Bhavani Thuraisingham
Orcid: 0000-0003-4653-2080Affiliations:
- University of Texas at Dallas, Cyber Security Research and Education Institute (CSI), Richardson, TX, USA
- University of Bristol, UK (DEng 2010)
- MITRE Corporation, Bedford, MA, USA (former)
- Honeywell Computer Sciences Center, Golden Valley, MN, USA (former)
- New Mexico Institute of Mining and Technology, Department of Computer Science, Socorro, NM, USA (former)
- University of Wales, Swansea, UK (PhD 1979)
According to our database1,
Bhavani Thuraisingham
authored at least 487 papers
between 1982 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2018, "For contributions to methods, tools, and systems for security and privacy of data and applications".
IEEE Fellow
IEEE Fellow 2003, "For contributions to secure systems involving database systems, distributed systems, and the web.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
SIGMOD Rec., June, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Proceedings of the Logic-Based Program Synthesis and Transformation, 2024
Proceedings of the 10th IEEE Conference on Big Data Security on Cloud, 2024
2023
SIGMOD Rec., June, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
J. Comput. Secur., 2023
Special Issue on Actionable Information for Digital Threat Discovery Using Contextualized Data or Multi Sensor Data Fusion.
DTRAP, 2023
Secure Multimedia Data Systems in the Era of Artificial Intelligence: Significant Progress and Vision for the Future.
Proceedings of the 5th IEEE International Conference on Trust, 2023
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
WokeGPT: Improving Counterspeech Generation Against Online Hate Speech by Intelligently Augmenting Datasets Using a Novel Metric.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the Information Systems Security - 19th International Conference, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
ACM Trans. Manag. Inf. Syst., December, 2022
SACCOS: A Semi-Supervised Framework for Emerging Class Detection and Concept Drift Adaption Over Data Streams.
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Proceedings of the 7th IEEE International Conference on Smart Cloud, SmartCloud 2022, 2022
Proceedings of the 5th IEEE International Conference on Multimedia Information Processing and Retrieval, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the IEEE International Conference on Data Mining, 2022
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022
2021
IEEE Trans. Knowl. Data Eng., 2021
IEEE Trans. Ind. Informatics, 2021
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks.
IEEE Trans. Dependable Secur. Comput., 2021
Special Issue on Robustness and Efficiency in the Convergence of Artificial Intelligence and IoT.
IEEE Internet Things J., 2021
DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection.
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the Information Systems Security - 17th International Conference, 2021
Integrating Big Data, Data Science and Cyber Security with Applications in Cloud and Internet of Things.
Proceedings of the 13th International Joint Conference on Knowledge Discovery, 2021
Data-Driven Time Series Forecasting for Social Studies Using Spatio-Temporal Graph Neural Networks.
Proceedings of the GoodIT '21: Conference on Information Technology for Social Good, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the 3rd International Conference on Smart BlockChain, 2020
Secure Data Sharing Through Untrusted Clouds with Blockchain-enhanced Key Management.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Artificial Intelligence and Data Science Governance: Roles and Responsibilities at the C-Level and the Board.
Proceedings of the 21st International Conference on Information Reuse and Integration for Data Science, 2020
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium Workshops, 2020
The Role of Artificial Intelligence and Cyber Security for Social Networks and Internet of Transportation.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020
Keynote Speech 1: Integrating Big Data, Data Science and Cyber Security with Applications in Internet of Transportation and Infrastructures.
Proceedings of the International Conference on Intelligent Data Science Technologies and Applications, 2020
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation Systems.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020
Proceedings of the 2nd IEEE International Conference on Cognitive Machine Intelligence, 2020
Can AI be for Good in the Midst of Cyber Attacks and Privacy Violations?: A Position Paper.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Cyber Security and Data Governance Roles and Responsibilities at the C-Level and the Board.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019
Proceedings of the 2019 IEEE International Conference on Web Services, 2019
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019
Where Did the Political News Event Happen? Primary Focus Location Extraction in Different Languages.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry.
Future Gener. Comput. Syst., 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018
Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, 2018
Proceedings of the 4th Annual Industrial Control System Security Workshop, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Proceedings of the Encyclopedia of GIS., 2017
INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research.
IEEE Secur. Priv., 2017
CoRR, 2017
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
Proceedings of the 2017 IEEE International Congress on Big Data, 2017
2016
Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems.
IEEE Trans. Serv. Comput., 2016
Online anomaly detection for multi-source VMware using a distributed streaming framework.
Softw. Pract. Exp., 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the Second IEEE International Conference on Big Data Computing Service and Applications, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015
2014
J. Comb. Optim., 2014
Inf. Syst. Frontiers, 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
Spark-based anomaly detection over multi-source VMware performance data in real-time.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014
Statistical technique for online anomaly detection using Spark over heterogeneous data from multi-source VMware performance data.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
CRC Press, ISBN: 978-1-4665-6943-0, 2014
2013
IEEE Trans. Serv. Comput., 2013
IEEE Trans. Knowl. Data Eng., 2013
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications.
Mob. Networks Appl., 2013
State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks.
IT Prof., 2013
Int. J. Artif. Intell. Tools, 2013
Comput. Stand. Interfaces, 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Measuring expertise and bias in cyber security using cognitive and neuroscience approaches.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
MapReduce-guided scalable compressed dictionary construction for evolving repetitive sequence streams.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Intelligent MapReduce Based Framework for Labeling Instances in Evolving Data Stream.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2012
IEEE Trans. Reliab., 2012
Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy.
IEEE Trans. Dependable Secur. Comput., 2012
J. Integr. Des. Process. Sci., 2012
J. Glob. Optim., 2012
Optmized ontology-driven query expansion using map-reduce framework to facilitate federated queries.
Comput. Syst. Sci. Eng., 2012
Comput. Stand. Interfaces, 2012
Proceedings of the 21st World Wide Web Conference, 2012
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012
Tweeque: Spatio-Temporal Analysis of Social Networks for Location Mining Using Graph Partitioning.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the ISWC 2012 Posters & Demonstrations Track, 2012
Expanded Semantic Graph Representation for Matching Related Information of Interest across Free Text Documents.
Proceedings of the Sixth IEEE International Conference on Semantic Computing, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012
Proceedings of the Computer Network Security, 2012
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012
Towards cyber operations - The new role of academic cyber security research and education.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012
Design and implementation of SNODSOC: Novel class detection for social network analysis.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
Stream Classification with Recurring and Novel Class Detection Using Class-Based Ensemble.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement Documents.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Tweecalization: Efficient and intelligent location mining in twitter using semi-supervised learning.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
ACM Trans. Manag. Inf. Syst., 2011
Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints.
IEEE Trans. Knowl. Data Eng., 2011
IEEE Trans. Knowl. Data Eng., 2011
Comput. Stand. Interfaces, 2011
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011
Role-based integrated access control and data provenance for SOA based net-centric systems.
Proceedings of the IEEE 6th International Symposium on Service Oriented System Engineering, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the IEEE International Conference on Web Services, 2011
Ontology-Driven Query Expansion Using Map/Reduce Framework to Facilitate Federated Queries.
Proceedings of the IEEE International Conference on Web Services, 2011
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011
Proceedings of the 11th IEEE International Conference on Data Mining, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
Int. J. Web Serv. Res., 2010
Int. J. Semantic Comput., 2010
Int. J. Inf. Secur. Priv., 2010
Electron. Commer. Res., 2010
Information and communications security, privacy and trust: Standards and regulations.
Comput. Stand. Interfaces, 2010
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010
Proceedings of the IEEE International Conference on Sensor Networks, 2010
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010
Proceedings of the ISWC 2010 Posters & Demonstrations Track: Collected Abstracts, 2010
Proceedings of the 4th IEEE International Conference on Semantic Computing (ICSC 2010), 2010
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2010
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010
Proceedings of the IEEE International Conference on Web Services, 2010
Proceedings of the ICDM 2010, 2010
Geospatial Schema Matching with High-Quality Cluster Assurance and Location Mining from Social Network.
Proceedings of the ICDMW 2010, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Challenges and Future Directions of Software Technology: Secure Software Development.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
Proceedings of the IEEE International Conference on Cloud Computing, 2010
2009
Proceedings of the Encyclopedia of Database Systems, 2009
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009
Necessary and sufficient conditions for transaction-consistent global checkpoints in a distributed database system.
Inf. Sci., 2009
Int. J. Semantic Comput., 2009
A Better Approximation for Minimum Average Routing Path Clustering Problem in 2-d Underwater Sensor Networks.
Discret. Math. Algorithms Appl., 2009
A Construction of Cartesian Authentication Code from Orthogonal Spaces over a Finite Field of odd Characteristic.
Discret. Math. Algorithms Appl., 2009
Design and implementation of a secure social network system.
Comput. Syst. Sci. Eng., 2009
Ad Hoc Networks, 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Effective and efficient implementation of an information flow control protocol for service composition.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2009
A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009
Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009
Design of a temporal geosocial semantic web for military stabilization and reconstruction operations.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Proceedings of the IEEE International Conference on Web Services, 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners.
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the Data Mining: Foundations and Practice, 2008
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
Proceedings of the Encyclopedia of GIS., 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Inf. Syst. Frontiers, 2008
IEEE Internet Comput., 2008
Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries.
Int. J. Inf. Secur. Priv., 2008
The applicability of the perturbation based privacy preserving data mining for real-world data.
Data Knowl. Eng., 2008
Proceedings of the 2008 IEEE / WIC / ACM International Conference on Web Intelligence, 2008
Proceedings of the Poster and Demonstration Session at the 7th International Semantic Web Conference (ISWC2008), 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the Fourth OWLED Workshop on OWL: Experiences and Directions, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the Privacy, 2008
Proceedings of the 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), 2008
Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Proceedings of the Haptics: Perception, 2008
Proceedings of the 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2008
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008
Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
End-to-end accountability in grid computing systems for coalition information sharing.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
A new intrusion detection system using support vector machines and hierarchical clustering.
VLDB J., 2007
ACM Trans. Inf. Syst. Secur., 2007
Multim. Tools Appl., 2007
Multim. Tools Appl., 2007
Inf. Secur. J. A Glob. Perspect., 2007
Int. J. Inf. Secur. Priv., 2007
Int. J. Bus. Intell. Data Min., 2007
A framework for automated image annotation.
Comput. Syst. Sci. Eng., 2007
Comput. Stand. Interfaces, 2007
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs
CoRR, 2007
SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the 9th workshop on Multimedia & Security, 2007
Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON.
Proceedings of the Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 2007
Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
Proceedings of the 15th ACM International Symposium on Geographic Information Systems, 2007
Proceedings of the GeoSpatial Semantics, Second International Conference, 2007
Design and Simulation of Trust Management Techniques for a Coalition Data Sharing Environment.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
Proceedings of the The Second International Conference on Availability, 2007
Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances.
Proceedings of the The Second International Conference on Availability, 2007
2006
IEEE Trans. Syst. Man Cybern. Part A, 2006
Ann. des Télécommunications, 2006
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006
The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
Proceedings of the Data and Applications Security XX, 2006
Web and information security.
IRM Press, ISBN: 978-1-59140-588-7, 2006
2005
Data Knowl. Eng., 2005
Commun. ACM, 2005
Message correlation in automated communication surveillance through singular value decomposition and word frequency association.
Proceedings of the 6th international workshop on Multimedia data mining, 2005
Proceedings of the Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2005), 2005
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
Proceedings of the Data and Applications Security XIX, 2005
Proceedings of the Data and Applications Security XIX, 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
2004
IEEE Trans. Knowl. Data Eng., 2004
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004
Proceedings of the Current Trends in Database Technology - EDBT 2004 Workshops, 2004
Proceedings of the Advances in Database Technology, 2004
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004
2003
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
Proceedings of the 3rd International Conference on Quality Software (QSIC 2003), 2003
Proceedings of the 6th International Symposium on Autonomous Decentralized Systems (ISADS 2003), 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003
2002
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002
Proceedings of the 4th International Symposium on Multimedia Software Engineering, 2002
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002
Privacy and Civil Liberties.
Proceedings of the Research Directions in Data and Applications Security, 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
2001
Real Time Syst., 2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
Data quality: developments and directions.
Proceedings of the Integrity, 2001
Proceedings of the 4th International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2001), 2001
Database Management and the Internet: Developments and Challenges.
Proceedings of the High-Performance Web Databases, Design, Development, and Deployment, 2001
Panel on XML and Security.
Proceedings of the Database and Application Security XV, 2001
2000
Proceedings of the 3rd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2000), 2000
Benchmarking Real-Time Distributed Object Management Systems for Evolvable and Adaptable Command and Control Applications.
Proceedings of the 3rd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2000), 2000
Proceedings of the Data Mining and Knowledge Discovery: Theory, 2000
Proceedings of the Data and Application Security, 2000
Understanding Data Mining and applying it to Command, Control, Communications and Intelligence Environments.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
1999
Information Survivability for Evolvable and Adaptable Real-Time Command and Control Systems.
IEEE Trans. Knowl. Data Eng., 1999
Int. J. Artif. Intell. Tools, 1999
Proceedings of the Fourth International Workshop on Object-Oriented Real-Time Dependable Systems, 1999
Proceedings of the Fifth International Workshop on Object-Oriented Real-Time Dependable Systems, 1999
Proceedings of the Fifth International Workshop on Object-Oriented Real-Time Dependable Systems, 1999
Proceedings of the 2nd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '99), 1999
Object Technology for Building Adaptable and Evolvable Autonomous Decentralized Systems.
Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems, 1999
Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems, 1999
Adaptable Object Request Brokers for Information Survivability of Evolvable Real-Time Command and Control Systems.
Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '99), 1999
1998
Concurrency Control in Real-Time Object-Oriented Systems: The Affected Set Priority Ceiling Protocols.
Proceedings of the 1st International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '98), 1998
Proceedings of the Fourteenth International Conference on Data Engineering, 1998
Security and Privacy Issues for the World Wide Web: Panel Discussion.
Proceedings of the Database Security XII: Status and Prospects, 1998
1997
IEEE Multim., 1997
Object technology for the integration of the infrastructure, data manager, and tracker for command and control applications.
Proceedings of the 3rd Workshop on Object-Oriented Real-Time Dependable Systems (WORDS '97), 1997
Proceedings of the VLDB'97, 1997
Object-Oriented Data Management and Distribution for Real-Time Command and Control Systems.
Proceedings of the Real-Time Database and Information Systems, 1997
Proceedings of the Third International Symposium on Autonomous Decentralized Systems, 1997
Security Issues in Data Warehousing and Data Mining: Panel Discussion.
Proceedings of the Database Securty XI: Status and Prospects, 1997
1996
Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology.
IEEE Trans. Knowl. Data Eng., 1996
MOMT: A Multilevel Object Modeling Technique for Designing Secure Database Applications.
J. Object Oriented Program., 1996
Proceedings of WORDS'96. The Second Workshop on Object-Oriented Real-Time Dependable Systems, 1996
Object-oriented implementation of an infrastructure and data manager for real-time command and control systems.
Proceedings of WORDS'96. The Second Workshop on Object-Oriented Real-Time Dependable Systems, 1996
Proceedings of the 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 1996
Security Issues for Data Warehousing and Data Mining.
Proceedings of the Database Security Volume X, 1996
Proceedings of the Workshop on Databases - Active and Real-Time, 1996
1995
IEEE Trans. Knowl. Data Eng., 1995
SIGMOD Rec., 1995
Towards the Design of a Multilevel Secure Object-Oriented Database Management System.
J. Object Oriented Program., 1995
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995
Database Issues for Data Visualization: Supporting Interactive Database Explorartion.
Proceedings of the Database Issues for Data Visualization, 1995
Proceedings of the Database Issues for Data Visualization, 1995
An Adaptive Policy for Improved Timeliness in Secure Database Systems.
Proceedings of the Database Security IX: Status and Prospects, 1995
Security and Data Mining.
Proceedings of the Database Security IX: Status and Prospects, 1995
Application of Object-Oriented Technology for Integrating Heterogeneous Database Systems.
Proceedings of the 1995 ACM 23rd Annual Conference on Computer Science, CSC '95, Nashville, TN, USA, February 28, 1995
1994
Proceedings of the Addendum to the Proceedings on Object-Oriented Programming Systems, 1994
A Fine-grained Access Control Model for Object-Oriented DBMSs.
Proceedings of the Database Security, 1994
Hypersemantic Data Modeling for Inference Analysis.
Proceedings of the Database Security, 1994
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994
1993
SIGMOD Rec., 1993
Proceedings of the Addendum to the Proceedings on Object-Oriented Programming Systems, 1993
Proceedings of the Addendum to the Proceedings on Object-Oriented Programming Systems, 1993
Design and implementation of a query processor for a trusted distributed data base management system.
J. Syst. Softw., 1993
Simulation of join query processing algorithms for a trusted distributed database management system.
Inf. Softw. Technol., 1993
Security for Object-Oriented Systems: An Editorial Overview.
Proceedings of the Security for Object-Oriented Systems, 1993
Proceedings of the Eighth Annual Conference on Object-Oriented Programming Systems, 1993
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993
Workshop Summary.
Proceedings of the Database Security, 1993
Applying OMT for Designing Multilevel Database Applications.
Proceedings of the Database Security, 1993
Proceedings of the Seventeenth Annual International Computer Software and Applications Conference, 1993
Proceedings of the ACM 21th Conference on Computer Science, 1993
1992
Comput. Secur., 1992
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992
1991
Comput. Secur., 1991
The Use of Conceptual Structures for Handling the Inference Problem.
Proceedings of the Database Security, 1991
Security Issues in Federated Database Systems: Panel Contributions.
Proceedings of the Database Security, 1991
A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
Security constraint processing during the update operation in a multilevel secure database management system.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991
1990
IEEE Trans. Knowl. Data Eng., 1990
Data Knowl. Eng., 1990
Multilevel Security for Multimedia Database Systems.
Proceedings of the Database Security, 1990
Secure query processing in distributed database management systems-design and performance studies.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
IEEE Trans. Software Eng., 1989
Proceedings of the Conference on Object-Oriented Programming: Systems, 1989
Proceedings of the Fifth International Conference on Data Engineering, 1989
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
1988
Math. Log. Q., 1988
Comput. Secur., 1988
Prototyping as a Research Tool for MLS/DBMS.
Proceedings of the Database Security, 1988
1987
Math. Log. Q., 1987
Security checking in relational database management systems augmented with inference engines.
Comput. Secur., 1987
1986
1984
1983
Notre Dame J. Formal Log., 1983
1982
J. Comput. Syst. Sci., 1982