Bhavani Thuraisingham

Orcid: 0000-0003-4653-2080

Affiliations:
  • University of Texas at Dallas, Cyber Security Research and Education Institute (CSI), Richardson, TX, USA
  • University of Bristol, UK (DEng 2010)
  • MITRE Corporation, Bedford, MA, USA (former)
  • Honeywell Computer Sciences Center, Golden Valley, MN, USA (former)
  • New Mexico Institute of Mining and Technology, Department of Computer Science, Socorro, NM, USA (former)
  • University of Wales, Swansea, UK (PhD 1979)


According to our database1, Bhavani Thuraisingham authored at least 481 papers between 1982 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2018, "For contributions to methods, tools, and systems for security and privacy of data and applications".

IEEE Fellow

IEEE Fellow 2003, "For contributions to secure systems involving database systems, distributed systems, and the web.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Diversity, Equity and Inclusion Activities in Database Conferences: A 2022 Report.
SIGMOD Rec., June, 2023

Blockchain-Enabled Service Optimizations in Supply Chain Digital Twin.
IEEE Trans. Serv. Comput., 2023

A Privacy-Preserving Architecture and Data-Sharing Model for Cloud-IoT Applications.
IEEE Trans. Dependable Secur. Comput., 2023

Advanced Persistent Threat Detection Using Data Provenance and Metric Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Con2Mix: A semi-supervised method for imbalanced tabular security data.
J. Comput. Secur., 2023

An Automated Vulnerability Detection Framework for Smart Contracts.
CoRR, 2023

Secure Multimedia Data Systems in the Era of Artificial Intelligence: Significant Progress and Vision for the Future.
Proceedings of the 5th IEEE International Conference on Trust, 2023

A Transparent Blockchain-Based College Admissions Platform.
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023

SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

WokeGPT: Improving Counterspeech Generation Against Online Hate Speech by Intelligently Augmenting Datasets Using a Novel Metric.
Proceedings of the International Joint Conference on Neural Networks, 2023

The Design and Application of a Unified Ontology for Cyber Security.
Proceedings of the Information Systems Security - 19th International Conference, 2023

The Design of an Ontology for ATT&CK and its Application to Cybersecurity.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Introduction to the Special Issue on Smart Systems for Industry 4.0 and IoT.
ACM Trans. Manag. Inf. Syst., December, 2022

SACCOS: A Semi-Supervised Framework for Emerging Class Detection and Concept Drift Adaption Over Data Streams.
IEEE Trans. Knowl. Data Eng., 2022

Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI).
IEEE Trans. Dependable Secur. Comput., 2022

GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game.
IEEE Trans. Dependable Secur. Comput., 2022

Trustworthy Machine Learning.
IEEE Intell. Syst., 2022

Trustworthy Machine Learning for Securing IoT Systems.
Proceedings of the 7th IEEE International Conference on Smart Cloud, SmartCloud 2022, 2022

CAPT: Contrastive Pre-Training based Semi-Supervised Open-Set Learning.
Proceedings of the 5th IEEE International Conference on Multimedia Information Processing and Retrieval, 2022

Personalized Hashtag Recommendation with User-level Meta-learning.
Proceedings of the International Joint Conference on Neural Networks, 2022

Imbalanced Adversarial Training with Reweighting.
Proceedings of the IEEE International Conference on Data Mining, 2022

LPC: A Logits and Parameter Calibration Framework for Continual Learning.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Knowledge Mining in Cybersecurity: From Attack to Defense.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Security and Privacy for Emerging IoT and CPS Domains.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

A Federated Approach for Learning from Electronic Health Records.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

2021
GraphBoot: Quantifying Uncertainty in Node Feature Learning on Large Networks.
IEEE Trans. Knowl. Data Eng., 2021

Deep Residual Learning-Based Enhanced JPEG Compression in the Internet of Things.
IEEE Trans. Ind. Informatics, 2021

BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks.
IEEE Trans. Dependable Secur. Comput., 2021

Special Issue on Robustness and Efficiency in the Convergence of Artificial Intelligence and IoT.
IEEE Internet Things J., 2021

Multi-concept adversarial attacks.
CoRR, 2021

DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Fairness-Aware Online Meta-learning.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

An Episodic Learning based Geolocation Detection Framework for Imbalanced Data.
Proceedings of the International Joint Conference on Neural Networks, 2021

Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces.
Proceedings of the Information Systems Security - 17th International Conference, 2021

Integrating Big Data, Data Science and Cyber Security with Applications in Cloud and Internet of Things.
Proceedings of the 13th International Joint Conference on Knowledge Discovery, 2021

Data-Driven Time Series Forecasting for Social Studies Using Spatio-Temporal Graph Neural Networks.
Proceedings of the GoodIT '21: Conference on Information Technology for Social Good, 2021

Graph-Based Specification of Admin-CBAC Policies.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Shared Reality: Detecting Stealthy Attacks Against Autonomous Vehicles.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

Unsupervised Perturbation based Self-Supervised Adversarial Training.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Progressive One-shot Human Parsing.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Digital Trust: Trust Management in Cyberspace.
IEEE Internet Comput., 2020

COVID-19: The Information Warfare Paradigm Shift.
CoRR, 2020

MultiModal Deception Detection: Accuracy, Applicability and Generalizability.
Proceedings of the Second IEEE International Conference on Trust, 2020

Blockchain Technologies and Their Applications in Data Science and Cyber Security.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

Secure Data Sharing Through Untrusted Clouds with Blockchain-enhanced Key Management.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

A Data Access Model for Privacy-Preserving Cloud-IoT Architectures.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Artificial Intelligence and Data Science Governance: Roles and Responsibilities at the C-Level and the Board.
Proceedings of the 21st International Conference on Information Reuse and Integration for Data Science, 2020

The Role of Artificial Intelligence and Cyber Security for Social Media.
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium Workshops, 2020

The Role of Artificial Intelligence and Cyber Security for Social Networks and Internet of Transportation.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020

Keynote Speech 1: Integrating Big Data, Data Science and Cyber Security with Applications in Internet of Transportation and Infrastructures.
Proceedings of the International Conference on Intelligent Data Science Technologies and Applications, 2020

Keynote I Cyber Security Meets Big Knowledge: Towards a Secure HACE Theorem.
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020

Cyber Security Meets Big Knowledge: Towards a Secure HACE Theorem.
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020

Attacking Machine Learning Models for Social Good.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation Systems.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Next - Location Prediction Using Federated Learning on a Blockchain.
Proceedings of the 2nd IEEE International Conference on Cognitive Machine Intelligence, 2020

Can AI be for Good in the Midst of Cyber Attacks and Privacy Violations?: A Position Paper.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Admin-CBAC: An Administration Model for Category-Based Access Control.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Multi-Generational Database Inference Controllers.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

Data Science, COVID-19 Pandemic, Privacy and Civil Liberties.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Cloud Governance.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
Multistream Classification for Cyber Threat Data with Heterogeneous Feature Space.
Proceedings of the World Wide Web Conference, 2019

Towards Self-Adaptive Metric Learning On the Fly.
Proceedings of the World Wide Web Conference, 2019

An OpenRBAC Semantic Model for Access Control in Vehicular Networks.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Cyber Security and Data Governance Roles and Responsibilities at the C-Level and the Board.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Mimicking Human Behavior in Shared-Resource Computer Networks.
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019

Privacy-Preserving Architecture for Cloud-IoT Platforms.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

ChainNet: Learning on Blockchain Graphs with Topological Features.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

Where Did the Political News Event Happen? Primary Focus Location Extraction in Different Languages.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Specification and Analysis of ABAC Policies via the Category-based Metamodel.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Multilevel Secure Database Management System.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Mandatory Access Control.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry.
Future Gener. Comput. Syst., 2018

Towards a Privacy-Aware Qunatified Self Data Management Framework.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Privacy Preserving Synthetic Data Release Using Deep Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Attacklets: Modeling High Dimensionality in Real World Cyberattacks.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Large-Scale Realistic Network Data Generation on a Budget.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

Integrating Cyber Security and Data Science for Social Media: A Position Paper.
Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, 2018

Graph-Based Data-Collection Policies for the Internet of Things.
Proceedings of the 4th Annual Industrial Control System Security Workshop, 2018

Automated Threat Report Classification over Multi-Source Data.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

GCI: A Transfer Learning Approach for Detecting Cheats of Computer Game.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Privacy and Security Challenges in GIS.
Proceedings of the Encyclopedia of GIS., 2017

Geospatial Semantic Web, Definition.
Proceedings of the Encyclopedia of GIS., 2017

INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research.
IEEE Secur. Priv., 2017

The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research.
CoRR, 2017

Hacking social network data mining.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Malware Collection and Analysis.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

Securing Data Analytics on SGX with Randomization.
Proceedings of the Computer Security - ESORICS 2017, 2017

From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Unsupervised deep embedding for novel class detection over data stream.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Focus location extraction from political news reports with bias correction.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2016
Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems.
IEEE Trans. Serv. Comput., 2016

Online anomaly detection for multi-source VMware using a distributed streaming framework.
Softw. Pract. Exp., 2016

Near real-time atrocity event coding.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

A Framework for Secure Data Collection and Management for Internet of Things.
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016

Efficient handling of concept drift and concept evolution over Stream Data.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Message from the SEPT Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Spark-Based Political Event Coding.
Proceedings of the Second IEEE International Conference on Big Data Computing Service and Applications, 2016

Adaptive encrypted traffic fingerprinting with bi-directional dependence.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Emerging Web Services.
IEEE Trans. Serv. Comput., 2015

Services in the Cloud.
IEEE Trans. Serv. Comput., 2015

P2V: Effective Website Fingerprinting Using Vector Space Representations.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

Honeypot based unauthorized data access detection in MapReduce systems.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Design and Implementation of a Semantic Web-Based Inference Controller: A Summary.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

Real-Time Stream Data Analytics for Multi-purpose Social Media Applications.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Message from SEPT Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Big Data Security and Privacy.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

Database Security: Past, Present, and Future.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

2014
A roadmap for privacy-enhanced secure data provenance.
J. Intell. Inf. Syst., 2014

An individual-based model of information diffusion combining friends' influence.
J. Comb. Optim., 2014

Guest editorial: Information reuse, integration, and reusable systems.
Inf. Syst. Frontiers, 2014

RDF-X: a language for sanitizing RDF graphs.
Proceedings of the 23rd International World Wide Web Conference, 2014

Redaction based RDF access control language.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Towards fine grained RDF access control.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Real-time anomaly detection over VMware performance data using storm.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Deploying malware detection software for smart phones.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Stream Mining Using Statistical Relational Learning.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

Evolving stream classification using change detection.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

Spark-based anomaly detection over multi-source VMware performance data in real-time.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

Statistical technique for online anomaly detection using Spark over heterogeneous data from multi-source VMware performance data.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

Evolving Big Data Stream Classification with MapReduce.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

Secure Data Provenance and Inference Control with Semantic Web.
CRC Press, ISBN: 978-1-4665-6943-0, 2014

2013
Security-Aware Service Composition with Fine-Grained Information Flow Control.
IEEE Trans. Serv. Comput., 2013

Preventing Private Information Inference Attacks on Social Networks.
IEEE Trans. Knowl. Data Eng., 2013

Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications.
Mob. Networks Appl., 2013

State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks.
IT Prof., 2013

Evolving Insider Threat Detection Stream Mining Perspective.
Int. J. Artif. Intell. Tools, 2013

Data security services, solutions and standards for outsourcing.
Comput. Stand. Interfaces, 2013

REDACT: a framework for sanitizing RDF data.
Proceedings of the 22nd International World Wide Web Conference, 2013

Measuring expertise and bias in cyber security using cognitive and neuroscience approaches.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Behavioral sequence prediction for evolving data stream.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Least Cost Rumor Blocking in Social Networks.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

Analysis of heuristic based access pattern obfuscation.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

MapReduce-guided scalable compressed dictionary construction for evolving repetitive sequence streams.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Intelligent MapReduce Based Framework for Labeling Instances in Evolving Data Stream.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Effective Software Fault Localization Using an RBF Neural Network.
IEEE Trans. Reliab., 2012

Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy.
IEEE Trans. Dependable Secur. Comput., 2012

Design and Implementation of a Data Mining System for Malware Detection.
J. Integr. Des. Process. Sci., 2012

PTAS for the minimum weighted dominating set in growth bounded graphs.
J. Glob. Optim., 2012

Bin-Carver: Automatic recovery of binary executable files.
Digit. Investig., 2012

Optmized ontology-driven query expansion using map-reduce framework to facilitate federated queries.
Comput. Syst. Sci. Eng., 2012

Cyberphysical systems security applied to telesurgical robotics.
Comput. Stand. Interfaces, 2012

StormRider: harnessing "storm" for social networks.
Proceedings of the 21st World Wide Web Conference, 2012

Tag-based Information Flow Analysis for Document Classification in Provenance.
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012

Tweeque: Spatio-Temporal Analysis of Social Networks for Location Mining Using Graph Partitioning.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

Unsupervised Ensemble Based Learning for Insider Threat Detection.
Proceedings of the 2012 International Conference on Privacy, 2012

Jena-HBase: A Distributed, Scalable and Effcient RDF Triple Store.
Proceedings of the ISWC 2012 Posters & Demonstrations Track, 2012

Expanded Semantic Graph Representation for Matching Related Information of Interest across Free Text Documents.
Proceedings of the Sixth IEEE International Conference on Semantic Computing, 2012

A cloud-based RDF policy engine for assured information sharing.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Cloud-Centric Assured Information Sharing.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Design and Implementation of a Cloud-Based Assured Information Sharing System.
Proceedings of the Computer Network Security, 2012

Adversarial support vector machine learning.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Unsupervised incremental sequence learning for insider threat detection.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Towards cyber operations - The new role of academic cyber security research and education.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Extracting semantic information structures from free text law enforcement data.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Design and implementation of SNODSOC: Novel class detection for social network analysis.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Secure information integration with a semantic web-based framework.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Panel: Using information re-use and integration principles in big data.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Sparse Bayesian Adversarial Learning Using Relevance Vector Machine Ensembles.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Self-Training with Selection-by-Rejection.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Stream Classification with Recurring and Novel Class Detection Using Class-Based Ensemble.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement Documents.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Randomizing Smartphone Malware Profiles against Statistical Mining Techniques.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Tweecalization: Efficient and intelligent location mining in twitter using semi-supervised learning.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Risk-Aware Workload Distribution in Hybrid Clouds.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

Cloud Guided Stream Classification Using Class-Based Ensemble.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Enhanced geographically typed semantic schema matching.
J. Web Semant., 2011

Cloud-based malware detection for evolving data streams.
ACM Trans. Manag. Inf. Syst., 2011

Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints.
IEEE Trans. Knowl. Data Eng., 2011

Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing.
IEEE Trans. Knowl. Data Eng., 2011

Secure Semantic Computing.
Int. J. Semantic Comput., 2011

Introduction to secure Semantic Web.
Comput. Stand. Interfaces, 2011

Geospatial Resource Description Framework (GRDF) and security constructs.
Comput. Stand. Interfaces, 2011

Secure Data Processing in a Hybrid Cloud
CoRR, 2011

Semantic web-based social network access control.
Comput. Secur., 2011

A Framework for Policies over Provenance.
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011

Role-based integrated access control and data provenance for SOA based net-centric systems.
Proceedings of the IEEE 6th International Symposium on Service Oriented System Engineering, 2011

Insider Threat Detection Using Stream Mining and Graph Mining.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Transforming provenance using redaction.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Differentiating Code from Data in x86 Binaries.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2011

Extraction of expanded entity phrases.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Identification of related information of interest across free text documents.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

RDFKB: A Semantic Web Knowledge Base.
Proceedings of the IJCAI 2011, 2011

Rule-Based Run-Time Information Flow Control in Service Cloud.
Proceedings of the IEEE International Conference on Web Services, 2011

Ontology-Driven Query Expansion Using Map/Reduce Framework to Facilitate Federated Queries.
Proceedings of the IEEE International Conference on Web Services, 2011

Supervised Learning for Insider Threat Detection Using Stream Mining.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

Detecting Recurring and Novel Classes in Concept-Drifting Data Streams.
Proceedings of the 11th IEEE International Conference on Data Mining, 2011

Data Mining for Malicious Code Detection and Security Applications.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Identity management for cloud computing: developments and directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Towards privacy preserving access control in the cloud.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

A language for provenance access control.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Scalable Complex Query Processing over Large Semantic Web Data Using Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Research contributions in secure dependable data management.
PhD thesis, 2010

Editorial SACMAT 2007.
ACM Trans. Inf. Syst. Secur., 2010

Secure Data Objects Replication in Data Grid.
IEEE Trans. Dependable Secur. Comput., 2010

Enhancing Security Modeling for Web Services Using Delegation and Pass-On.
Int. J. Web Serv. Res., 2010

Update-Enabled Triplification of Relational Data into Virtual RDF Stores.
Int. J. Semantic Comput., 2010

Security Issues for Cloud Computing.
Int. J. Inf. Secur. Priv., 2010

Policy Enforcement System for Inter-Organizational Data Sharing.
Int. J. Inf. Secur. Priv., 2010

Relationalization of provenance data in complex RDF reification nodes.
Electron. Commer. Res., 2010

Information and communications security, privacy and trust: Standards and regulations.
Comput. Stand. Interfaces, 2010

Ranking Ontologies Using Verified Entities to Facilitate Federated Queries.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Secure Semantic Sensor Web and Pervasive Computing.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

Ontology-driven query expansion methods to facilitate federated queries.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010

Efficient Processing of Large RDF Streams Using Memory Management Algorithms.
Proceedings of the ISWC 2010 Posters & Demonstrations Track: Collected Abstracts, 2010

Bi-directional Translation of Relational Data into Virtual RDF Stores.
Proceedings of the 4th IEEE International Conference on Semantic Computing (ICSC 2010), 2010

Classification and Novel Class Detection of Data Streams in a Dynamic Feature Space.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2010

Classification and Novel Class Detection in Data Streams with Active Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010

Policy-Driven Service Composition with Information Flow Control.
Proceedings of the IEEE International Conference on Web Services, 2010

Addressing Concept-Evolution in Concept-Drifting Data Streams.
Proceedings of the ICDM 2010, 2010

Geospatial Schema Matching with High-Quality Cluster Assurance and Location Mining from Social Network.
Proceedings of the ICDMW 2010, 2010

Scalable and Efficient Reasoning for Enforcing Role-Based Access Control.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Challenges and Future Directions of Software Technology: Secure Software Development.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

WS-Sim: A Web Service Simulation Toolset with Realistic Data Support.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Secure data storage and retrieval in the cloud.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

A Token-Based Access Control System for RDF Data in the Clouds.
Proceedings of the Cloud Computing, Second International Conference, 2010

Data Intensive Query Processing for Large RDF Graphs Using Cloud Computing Tools.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
Multilevel Secure Database Management System.
Proceedings of the Encyclopedia of Database Systems, 2009

Mandatory Access Control.
Proceedings of the Encyclopedia of Database Systems, 2009

Homeland Security Data Mining and Link Analysis.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

A risk management approach to RBAC.
Risk Decis. Anal., 2009

Necessary and sufficient conditions for transaction-consistent global checkpoints in a distributed database system.
Inf. Sci., 2009

R2d: a Framework for the Relational Transformation of RDF Data.
Int. J. Semantic Comput., 2009

A Better Approximation for Minimum Average Routing Path Clustering Problem in 2-d Underwater Sensor Networks.
Discret. Math. Algorithms Appl., 2009

A Construction of Cartesian Authentication Code from Orthogonal Spaces over a Finite Field of odd Characteristic.
Discret. Math. Algorithms Appl., 2009

Design and implementation of a secure social network system.
Comput. Syst. Sci. Eng., 2009

Exploiting an antivirus interface.
Comput. Stand. Interfaces, 2009

Privacy preservation in wireless sensor networks: A state-of-the-art survey.
Ad Hoc Networks, 2009

Relationalizing RDF stores for tools reusability.
Proceedings of the 18th International Conference on World Wide Web, 2009

Inferring private information using social network data.
Proceedings of the 18th International Conference on World Wide Web, 2009

R2D: Extracting Relational Structure from RDF Stores.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Security Engineering: Developments and Directions.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Effective and efficient implementation of an information flow control protocol for service composition.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

Semantic Web for Content Based Video Retrieval.
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009

R2D: A Bridge between the Semantic Web and Relational Visualization Tools.
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009

Semantic Schema Matching without Shared Instances.
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009

Query Processing Techniques for Compliance with Data Confidence Policies.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

A semantic web based framework for social network access control.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2009

A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009

Design of a temporal geosocial semantic web for military stabilization and reconstruction operations.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009

Data security and integrity: developments and directions.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009

Design and implementation of a secure social network system.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

On the mitigation of bioterrorism through game theory.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Social network classification incorporating link type values.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009


Building Trustworthy Semantic Webs.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009

A Relational Wrapper for RDF Reification.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

The SCIFC Model for Information Flow Control in Web Service Composition.
Proceedings of the IEEE International Conference on Web Services, 2009

Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Privacy Preserving Decision Tree Mining from Perturbed Data.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Geographically-typed semantic schema matching.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009

Dynamic Service and Data Migration in the Clouds.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
On the Complexity of the Privacy Problem in Databases.
Proceedings of the Data Mining: Foundations and Practice, 2008

Assured Information Sharing: Technologies, Challenges and Directions.
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008

Managing and Mining Multimedia Data, Animations and Annotations.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Privacy and Security Challenges in GIS.
Proceedings of the Encyclopedia of GIS., 2008

Geospatial Semantic Web, Definition.
Proceedings of the Encyclopedia of GIS., 2008

Secure Semantic Web Services.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Predicting WWW surfing using multiple evidence combination.
VLDB J., 2008

A scalable multi-level feature extraction technique to detect malicious executables.
Inf. Syst. Frontiers, 2008

Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing.
IEEE Internet Comput., 2008

Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries.
Int. J. Inf. Secur. Priv., 2008

The applicability of the perturbation based privacy preserving data mining for real-world data.
Data Knowl. Eng., 2008

An Effective Evidence Theory Based K-Nearest Neighbor (KNN) Classification.
Proceedings of the 2008 IEEE / WIC / ACM International Conference on Web Intelligence, 2008

Ontology Alignment Using Multiple Contexts.
Proceedings of the Poster and Demonstration Session at the 7th International Semantic Web Conference (ISWC2008), 2008

R<i>OWL</i>BAC: representing role based access control in <i>OWL</i>.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Role Based Access Control and OWL.
Proceedings of the Fourth OWLED Workshop on OWL: Experiences and Directions, 2008

Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

The SCRUB security data sharing infrastructure.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Data Mining for Security Applications and Its Privacy Implications.
Proceedings of the Privacy, 2008

QoS Aware Dependable Distributed Stream Processing.
Proceedings of the 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), 2008

Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Simulating bioterrorism through epidemiology approximation.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Detecting Remote Exploits Using Data Mining.
Proceedings of the Advances in Digital Forensics IV, 2008

A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

Message from the SSW'08 organizers.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Differences in Fitts' Law Task Performance Based on Environment Scaling.
Proceedings of the Haptics: Perception, 2008

Content-based ontology matching for GIS datasets.
Proceedings of the 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2008

Security and privacy for geospatial data: concepts and research directions.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Trustworthy Semantic Web Technologies for Secure Knowledge Management.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Data Mining for Security Applications.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Panel Session: What Are the Key Challenges in Distributed Security?.
Proceedings of the Data and Applications Security XXII, 2008

Peer to peer botnet detection for cyber-security: a data mining approach.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

End-to-end accountability in grid computing systems for coalition information sharing.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

Incentive and Trust Issues in Assured Information Sharing.
Proceedings of the Collaborative Computing: Networking, 2008

Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case.
Proceedings of the The Third International Conference on Availability, 2008

2007
A new intrusion detection system using support vector machines and hierarchical clustering.
VLDB J., 2007

PP-trust-X: A system for privacy preserving trust negotiations.
ACM Trans. Inf. Syst. Secur., 2007

Security and privacy for multimedia database management systems.
Multim. Tools Appl., 2007

A framework for a video analysis tool for suspicious event detection.
Multim. Tools Appl., 2007

Security for Enterprise Resource Planning Systems.
Inf. Secur. J. A Glob. Perspect., 2007

Administering the Semantic Web: Confidentiality, Privacy, and Trust Management.
Int. J. Inf. Secur. Priv., 2007

E-Mail Worm Detection Using Data Mining.
Int. J. Inf. Secur. Priv., 2007

Extended RBAC-based design and implementation for a secure data warehouse.
Int. J. Bus. Intell. Data Min., 2007

A framework for automated image annotation.
Comput. Syst. Sci. Eng., 2007

Standards for secure data sharing across organizations.
Comput. Stand. Interfaces, 2007

Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs
CoRR, 2007

SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Feature Based Techniques for Auto-Detection of Novel Email Worms.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Managing Risks in RBAC Employed Distributed Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Multimedia systems security.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON.
Proceedings of the Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 2007

Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

A Hybrid Model to Detect Malicious Executables.
Proceedings of IEEE International Conference on Communications, 2007

Delegation-Based Security Model for Web Services.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

Geospatial data qualities as web services performance metrics.
Proceedings of the 15th ACM International Symposium on Geographic Information Systems, 2007

DAGIS: A Geospatial Semantic Web Services Discovery and Selection Framework.
Proceedings of the GeoSpatial Semantics, Second International Conference, 2007

Design and Simulation of Trust Management Techniques for a Coalition Data Sharing Environment.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

Enforcing Honesty in Assured Information Sharing Within a Distributed System.
Proceedings of the Data and Applications Security XXI, 2007

Secure peer-to-peer networks for trusted collaboration.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

Centralized Security Labels in Decentralized P2P Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Extended RBAC - Based Design and Implementation for a Secure Data Warehouse.
Proceedings of the The Second International Conference on Availability, 2007

Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances.
Proceedings of the The Second International Conference on Availability, 2007

2006
Guest editorial: special issue on privacy preserving data management.
VLDB J., 2006

Secure knowledge management: confidentiality, trust, and privacy.
IEEE Trans. Syst. Man Cybern. Part A, 2006

Access control for web data: models and policy languages.
Ann. des Télécommunications, 2006

Directions and trends of XML and web service security.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Reasoning with semantics-aware access control policies for geospatial web services.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Access control, confidentiality and privacy for video surveillance databases.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Data Mining for Surveillance Applications.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

Dependable and Secure TMO Scheme.
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006

Face Recognition Using Multiple Classifiers.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006

The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Detection and Resolution of Anomalies in Firewall Policy Rules.
Proceedings of the Data and Applications Security XX, 2006

Web and information security.
IRM Press, ISBN: 978-1-59140-588-7, 2006

2005
Privacy-Preserving Data Mining: Development and Directions.
J. Database Manag., 2005

Privacy constraint processing in a privacy-enhanced database management system.
Data Knowl. Eng., 2005

Security standards for the semantic web.
Comput. Stand. Interfaces, 2005

Directions for security and privacy for semantic e-business applications.
Commun. ACM, 2005

Message correlation in automated communication surveillance through singular value decomposition and word frequency association.
Proceedings of the 6th international workshop on Multimedia data mining, 2005

Dependable Real-Time Data Mining.
Proceedings of the Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2005), 2005

Towards Access Control for Visual Web Model Management.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Multilevel Secure Teleconferencing over Public Switched Telephone Network.
Proceedings of the Data and Applications Security XIX, 2005

Secure Model Management Operations for the Web.
Proceedings of the Data and Applications Security XIX, 2005

Trust Management in a Distributed Environment.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Selective and Authentic Third-Party Distribution of XML Documents.
IEEE Trans. Knowl. Data Eng., 2004

Secure sensor information management and mining.
IEEE Signal Process. Mag., 2004

Editorial.
J. Intell. Inf. Syst., 2004

Managing and Mining Multimedia Databases.
Int. J. Artif. Intell. Tools, 2004

Data mining for security applications.
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004

What's Next in XML and Databases?
Proceedings of the Current Trends in Database Technology - EDBT 2004 Workshops, 2004

Security and Privacy for Web Databases and Services.
Proceedings of the Advances in Database Technology, 2004

Using RDF for Policy Specification and Enforcement.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

2003
Dependable Infrastructures and Data Managers for Sensor Networks.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003

Grand Challenges in Data Integrity and Quality: Panel Discussion.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

Data Mining and Cyber Security.
Proceedings of the 3rd International Conference on Quality Software (QSIC 2003), 2003

Dependable Computing for National Security.
Proceedings of the 6th International Symposium on Autonomous Decentralized Systems (ISADS 2003), 2003

Data and Applications Security: Past, Present and the Future.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Security Issues for the Semantic Web.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
Data Mining, National Security, Privacy and Civil Liberties.
SIGKDD Explor., 2002

Data and applications security (Guest editorial).
Data Knowl. Eng., 2002

Dependable Semantic Web.
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002

Secure Multimedia Data Management Research Directions.
Proceedings of the 4th International Symposium on Multimedia Software Engineering, 2002

Building Secure Survivable Semantic Webs.
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002

Privacy and Civil Liberties.
Proceedings of the Research Directions in Data and Applications Security, 2002

Web and Information Security: Workshop Summary.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

Data and Applications Security: Developments and Directions.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Scheduling and Priority Mapping for Static Real-Time Middleware.
Real Time Syst., 2001

Security for Distributed Databases.
Inf. Secur. Tech. Rep., 2001

Emerging standards for data mining.
Comput. Stand. Interfaces, 2001

Directions for Web and E-Commerce Applications Security.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Data quality: developments and directions.
Proceedings of the Integrity, 2001

Real-Time Data Mining of Multimedia Objects.
Proceedings of the 4th International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2001), 2001

Database Management and the Internet: Developments and Challenges.
Proceedings of the High-Performance Web Databases, Design, Development, and Deployment, 2001

Panel on XML and Security.
Proceedings of the Database and Application Security XV, 2001

2000
Real-Time CORBA.
IEEE Trans. Parallel Distributed Syst., 2000

Fundamental R&D Issues in Real-Time Distributed Computing.
Proceedings of the 3rd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2000), 2000

Benchmarking Real-Time Distributed Object Management Systems for Evolvable and Adaptable Command and Control Applications.
Proceedings of the 3rd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2000), 2000

Data mining for the e-business: developments and directions.
Proceedings of the Data Mining and Knowledge Discovery: Theory, 2000

Web Security and Privacy (Panel).
Proceedings of the Data and Application Security, 2000

Understanding Data Mining and applying it to Command, Control, Communications and Intelligence Environments.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

Network and Web Security and E-Commerce and Other Applications.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
Information Survivability for Evolvable and Adaptable Real-Time Command and Control Systems.
IEEE Trans. Knowl. Data Eng., 1999

Web Information Management and its Application to Electronic Commerce.
Int. J. Artif. Intell. Tools, 1999

Workshop summary discussions WORDS 99.
Proceedings of the Fourth International Workshop on Object-Oriented Real-Time Dependable Systems, 1999

Towards a real-time agent architecture-a whitepaper.
Proceedings of the Fifth International Workshop on Object-Oriented Real-Time Dependable Systems, 1999

Dependable objects for databases, middleware and methodologies: a position paper.
Proceedings of the Fifth International Workshop on Object-Oriented Real-Time Dependable Systems, 1999

CORBA-based Real-time Trader Service for Adaptable Command and Control Systems.
Proceedings of the 2nd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '99), 1999

Object Technology for Building Adaptable and Evolvable Autonomous Decentralized Systems.
Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems, 1999

Adaptable Real-Time Distributed Object Management for Command and Control Systems.
Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems, 1999

Adaptable Object Request Brokers for Information Survivability of Evolvable Real-Time Command and Control Systems.
Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '99), 1999

1998
Concurrency Control in Real-Time Object-Oriented Systems: The Affected Set Priority Ceiling Protocols.
Proceedings of the 1st International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '98), 1998

Migrating Legacy Databases and Applications (Panel).
Proceedings of the Fourteenth International Conference on Data Engineering, 1998

Security and Privacy Issues for the World Wide Web: Panel Discussion.
Proceedings of the Database Security XII: Status and Prospects, 1998

Panel Overview.
Proceedings of the COMPSAC '98, 1998

1997
Multimedia Database Systems - A New Frontier (Guest Editors' Introduction).
IEEE Multim., 1997

Object technology for the integration of the infrastructure, data manager, and tracker for command and control applications.
Proceedings of the 3rd Workshop on Object-Oriented Real-Time Dependable Systems (WORDS '97), 1997

Data Manager for Evolvable Real-time Command and Control Systems.
Proceedings of the VLDB'97, 1997

Object-Oriented Data Management and Distribution for Real-Time Command and Control Systems.
Proceedings of the Real-Time Database and Information Systems, 1997

Issues on real-time object request brokers.
Proceedings of the Third International Symposium on Autonomous Decentralized Systems, 1997

Security Issues in Data Warehousing and Data Mining: Panel Discussion.
Proceedings of the Database Securty XI: Status and Prospects, 1997

1996
Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology.
IEEE Trans. Knowl. Data Eng., 1996

Improving Timeliness in Real-Time Secure Database Systems.
SIGMOD Rec., 1996

MOMT: A Multilevel Object Modeling Technique for Designing Secure Database Applications.
J. Object Oriented Program., 1996

On real-time extensions to object request brokers: a panel position paper.
Proceedings of WORDS'96. The Second Workshop on Object-Oriented Real-Time Dependable Systems, 1996

Object-oriented implementation of an infrastructure and data manager for real-time command and control systems.
Proceedings of WORDS'96. The Second Workshop on Object-Oriented Real-Time Dependable Systems, 1996

Evolvable Real-Time C3 Systems-II: Real-Time Infrastructure Requirements.
Proceedings of the 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 1996

Security Issues for Data Warehousing and Data Mining.
Proceedings of the Database Security Volume X, 1996

Active real-time database management for command & control applications.
Proceedings of the Workshop on Databases - Active and Real-Time, 1996

1995
Security Constraints in a Multilevel Secure Distributed Database Management System.
IEEE Trans. Knowl. Data Eng., 1995

Data Management Research at The MITRE Corporation.
SIGMOD Rec., 1995

ACM Multimedia '94 Conference Workshop on Multimedia Database Management Systems.
SIGMOD Rec., 1995

Towards the Design of a Multilevel Secure Object-Oriented Database Management System.
J. Object Oriented Program., 1995

Multilevel security for information retrieval systems - II.
Inf. Manag., 1995

Evolvable real-time C3 systems.
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995

Database Issues for Data Visualization: Supporting Interactive Database Explorartion.
Proceedings of the Database Issues for Data Visualization, 1995

Data Mining and Data Visualization.
Proceedings of the Database Issues for Data Visualization, 1995

An Adaptive Policy for Improved Timeliness in Secure Database Systems.
Proceedings of the Database Security IX: Status and Prospects, 1995

Security and Data Mining.
Proceedings of the Database Security IX: Status and Prospects, 1995

Application of Object-Oriented Technology for Integrating Heterogeneous Database Systems.
Proceedings of the 1995 ACM 23rd Annual Conference on Computer Science, CSC '95, Nashville, TN, USA, February 28, 1995

1994
Object-oriented technology for health care and medical information systems.
Proceedings of the Addendum to the Proceedings on Object-Oriented Programming Systems, 1994

Security issues for federated database systems.
Comput. Secur., 1994

A Fine-grained Access Control Model for Object-Oriented DBMSs.
Proceedings of the Database Security, 1994

Hypersemantic Data Modeling for Inference Analysis.
Proceedings of the Database Security, 1994

Security Constraint Processing in a Distributed Database Environment.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994

1993
Concurrency Control in Trusted Database Management Systems: A Survey.
SIGMOD Rec., 1993

Integrating security technology and object-oriented technology (panel).
Proceedings of the Addendum to the Proceedings on Object-Oriented Programming Systems, 1993

Security for object-oriented systems.
Proceedings of the Addendum to the Proceedings on Object-Oriented Programming Systems, 1993

System Function Languages.
Math. Log. Q., 1993

Design and implementation of a query processor for a trusted distributed data base management system.
J. Syst. Softw., 1993

Simulation of join query processing algorithms for a trusted distributed database management system.
Inf. Softw. Technol., 1993

Multilevel security for information retrieval systems.
Inf. Manag., 1993

Design and Implementation of a Database Inference Controller.
Data Knowl. Eng., 1993

Security for Object-Oriented Systems: An Editorial Overview.
Proceedings of the Security for Object-Oriented Systems, 1993

Integrating Object-Oriented Technolgy and Security Technology: A Panel Discussion.
Proceedings of the Eighth Annual Conference on Object-Oriented Programming Systems, 1993

Secure computing with the actor paradigm.
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993

Workshop Summary.
Proceedings of the Database Security, 1993

Applying OMT for Designing Multilevel Database Applications.
Proceedings of the Database Security, 1993

Design and implementation of a distributed database.
Proceedings of the Seventeenth Annual International Computer Software and Applications Conference, 1993

Parallel Processing and Trusted Database Management Systems.
Proceedings of the ACM 21th Conference on Computer Science, 1993

1992
Current Status of R&D in Trusted Database Management Systems.
SIGMOD Rec., 1992

Multilevel security issues in distributed database management systems - III.
Comput. Secur., 1992

A Non-monotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge - II.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

1991
Multilevel security issues in distributed database management systems II.
Comput. Secur., 1991

The Use of Conceptual Structures for Handling the Inference Problem.
Proceedings of the Database Security, 1991

Security Issues in Federated Database Systems: Panel Contributions.
Proceedings of the Database Security, 1991

A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

Security constraint processing during the update operation in a multilevel secure database management system.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991

1990
Design of LDV: A Multilevel Secure Relational Database Management System.
IEEE Trans. Knowl. Data Eng., 1990

Computing Transitive Closures of Multilevel Relations.
SIGMOD Rec., 1990

Towards the Design of a Secure Data/Knowledge Base Management System.
Data Knowl. Eng., 1990

Multilevel Security for Multimedia Database Systems.
Proceedings of the Database Security, 1990

Secure query processing in distributed database management systems-design and performance studies.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
Recovery Point Selection on a Reverse Binary Tree Task Model.
IEEE Trans. Software Eng., 1989

Secure Query-Processing Strategies.
Computer, 1989

A functional view of multilevel databases.
Comput. Secur., 1989

Prototyping to explore MLS/DBMS design.
Comput. Secur., 1989

SODA: A secure object-oriented database system.
Comput. Secur., 1989

Mandatory Security in Object-Oriented Database Systems.
Proceedings of the Conference on Object-Oriented Programming: Systems, 1989

Knowledge-Based Support for the Development of Database-Centered Applications.
Proceedings of the Fifth International Conference on Data Engineering, 1989

Secure query processing in intelligent database management systems.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

1988
AI applications in distributed system design issues.
IEEE Netw., 1988

Representation of One-One Degrees by <i>n</i>-Cylindrical Decision Problems.
Math. Log. Q., 1988

Multilevel security issues in distributed database management systems.
Comput. Secur., 1988

Prototyping as a Research Tool for MLS/DBMS.
Proceedings of the Database Security, 1988

1987
Reducibility Relationships Between Decision Problems for System Functions.
Math. Log. Q., 1987

Security checking in relational database management systems augmented with inference engines.
Comput. Secur., 1987

Multilevel Security in Database Management Systems.
Comput. Secur., 1987

1986
The Concept of <i>n</i>-Cylinder and its Application.
Math. Log. Q., 1986

1984
System Functions and their Decision Problems.
Math. Log. Q., 1984

1983
The concept of n-cylinder and its relationship to simple sets.
Notre Dame J. Formal Log., 1983

Some elementary closure properties of n-cylinders.
Notre Dame J. Formal Log., 1983

Cylindrical decision problems for system functions.
Notre Dame J. Formal Log., 1983

1982
Representation of One-One Degrees by Decision Problems for System Functions.
J. Comput. Syst. Sci., 1982


  Loading...