15. Evolvable Interoperable Inform<strong>at</strong>ion Systems Thrust, MITRE Technology Symposium, 11 June 1996(Bedford), 25 June 1996 (Reston) Proceedings, version also <strong>at</strong> 1997 symposia (June 1997).16. Proceedings <strong>of</strong> the 1st MITRE Object-Oriented Technology Conference, Welcome address, June 1996(co-editor: T. Mowbray).17. Privacy, MITRE Technical Exchange, April 2003.18. Cyber Security Roadmap, MITRE Technical Exchange, June 2009.VI. TUTORIALSConference Tutorials1. Recent Developments in D<strong>at</strong>abase Security, presented <strong>at</strong> the 14th Annual Computer SecurityConferences Workshops, Anaheim, CA, November 1987; lecture notes published in the tutorialproceedings; enhanced version published in the IEEE COMPSAC Conference Tutorial Proceedings,November 1989, Orlando, FL.2. Multilevel Secure D<strong>at</strong>abase Management Systems, presented <strong>at</strong> the AFCEA Conference Tutorials, ,August 1993, Princeton, NJ (lecture notes published in the tutorial proceedings).3. A Tutorial in Object-Oriented D<strong>at</strong>abase Systems, presented <strong>at</strong> the IEEE Dual Use TechnologyConference, May 1994, Utica, NY.4. D<strong>at</strong>a Mining, ACM SAC, March 1998, Atlanta, GA.5. D<strong>at</strong>a Mining, IEEE COMPSAC, August 1998, Vienna, Austria.6. D<strong>at</strong>a Mining, IEEE ANNIE, November 1999, St Louis, Missouri.7. Web Inform<strong>at</strong>ion Management and Ecommerce, IEEE ISADS, March 1999, Tokyo, Japan.8. Web Inform<strong>at</strong>ion Management and Ecommerce IEEE COMPSAC, October 1999, Tempe, AZ.9. D<strong>at</strong>a Mining Technologies and Applic<strong>at</strong>ions in Counter-terrorism, Technet, May 2003, Washington,DC.10. D<strong>at</strong>a Mining Technologies and Applic<strong>at</strong>ions in Counter-terrorism, Technet, May 2004, Washington,DC.11. D<strong>at</strong>a and Applic<strong>at</strong>ions Security, TechNet, May 2005, Washington DC.12. D<strong>at</strong>a Mining for Intern<strong>at</strong>ional Security, ISI Workshop, June 2010, Mysore, India.Department <strong>of</strong> Defense and Other Agencies1. A Tutorial in D<strong>at</strong>abase System and D<strong>at</strong>abase System Security, A three full- day tutorial presented tothe U.S. Army CECOM, Ft. Monmouth (August 1992, January 1993), and Dept. <strong>of</strong> the NavySPAWAR, Washington D.C. (February 1993).88
2. A Seminar on Secure D<strong>at</strong>abase System, Full-day tutorial presented to the Dept. <strong>of</strong> the NavyNCCOSC, San Diego (January 1993, June 1993); Versions also presented to the U.S. Air ForceAFCSC (June, August, September, 1991 - San Antonio, TX).3. A Seminar in Object-Oriented DBMS , Full day-tutorial presented to the Department <strong>of</strong> the NavyNCCOSC, San Diego, June 1993; U.S. Army, CECOM, Ft. Monmouth, April 1994; DISANovember 1994; NSA April 1995.4. A Seminar in Distributed and Heterogeneous DBMS, Full-day tutorial presented to the Department <strong>of</strong>the Navy NCCOSC, San Diego, June 1993; U.S. Army, CECOM, Ft. Monmouth, April 1994; DISA,November 1994.5. A Seminar in Real-time DBMS, Presented to U.S. Army, CECOM, Ft. Monmouth, N.J., April 1994.6. A Tutorial in D<strong>at</strong>abase Management Systems, series <strong>of</strong> seven lectures given <strong>at</strong> ESC <strong>University</strong>,Hanscom AFB, Bedford, MA, September 1994 - April 1995 (Introduction, Rel<strong>at</strong>ional, Object-Oriented, Distributed, Heterogeneous DBMS, Real-time, Intelligent D<strong>at</strong>a Management/D<strong>at</strong>a Mining).7. D<strong>at</strong>a Mining, Developments and Challenges, July 1998, San Antonio (AIA), and Stuttgart (Eucom).(versions given to many govt. organiz<strong>at</strong>ions).8. D<strong>at</strong>a Management Systems Evolution and Interoper<strong>at</strong>ion, AFCEA (Three days) June 1999,September 1998, DISA-DARPA-JPO (One day) September 1999.9. D<strong>at</strong>a Management, D<strong>at</strong>a Mining and E-Commerce, AFCEA, October 2000 (Three days).10. D<strong>at</strong>a Management, Inform<strong>at</strong>ion Management and Knowledge Management, AFCEA October 2001,also versions <strong>at</strong> AFCEA October 2002, October 2003, September 2004, October 2005 (Air ForceBases: October 2004 - Offut, March 2005 - Eglin, August 2005 - Lackland, June 2006 – Edwards,September 2006 - Kirkland).11. D<strong>at</strong>a Mining and Applic<strong>at</strong>ions in Counter-terrorism, AFCEA June 2003, December 2003, December2004, March 2006 (Three days) , December 2006, November 2007, May 2007, November 2007,November 2008, June 2010 (enhanced version <strong>of</strong> Technet present<strong>at</strong>ion).12. Knowledge Management, Semantic Web and Social Networks, AFCEA April 2008, October 2009,April 2010, October 2010.MITRE Tutorials (excludes informal tutorial present<strong>at</strong>ions <strong>at</strong> MITRE)1. D<strong>at</strong>abase Security, presented <strong>at</strong> the MITRE Institute, February 1990, Bedford, MA (co-presenter: R.Graubart; lecture notes and videotape).2. D<strong>at</strong>abase Systems and D<strong>at</strong>abase Systems Security, presented <strong>at</strong> the MITRE Institute, January 1992Bedford, MA (lecture notes and two videotapes).3. A Seminar In Object-Oriented D<strong>at</strong>abase Systems, Presented <strong>at</strong> the MITRE Institute, April 21, 1993,Bedford, MA, (five videotapes and lecture notes); March 14, 1994,McLean, VA,.4. A Seminar In Distributed and Heterogeneous D<strong>at</strong>abase Systems, presented <strong>at</strong> the MITRE Institute,June 3, 1993, Bedford, MA, (videotapes and lecture notes), March 15, 1994, McLean, VA.5. A Course in D<strong>at</strong>abase Management Systems, Presented <strong>at</strong> the MITRE Institute, Bedford, MA, Fall1992 and Fall 1993 (videotapes and lecture notes available).89
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36:
3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87: 59. Assured Cloud Computing, AFOSR
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH