Advisor to the following prototypes developed by members <strong>of</strong> my department in D<strong>at</strong>a Mining.Distributed Objects and Multimedia Inform<strong>at</strong>ion Management16. Text D<strong>at</strong>a Mining ToolPI: C. Clifton17. Image Mining ToolPI: C. Clifton18. Broadcast News Navig<strong>at</strong>ion SystemPI: A. Merlino19. Distributed Object Management for Legacy System Migr<strong>at</strong>ionPI: E. Hughes<strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>D<strong>at</strong>a Mining Tools1. Suspicious Event Detection and Surveillance, 2004 – 2005Gal Lavee, Bhavani Thuraisingham, L<strong>at</strong>ifur KhanDeveloped a system for detecting suspicious events. Developed a distance m<strong>at</strong>rix to identify eventsth<strong>at</strong> are similar.2. D<strong>at</strong>a Mining Toolkit for Malware Detection, 2005 – 2009Mehedy Masud, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDeveloped d<strong>at</strong>a mining algorithms using WEKA and other tools to detect buffer overflow, andmalicious code.3. Stream Mining Tools, 2008 – 2009Mehedy Masud, L<strong>at</strong>ifur Khan, Bhavani Thuraisingham with Jiawei Han et al.Developed a stream mining algorithm for novel class detection.Inform<strong>at</strong>ion Sharing, Privacy, and Policy Management4. Assured Inform<strong>at</strong>ion Sharing, 2007 – 2008Yashaswini Harshakumar, Bhavani Thuraisingham, L<strong>at</strong>ifur KhanUsing Oracle d<strong>at</strong>abase systems and XACML policies implemented assured inform<strong>at</strong>ion sharingprototype.5. Assured Inform<strong>at</strong>ion Sharing Simul<strong>at</strong>ion, 2005 – 2006Mamoun Awad, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamSimul<strong>at</strong>ed policy management in inform<strong>at</strong>ion sharing algorithms and determined the amount <strong>of</strong>inform<strong>at</strong>ion th<strong>at</strong> would be lost by enforcing policies. This would give guidance to the decision makers<strong>of</strong> the policies th<strong>at</strong> need to be enforced.6. Trust Management in Inform<strong>at</strong>ion Sharing, Simul<strong>at</strong>ion, 2006 – 2007R. Srinivasan and B. ThuraisinghamComputes trust and shares inform<strong>at</strong>ion based on trust values.7. Game <strong>The</strong>ory-based Algorithms for Biosecurity, 2005 – 2008Ryan Layfield, Mur<strong>at</strong> Kantarcioglu, Bhavani Thuraisingham94
Simul<strong>at</strong>ed algorithms for inform<strong>at</strong>ion sharing using game theory concepts for bioterrorism and insecurity.8. Privacy Preserving Decision Tree, 2005 – 2007Li Liu, Mur<strong>at</strong> Kantarcioglu, Bhavani ThuraisinghamDeveloped a tool based on decision tree for privacy preserving d<strong>at</strong>a mining.9. Security for Motion Capture and Anim<strong>at</strong>ion, 2008R. N<strong>at</strong>arajan, B. Thuraisingham, L. Khan, and B. PrabhakaranPrototype system th<strong>at</strong> builds a front-end to perform query rewriting for motion capture d<strong>at</strong>aGeosp<strong>at</strong>ial Inform<strong>at</strong>ion Management10. Geosp<strong>at</strong>ial Policy Interoperability, 2006 – 2007Alam Ashraful, Farhan Husain, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDevelop a prototype for implementing security policies in heterogeneous geosp<strong>at</strong>ial d<strong>at</strong>a managementsystems.11. Police Blotter Prototype, 2006Farhan Husain, L<strong>at</strong>ifur Khan, A. Ashraful, Bhavani Thuraisingham, Steven SeidaThis system, jointly developed with Raytheon, essentially is an advisory tool for police to loc<strong>at</strong>e wherethe criminals are. <strong>The</strong> system was demonstr<strong>at</strong>ed <strong>at</strong> GEOINT.12. Geosp<strong>at</strong>ial D<strong>at</strong>a Mining, 2006 – 2007Chuan Li, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDeveloped tool for classifying geosp<strong>at</strong>ial d<strong>at</strong>a.13. Ontology Alignment in Geosp<strong>at</strong>ial D<strong>at</strong>a, 2007 – 2009Jeff Partyka, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDeveloped ontology alignment algorithms for integr<strong>at</strong>ing heterogeneous geosp<strong>at</strong>ial d<strong>at</strong>abase systems.<strong>The</strong> algorithms were integr<strong>at</strong>ed into Intelligence Community’s Blackbook.Semantic Web, Web Services and Security14. Transl<strong>at</strong>ors and Mappings from Rel<strong>at</strong>ional to RDF D<strong>at</strong>a and Vice Versa, 2007 – 2009Sunitha Sriram, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDeveloped a tool for use by rel<strong>at</strong>ional d<strong>at</strong>abase users and RDF users to carry out transl<strong>at</strong>ions. Tool willbe distributed to external users.15. Inference Controller for Semantic Web, 2009Tyrone Cadenhead, Mur<strong>at</strong> Kantarcioglu, Bhavani ThuraisinghamPrototype developed for Policy Management using descriptive logic based inference controller.16. Geosp<strong>at</strong>ial Semantic Web, 2006 – 2007Ganesh Subbiah, L<strong>at</strong>ifur Khan, Bhavani Thuraisingham, Alam AshrafulDeveloped a system called DAGIS to answer geosp<strong>at</strong>ial semantic queries. Implemented an accesscontrol module for DAGIS.17. Secure Web Services, 2007 – 2010Wei-She, I-Ling Yen, Bhavani ThuraisinghamImplemented a deleg<strong>at</strong>ion model for secure web services.95
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36:
3. CIA: As manager of fifteen resea
- Page 37 and 38:
15. Multilevel Security Issues in D
- Page 39 and 40:
48. E-Mail Worm Detection Using Dat
- Page 41 and 42:
79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93: 5. Secure Distributed Query Process
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH