10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Advisor to the following prototypes developed by members <strong>of</strong> my department in D<strong>at</strong>a Mining.Distributed Objects and Multimedia Inform<strong>at</strong>ion Management16. Text D<strong>at</strong>a Mining ToolPI: C. Clifton17. Image Mining ToolPI: C. Clifton18. Broadcast News Navig<strong>at</strong>ion SystemPI: A. Merlino19. Distributed Object Management for Legacy System Migr<strong>at</strong>ionPI: E. Hughes<strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>D<strong>at</strong>a Mining Tools1. Suspicious Event Detection and Surveillance, 2004 – 2005Gal Lavee, Bhavani Thuraisingham, L<strong>at</strong>ifur KhanDeveloped a system for detecting suspicious events. Developed a distance m<strong>at</strong>rix to identify eventsth<strong>at</strong> are similar.2. D<strong>at</strong>a Mining Toolkit for Malware Detection, 2005 – 2009Mehedy Masud, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDeveloped d<strong>at</strong>a mining algorithms using WEKA and other tools to detect buffer overflow, andmalicious code.3. Stream Mining Tools, 2008 – 2009Mehedy Masud, L<strong>at</strong>ifur Khan, Bhavani Thuraisingham with Jiawei Han et al.Developed a stream mining algorithm for novel class detection.Inform<strong>at</strong>ion Sharing, Privacy, and Policy Management4. Assured Inform<strong>at</strong>ion Sharing, 2007 – 2008Yashaswini Harshakumar, Bhavani Thuraisingham, L<strong>at</strong>ifur KhanUsing Oracle d<strong>at</strong>abase systems and XACML policies implemented assured inform<strong>at</strong>ion sharingprototype.5. Assured Inform<strong>at</strong>ion Sharing Simul<strong>at</strong>ion, 2005 – 2006Mamoun Awad, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamSimul<strong>at</strong>ed policy management in inform<strong>at</strong>ion sharing algorithms and determined the amount <strong>of</strong>inform<strong>at</strong>ion th<strong>at</strong> would be lost by enforcing policies. This would give guidance to the decision makers<strong>of</strong> the policies th<strong>at</strong> need to be enforced.6. Trust Management in Inform<strong>at</strong>ion Sharing, Simul<strong>at</strong>ion, 2006 – 2007R. Srinivasan and B. ThuraisinghamComputes trust and shares inform<strong>at</strong>ion based on trust values.7. Game <strong>The</strong>ory-based Algorithms for Biosecurity, 2005 – 2008Ryan Layfield, Mur<strong>at</strong> Kantarcioglu, Bhavani Thuraisingham94

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!