Conference, May 2008, San Diego, CA.48. Assured Inform<strong>at</strong>ion Requirements G<strong>at</strong>hering, DoD MURI Program Review, September 2008,Baltimore, MD.49. Assured Inform<strong>at</strong>ion Sharing, Seminar <strong>at</strong> N<strong>at</strong>ional <strong>University</strong> <strong>of</strong> Singapore, October 2008; <strong>University</strong><strong>of</strong> Penang, October 2008.50. Managing Large RDF Graphs, IARPA KDD Workshop, December 2008, Oakridge, TN.51. Knowledge Discovery and Security Inform<strong>at</strong>ics, SAP Labs, Sophia Antipolis, France, May 2009;Rockwell Collins, Richardson, March 2009.52. Secure Semantic Grid, AFOSR Program Review, June 2009, Washington DC.53. D<strong>at</strong>a Mining and Security, Micros<strong>of</strong>t Invit<strong>at</strong>ional Workshop in D<strong>at</strong>a for Interdisciplinary Research,September 2009, Se<strong>at</strong>tle, WA.54. Inform<strong>at</strong>ion and Security Analytics <strong>at</strong> UTD, present<strong>at</strong>ion <strong>at</strong> Wright St<strong>at</strong>e <strong>University</strong>, November 2009,Dayton, OH.55. Cyber Security Research and Educ<strong>at</strong>ion <strong>at</strong> UTD, Mississippi St<strong>at</strong>e <strong>University</strong>, January 2010.56. D<strong>at</strong>a Mining for Malware Detection, <strong>University</strong> <strong>of</strong> Arizona, February 2010.57. <strong>Dallas</strong> – Ideal city for a technology conference, Presented to the IEEE D<strong>at</strong>a Engineering SteeringCommittee, March 2010 (co-author: Rhonda Walls).58. Assured Inform<strong>at</strong>ion Sharing: Malicious Code Detection, <strong>University</strong> <strong>of</strong> Louisville, Kentucky, March2010.86
59. Assured Cloud Computing, AFOSR Review, July 2010, Arlington, VA.60. D<strong>at</strong>a Mining for Malware Detection, DFW ATW, June 2011, <strong>Dallas</strong>, TX.61. Inform<strong>at</strong>ion Sharing on the Cloud, AFOSR Review, September 2011, Arlington, VA.V. MITRE SYMPOSIA AND TECHNOLOGY EXCHANGE MEETINGS1. Security in Object-Oriented D<strong>at</strong>abase Systems, Presented <strong>at</strong> the MITRE Symposium on Object-Oriented Technology, April 1990, Bedford, MA (Proceedings published in Technical Report, MTP382; Editor: D. Grigaro).2. Issues in Object-Oriented D<strong>at</strong>abase Systems, Presented <strong>at</strong> the MITRE Managers' Symposium onSupercomputing, May 1990, McLean, VA (Proceedings Editor: L. Zeitlsler).3. Parallel Processing and Trusted D<strong>at</strong>abase Management Systems, Presented <strong>at</strong> the 5th MITRESymposium on Parallel Processing, May 1991, Bedford, MA.4. An Overview <strong>of</strong> Parallel D<strong>at</strong>abase Management Systems, Presented <strong>at</strong> the 7th MITRE Symposium onParallel Processing, April 22, 1993, Bedford, MA.5. Object-oriented D<strong>at</strong>abase Management Systems, Presented <strong>at</strong> the Object-oriented Technology Day,(Bedford, MA) October 7, 1993 and (McLean, VA) March 15, 1994.6. Massive D<strong>at</strong>a and Inform<strong>at</strong>ion Systems, Presented <strong>at</strong> the 1 st MITRE Technology Symposium, June15, 1994, McLean, VA, (co-author: M. Zemankova, proceedings).7. D<strong>at</strong>a Management for Workflow Computing, Presented <strong>at</strong> the MITRE Symposium on D<strong>at</strong>abases forthe 90s, June 16, 1994, McLean, VA (Abstract and present<strong>at</strong>ion in proceedings; co-author: B.Lavender).8. Proceedings <strong>of</strong> the 1st Applied D<strong>at</strong>abase Technology Day, August 1994 (co-editor: C. Loizides – alsoco-chaired 2nd symposium, December 1995).9. MITRE's Role in Real-time Systems, presented <strong>at</strong> the panel on Real-time Systems, Real-time SystemsTechnology Day, September 1994 (Chair: J. Knobel).10. Real-time D<strong>at</strong>abase Management Systems, presented <strong>at</strong> the Advanced Inform<strong>at</strong>ion SystemsTechnology Day, February 1995 (Chair: M. Maybury).11. MITRE's Role in Parallel D<strong>at</strong>abase Systems, presented <strong>at</strong> the Parallel Processing Symposium, 1995.12. Massive D<strong>at</strong>a and Inform<strong>at</strong>ion Systems Initi<strong>at</strong>ive <strong>at</strong> MITRE; Proceedings <strong>of</strong> the MITRE D<strong>at</strong>aManagement Symposium, June 1995.13. Intelligence Community Massive Digital D<strong>at</strong>a Systems, MITRE McLean, November 1995, MITREFort Monmouth, May 1996, MITRE San Diego, March 1998.14. Massive and Heterogeneous D<strong>at</strong>a, Massive D<strong>at</strong>a and Inform<strong>at</strong>ion Systems Umbrella; Massive DigitalD<strong>at</strong>a Systems Initi<strong>at</strong>ive, poster present<strong>at</strong>ions <strong>at</strong> the 2nd MITRE Technology Symposium, 20 June1995 (Bedford, MA) and 27 June 1995 (McLean, VA); Plenary present<strong>at</strong>ions also presented <strong>at</strong> 1996MITRE Technology Symposium, Bedford (11 June 1996), Reston (25 June 1996).87
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85: 19. Object Technology for C4I Appli
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH