Section 15: NATIONAL AND INTERNATIONALRESEARCH COLLABORATION1985 – 1988: I have carried out both n<strong>at</strong>ional and intern<strong>at</strong>ional collabor<strong>at</strong>ion since 1985. While I worked<strong>at</strong> the Control D<strong>at</strong>a Corpor<strong>at</strong>ion and Honeywell Inc., I collabor<strong>at</strong>ed closely with pr<strong>of</strong>essors <strong>at</strong> the<strong>University</strong> <strong>of</strong> Minnesota and we published several papers in conferences within the USA.1989 – 2001: When I joined MITRE, I presented papers <strong>at</strong> both n<strong>at</strong>ional and intern<strong>at</strong>ional conferences. Myfirst internal conference was on secure object systems in Karlsruhe, Germany in April 1990 and the secondconference was in Halifax, UK in September 1990. I started collabor<strong>at</strong>ing with researchers <strong>at</strong> the<strong>University</strong> <strong>of</strong> Rhode Island in 1994 and we published several papers in both n<strong>at</strong>ional and intern<strong>at</strong>ionalconferences. During this time, I also started giving keynote addresses <strong>at</strong> n<strong>at</strong>ional and intern<strong>at</strong>ionalconferences as well as presented papers including in Italy, Spain, Switzerland, Austria, Australia,Netherlands, Sweden, Norway, Finland, Ireland, Japan, Hong Kong, Taiwan, South Africa, India, and NewZealand.2001 – 2004: This is the time I was <strong>at</strong> the N<strong>at</strong>ional Science Found<strong>at</strong>ion in Washington, DC and I initi<strong>at</strong>edprograms between USA and Europe and <strong>at</strong>tended n<strong>at</strong>ional and intern<strong>at</strong>ional conferences to give keynoteaddresses including in the UK, Austria, Belgium, Spain, Switzerland, Greece, and France.2004 – Present: I continue to present papers and give keynote addresses <strong>at</strong> both n<strong>at</strong>ional and intern<strong>at</strong>ionalevents. I also collabor<strong>at</strong>e on research projects with several universities in the US including the <strong>University</strong><strong>of</strong> Maryland Baltimore County, Purdue <strong>University</strong>, <strong>University</strong> <strong>of</strong> Illinois, <strong>University</strong> <strong>of</strong> Minnesota and the<strong>University</strong> <strong>of</strong> <strong>Texas</strong> San Antonio. Much <strong>of</strong> my research is funded by the US Air Force, the N<strong>at</strong>ionalScience Found<strong>at</strong>ion, Advanced Research Projects Activity (Intelligence Community), the N<strong>at</strong>ionalGeosp<strong>at</strong>ial Intelligence Agency, and the N<strong>at</strong>ional Aeronautics and Space Administr<strong>at</strong>ion.Collabor<strong>at</strong>ion with Europe: As part <strong>of</strong> a larger initi<strong>at</strong>ive funded by the US Air Force, I have establishedintern<strong>at</strong>ional research collabor<strong>at</strong>ion with Kings College London and the <strong>University</strong> <strong>of</strong> Insubria in Italy.This has included several trips to the UK to visit researchers <strong>at</strong> Kings College London. Funding for ourEuropean partners is from the US Air Force in Europe (EOARD: European Office <strong>of</strong> Aerospace Researchand Development). <strong>The</strong> project is on assured inform<strong>at</strong>ion sharing and our goal is to demonstr<strong>at</strong>einform<strong>at</strong>ion sharing between US, UK and Italy in the cloud while maintaining security policies.Collabor<strong>at</strong>ion with Asia Pacific: I am hoping to initi<strong>at</strong>e a similar intern<strong>at</strong>ional collabor<strong>at</strong>ion for the USAir Force with Australia. <strong>The</strong> funding for this effort is expected to come from US Air Force in Asia(AOARD: Asia Office <strong>of</strong> Aerospace Research and Development). I gave a keynote address <strong>at</strong> a computerconference in Sydney, Australia in December 2011 and we have begun discussions with researchers fromMacquarie <strong>University</strong> in Sydney, Australia on this collabor<strong>at</strong>ion.98
Section 16: INTELLECTUAL PROPERTY AND PATENTS1. <strong>The</strong> MITRE Corpor<strong>at</strong>ionUS P<strong>at</strong>ent, October 1994, an Appar<strong>at</strong>us and Method for a system for security constraint processing duringd<strong>at</strong>abase query upd<strong>at</strong>e and design oper<strong>at</strong>ions. (with William Ford and Marie Collins).US P<strong>at</strong>ent, January 1996, an Appar<strong>at</strong>us and Method for a system for handling the inference problem basedon Nonmonotonic Typed Multilevel Logic.US P<strong>at</strong>ent, December 1997, an Appar<strong>at</strong>us and Method for a system for expert inference control (withWilliam Ford).St<strong>at</strong>us <strong>of</strong> my p<strong>at</strong>ents: In 2003, former Micros<strong>of</strong>t CTO N<strong>at</strong>han Myhrvold’s company (Intellectual Ventures)wanted to purchase 4 p<strong>at</strong>ents from MITRE. Three <strong>of</strong> them were mine. MITRE also as a bonus gave themadditional p<strong>at</strong>ents together with the 4 must have p<strong>at</strong>ents for $2m approx. Each <strong>of</strong> the inventors was given$7K.2. <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>P<strong>at</strong>ent Applic<strong>at</strong>ion: Systems and Methods for Detecting a Novel D<strong>at</strong>a ClassUTD-10-017 (Applic<strong>at</strong>ion Number 13/214,720)P<strong>at</strong>ent Applic<strong>at</strong>ion: A Method and System to Determine and Identify Loc<strong>at</strong>ion <strong>of</strong> Users by MiningSocial Networking D<strong>at</strong>a and Inform<strong>at</strong>ion (61/525,614)Intellectual Property DisclosuresDisclosure Number: 09-037Title: Policy Management for Assured Inform<strong>at</strong>ion Sharing in a CoalitionEnvironmentInventors: B. Thuraisingham, L. Khan, M. KantarciogluDisclosure Number: 10-017Title: Classific<strong>at</strong>ion and Novel Class Detection in Concept-Drifting D<strong>at</strong>aStreams Under Time ConstraintsInventors: L. Khan, M. Masud (former UTD Post-doc), B. ThuraisinghamDisclosure Number: 10-019Title: Biological Weapon Attack Simul<strong>at</strong>ion Using Social Network andGame <strong>The</strong>oretic ModelingInventors: M. Kantarcioglu, R. Layfield (former Ph.D. student)Disclosure Number: 10-054Title: Agglomer<strong>at</strong>ive Clustering using Label Propag<strong>at</strong>ion for Loc<strong>at</strong>ionMiningInventors: S. Abrol, L. Khan, B. Thuraisingham99
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36:
3. CIA: As manager of fifteen resea
- Page 37 and 38:
15. Multilevel Security Issues in D
- Page 39 and 40:
48. E-Mail Worm Detection Using Dat
- Page 41 and 42:
79. Information Demands Drive Data
- Page 43 and 44:
2. Foundations of Multilevel Databa
- Page 45 and 46:
32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97: 1. Geospatial Proximity Algorithm,
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH