Bhavani Thuraisingham
#43,096
Most Influential Person Now
Professor of computer science
Bhavani Thuraisingham's AcademicInfluence.com Rankings
Bhavani Thuraisinghamcomputer-science Degrees
Computer Science
#2843
World Rank
#2975
Historical Rank
Database
#1738
World Rank
#1823
Historical Rank
Download Badge
Computer Science
Why Is Bhavani Thuraisingham Influential?
(Suggest an Edit or Addition)According to Wikipedia, Bhavani Thuraisingham is the Louis A. Beecherl, Jr. Distinguished Professor of computer science and the executive director of the Cyber Security Research and Education Institute at the University of Texas at Dallas. She is a visiting senior research fellow in the Department of Informatics at Kings College University of London and a 2017–2018 Cyber Security Policy Fellow at New America.
Bhavani Thuraisingham's Published Works
Published Works
- A new intrusion detection system using support vector machines and hierarchical clustering (2007) (452)
- Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints (2011) (378)
- Privacy preservation in wireless sensor networks: A state-of-the-art survey (2009) (351)
- Inferring private information using social network data (2009) (256)
- ROWLBAC: representing role based access control in OWL (2008) (254)
- Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing (2011) (234)
- Remaining Useful Life Estimation Based on a Nonlinear Diffusion Degradation Process (2012) (234)
- A semantic web based framework for social network access control (2009) (189)
- Preventing Private Information Inference Attacks on Social Networks (2013) (181)
- Real-time CORBA (1997) (167)
- Selective and authentic third-party distribution of XML documents (2004) (161)
- Data Mining: Technologies, Techniques, Tools, and Trends (1998) (155)
- Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry (2018) (150)
- Least Cost Rumor Blocking in Social Networks (2013) (144)
- A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data (2008) (143)
- Security Issues for Cloud Computing (2010) (135)
- Effective Software Fault Localization Using an RBF Neural Network (2012) (134)
- Semantic web-based social network access control (2011) (134)
- Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce (2009) (123)
- Addressing Concept-Evolution in Concept-Drifting Data Streams (2010) (121)
- Adversarial support vector machine learning (2012) (120)
- Secure knowledge management: confidentiality, trust, and privacy (2006) (118)
- Design of LDV: A Multilevel Secure Relational Database Management System (1990) (118)
- The applicability of the perturbation based privacy preserving data mining for real-world data (2008) (114)
- A primer for understanding and applying data mining (2000) (111)
- Flow-based identification of botnet traffic by mining multiple log files (2008) (104)
- Jena-HBase: A Distributed, Scalable and Effcient RDF Triple Store (2012) (101)
- Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams (2009) (100)
- Security checking in relational database management systems augmented with inference engines (1987) (92)
- Data Intensive Query Processing for Large RDF Graphs Using Cloud Computing Tools (2010) (89)
- Classification and Novel Class Detection of Data Streams in a Dynamic Feature Space (2010) (84)
- Data mining, national security, privacy and civil liberties (2002) (84)
- Privacy Preserving Synthetic Data Release Using Deep Learning (2018) (81)
- Data Mining for Security Applications (2004) (80)
- A scalable multi-level feature extraction technique to detect malicious executables (2007) (78)
- Differentiating Code from Data in x86 Binaries (2011) (76)
- Detecting Recurring and Novel Classes in Concept-Drifting Data Streams (2011) (76)
- Emerging standards for data mining (2001) (73)
- PP-trust-X: A system for privacy preserving trust negotiations (2007) (73)
- DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation (2020) (72)
- Efficient handling of concept drift and concept evolution over Stream Data (2016) (72)
- Mandatory security in object-oriented database systems (1989) (71)
- Web Data Mining and Applications in Business Intelligence and Counter-Terrorism (2003) (70)
- Face Recognition Using Multiple Classifiers (2006) (68)
- Privacy Preserving Decision Tree Mining from Perturbed Data (2009) (68)
- Stream Classification with Recurring and Novel Class Detection Using Class-Based Ensemble (2012) (67)
- Insider Threat Detection Using Stream Mining and Graph Mining (2011) (66)
- Towards privacy preserving access control in the cloud (2011) (66)
- A language for provenance access control (2011) (65)
- Secure Data Objects Replication in Data Grid (2010) (65)
- Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry (2015) (64)
- A framework for a video analysis tool for suspicious event detection (2005) (63)
- Detection and Resolution of Anomalies in Firewall Policy Rules (2006) (61)
- Cloud-based malware detection for evolving data streams (2011) (60)
- Classification and Novel Class Detection in Data Streams with Active Mining (2010) (60)
- Predicting WWW surfing using multiple evidence combination (2008) (59)
- Secure query-processing strategies (1989) (56)
- Security for Enterprise Resource Planning Systems (2007) (55)
- SODA: A secure object-oriented database system (1989) (55)
- Managing and Mining Multimedia Databases (2001) (53)
- Security standards for the semantic web (2005) (52)
- XML Databases and the Semantic Web (2002) (50)
- A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams (2009) (50)
- The SCIFC Model for Information Flow Control in Web Service Composition (2009) (50)
- Multilevel Security in Database Management Systems (1987) (48)
- Adaptive encrypted traffic fingerprinting with bi-directional dependence (2016) (47)
- Deep Residual Learning-Based Enhanced JPEG Compression in the Internet of Things (2021) (46)
- Supervised Learning for Insider Threat Detection Using Stream Mining (2011) (46)
- Secure data storage and retrieval in the cloud (2010) (45)
- Collaborative Commerce and Knowledge Management (2002) (44)
- Mandatory Access Control (2009) (44)
- Dynamic Service and Data Migration in the Clouds (2009) (43)
- Security issues for federated database systems (1994) (42)
- An analysis of user influence ranking algorithms on Dark Web forums (2010) (41)
- Enhancing Security Modeling for Web Services Using Delegation and Pass-On (2008) (41)
- Privacy constraint processing in a privacy-enhanced database management system (2005) (40)
- Security and privacy for geospatial data: concepts and research directions (2008) (40)
- A risk management approach to RBAC (2009) (40)
- Data Mining Tools for Malware Detection (2011) (40)
- Transforming provenance using redaction (2011) (40)
- Security issues for the semantic Web (2003) (40)
- Spark-based anomaly detection over multi-source VMware performance data in real-time (2014) (39)
- Unsupervised incremental sequence learning for insider threat detection (2012) (39)
- Design and Implementation of a Database Inference Controller (1993) (38)
- Multimedia Database Systems: Design and Implementation Strategies (1996) (38)
- Securing Data Analytics on SGX with Randomization (2017) (37)
- An Effective Evidence Theory Based K-Nearest Neighbor (KNN) Classification (2008) (37)
- Security Constraints in a Multilevel Secure Distributed Database Management System (1995) (37)
- The Use of Conceptual Structures for Handling the Inference Problem (1991) (36)
- Cyberphysical systems security applied to telesurgical robotics (2012) (36)
- Web and information security (2002) (35)
- Security Constraint Processing in a Multilevel Secure Distributed Database Management System (2004) (35)
- Rule-Based Run-Time Information Flow Control in Service Cloud (2011) (35)
- A Hybrid Model to Detect Malicious Executables (2007) (35)
- Standards for secure data sharing across organizations (2007) (34)
- Efficient influence spread estimation for influence maximization under the linear threshold model (2014) (34)
- SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs (2007) (33)
- ChainNet: Learning on Blockchain Graphs with Topological Features (2019) (33)
- Exploiting an antivirus interface (2009) (32)
- Secure sensor information management and mining (2004) (32)
- Statistical technique for online anomaly detection using Spark over heterogeneous data from multi-source VMware performance data (2014) (32)
- Information Survivability for Evolvable and Adaptable Real-Time Command and Control Systems (1999) (31)
- A roadmap for privacy-enhanced secure data provenance (2014) (31)
- Towards a multilevel secure database management system for real-time applications (1993) (30)
- Security and privacy for multimedia database management systems (2007) (30)
- Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing (2008) (29)
- Policy-Driven Service Composition with Information Flow Control (2010) (29)
- Extended RBAC - Based Design and Implementation for a Secure Data Warehouse (2007) (29)
- Data Mining for Malicious Code Detection and Security Applications (2011) (29)
- A Token-Based Access Control System for RDF Data in the Clouds (2010) (29)
- Data security services, solutions and standards for outsourcing (2013) (28)
- Database and Applications Security: Integrating Information Security and Data Management (2005) (27)
- Risk-Aware Workload Distribution in Hybrid Clouds (2012) (27)
- Security-Aware Service Composition with Fine-Grained Information Flow Control (2013) (27)
- Multilevel security issues in distributed database management systems II (1991) (27)
- Access control, confidentiality and privacy for video surveillance databases (2006) (27)
- An Adaptive Policy for Improved Timeliness in Secure Database Systems (1995) (26)
- Data Management Systems: Evolution and Interoperation (1997) (26)
- Social network classification incorporating link type values (2009) (25)
- Building Trustworthy Semantic Webs (2007) (25)
- Peer to peer botnet detection for cyber-security: a data mining approach (2008) (25)
- The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data (2006) (25)
- Directions for Web and e-commerce applications security (2001) (25)
- Multimedia Database Management Systems: Research Issues and Future Directions (1997) (24)
- Evolving Insider Threat Detection Stream Mining Perspective (2013) (24)
- Administering the Semantic Web: Confidentiality, Privacy, and Trust Management (2007) (24)
- Towards the Design of a Secure Data/Knowledge Base Management System (1990) (23)
- R2D: A Bridge between the Semantic Web and Relational Visualization Tools (2009) (23)
- Self-Training with Selection-by-Rejection (2012) (23)
- Improving timeliness in real-time secure database systems (1996) (23)
- A Data Driven Approach for the Science of Cyber Security: Challenges and Directions (2016) (23)
- Security and Privacy for Web Databases and Services (2004) (23)
- RETRO: A framework for semantics preserving SQL-to-SPARQL translation (2011) (23)
- Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017) (22)
- Privacy-Preserving Data Mining: Development and Directions (2005) (22)
- On secure and resilient telesurgery communications over unreliable networks (2011) (22)
- Multimedia Database Systems - A New Frontier (1997) (21)
- Content-based ontology matching for GIS datasets (2008) (21)
- Cloud Guided Stream Classification Using Class-Based Ensemble (2012) (21)
- Dependable real-time data mining (2005) (21)
- A nonmonotonic typed multilevel logic for multilevel secure data/knowledge base management systems (1991) (21)
- Semantic Web for Content Based Video Retrieval (2009) (21)
- Multilevel security for information retrieval systems - II (1995) (21)
- Ontology-Driven Query Expansion Using Map/Reduce Framework to Facilitate Federated Queries (2011) (21)
- Automated Threat Report Classification over Multi-Source Data (2018) (21)
- Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems (2011) (20)
- MOMT: A Multilevel Object Modeling Technique for Designing Secure Database Applications (1996) (20)
- R2D: Extracting Relational Structure from RDF Stores (2009) (20)
- End-to-end accountability in grid computing systems for coalition information sharing (2008) (20)
- Feature Based Techniques for Auto-Detection of Novel Email Worms (2007) (19)
- Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic (2008) (19)
- Security Issues in Federated Database Systems: Panel Contributions (1991) (19)
- Delegation-Based Security Model for Web Services (2007) (19)
- Role-based integrated access control and data provenance for SOA based net-centric systems (2016) (19)
- Reasoning with semantics-aware access control policies for geospatial web services (2006) (19)
- Scheduling and Priority Mapping for Static Real-Time Middleware (2001) (19)
- Design and Implementation of Data Mining Tools (2009) (18)
- Security and Data Mining (1995) (18)
- Data and applications security: developments and directions (2002) (18)
- Towards a real-time agent architecture-a whitepaper (1999) (18)
- Towards cyber operations - The new role of academic cyber security research and education (2012) (18)
- Spark-Based Political Event Coding (2016) (18)
- Unsupervised Ensemble Based Learning for Insider Threat Detection (2012) (18)
- Incentive and Trust Issues in Assured Information Sharing (2008) (18)
- PTAS for the minimum weighted dominating set in growth bounded graphs (2012) (17)
- Enhanced geographically typed semantic schema matching (2011) (17)
- A Relational Wrapper for RDF Reification (2009) (17)
- Semantic Schema Matching without Shared Instances (2009) (17)
- Focus location extraction from political news reports with bias correction (2017) (17)
- Geospatial data qualities as web services performance metrics (2007) (16)
- Role Based Access Control and OWL (2008) (16)
- Data Mining Applications (2009) (16)
- Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances (2007) (16)
- Bin-Carver: Automatic recovery of binary executable files (2012) (16)
- Towards Self-Adaptive Metric Learning On the Fly (2019) (16)
- Privacy and Civil Liberties (2002) (16)
- Building secure survivable semantic webs (2002) (16)
- Directions for security and privacy for semantic e-business applications (2005) (16)
- Building the Semantic Web (2002) (16)
- Big Data Security and Privacy (2015) (16)
- Understanding data mining and applying it to command, control, communications and intelligence environments (2000) (16)
- Real-time anomaly detection over VMware performance data using storm (2014) (16)
- Towards a Privacy-Aware Quantified Self Data Management Framework (2018) (15)
- Using RDF for policy specification and enforcement (2004) (15)
- Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications (2013) (15)
- Ontology-driven query expansion methods to facilitate federated queries (2010) (15)
- On real-time extensions to object request brokers: a panel position paper (1996) (14)
- Data Mining for Malicious Code Detection and Security Applications (2009) (14)
- Concurrency control in real-time object-oriented systems: the affected set priority ceiling protocols (1998) (14)
- Tweecalization: Efficient and intelligent location mining in twitter using semi-supervised learning (2012) (14)
- Database Issues for Data Visualization: Supporting Interactive Database Explorartion (1995) (14)
- BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks (2019) (13)
- Multistream Classification for Cyber Threat Data with Heterogeneous Feature Space (2019) (13)
- Data mining and cyber security (2003) (13)
- The Role of Artificial Intelligence and Cyber Security for Social Media (2020) (13)
- Specification and Analysis of ABAC Policies via the Category-based Metamodel (2019) (13)
- Unsupervised deep embedding for novel class detection over data stream (2017) (13)
- Query Processing Techniques for Compliance with Data Confidence Policies (2009) (13)
- Malware Collection and Analysis (2017) (13)
- Identity management for cloud computing: developments and directions (2011) (12)
- Data Mining and Data Visualization (1995) (12)
- A Framework for Policies over Provenance (2011) (12)
- Proceedings of the 12th ACM symposium on Access control models and technologies (2007) (12)
- Secure Data Provenance and Inference Control with Semantic Web (2014) (12)
- Recursion theoretic properties of the inference problem in database security (1991) (12)
- Towards fine grained RDF access control (2014) (12)
- Data Security and Privacy (2016) (12)
- Scalable Complex Query Processing over Large Semantic Web Data Using Cloud (2011) (12)
- Effective and efficient implementation of an information flow control protocol for service composition (2009) (12)
- A cloud-based RDF policy engine for assured information sharing (2012) (12)
- Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (IFIP International Federation for Information Processing) (2005) (12)
- Honeypot based unauthorized data access detection in MapReduce systems (2015) (11)
- Web Data Mining & Business Intelligence Analysis (2003) (11)
- Privacy-Preserving Data Mining : Developments and Directions (2004) (11)
- A Better Approximation for Minimum Average Routing Path Clustering Problem in 2-d Underwater Sensor Networks (2009) (11)
- Web Data Management and Electronic Commerce (2000) (11)
- Evolving Big Data Stream Classification with MapReduce (2014) (11)
- Concurrency control in trusted database management systems: a survey (1993) (11)
- Online anomaly detection for multi‐source VMware using a distributed streaming framework (2016) (11)
- Geospatial Resource Description Framework (GRDF) and security constructs (2008) (11)
- Secure peer-to-peer networks for trusted collaboration (2007) (11)
- Sparse Bayesian Adversarial Learning Using Relevance Vector Machine Ensembles (2012) (11)
- INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research (2017) (11)
- Big Data Analytics with Applications in Insider Threat Detection (2017) (11)
- SACCOS: A Semi-Supervised Framework for Emerging Class Detection and Concept Drift Adaption Over Data Streams (2022) (11)
- Security and Privacy Issues for the World Wide Web: Panel Discussion (1998) (10)
- Policy Enforcement System for Inter-Organizational Data Sharing (2010) (10)
- Fairness-Aware Online Meta-learning (2021) (10)
- Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs (2007) (10)
- Semantic-Aware Data Protection in Web Services (2006) (10)
- Evolvable real-time C3 systems (1995) (10)
- Extracting semantic information structures from free text law enforcement data (2012) (10)
- Object-oriented implementation of an infrastructure and data manager for real-time command and control systems (1996) (10)
- Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology (1996) (10)
- Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference [18-19 November 2004, Fairfax, Virginia; USA] (2006) (10)
- Applying OMT for Designing Multilevel Database Applications (1993) (10)
- Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case (2008) (10)
- Assured Information Sharing: Technologies, Challenges and Directions (2008) (10)
- Data Mining Techniques and Applications (2009) (10)
- DAGIS: A Geospatial Semantic Web Services Discovery and Selection Framework (2007) (10)
- Data and applications security (Guest editorial) (2002) (9)
- State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks (2013) (9)
- Progressive One-shot Human Parsing (2020) (9)
- Randomizing Smartphone Malware Profiles against Statistical Mining Techniques (2012) (9)
- Database Security: Past, Present, and Future (2015) (9)
- Tweeque: Spatio-Temporal Analysis of Social Networks for Location Mining Using Graph Partitioning (2012) (9)
- Managing Threats to Web Databases and Cyber Systems (2005) (9)
- R2d: a Framework for the Relational Transformation of RDF Data (2009) (9)
- Managing Threats to Web Databases and Cyber Systems (2005) (9)
- Managing Risks in RBAC Employed Distributed Environments (2007) (9)
- Trustworthy Semantic Web Technologies for Secure Knowledge Management (2008) (9)
- Extraction of expanded entity phrases (2011) (9)
- Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics (2005) (9)
- Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web (2007) (9)
- Secure Data Processing in a Hybrid Cloud (2011) (9)
- P2V: Effective Website Fingerprinting Using Vector Space Representations (2015) (9)
- An individual-based model of information diffusion combining friends’ influence (2014) (9)
- Blockchain Technologies and Their Applications in Data Science and Cyber Security (2020) (8)
- Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data (2008) (8)
- Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security (2013) (8)
- RT-OMT: a real-time object modeling technique for designing real-time database applications (1994) (8)
- Query processing in LDV: a secure database system (1988) (8)
- A Fine-grained Access Control Model for Object-Oriented DBMSs (1994) (8)
- XIMKON: An Expert Simulation and Control Program (1989) (8)
- StormRider: harnessing "storm" for social networks (2012) (8)
- System Functions and their Decision Problems (1984) (8)
- Real-time data mining of multimedia objects (2001) (8)
- Multilevel security for information retrieval systems (1993) (8)
- Privacy-Preserving Architecture for Cloud-IoT Platforms (2019) (8)
- From Cyber Terrorism to State Actors’ Covert Cyber Operations (2013) (8)
- Bi-directional Translation of Relational Data into Virtual RDF Stores (2010) (8)
- Web Security and Privacy (Panel) (2000) (8)
- Ranking Ontologies Using Verified Entities to Facilitate Federated Queries (2010) (8)
- The inference problem in database security (1991) (8)
- Security Issues for Data Warehousing and Data Mining (1996) (8)
- Services in the Cloud (2015) (7)
- Scalable and Efficient Reasoning for Enforcing Role-Based Access Control (2010) (7)
- A Framework for Secure Data Collection and Management for Internet of Things (2016) (7)
- A Comparison of Approaches for Large-Scale Data Mining Utilizing MapReduce in Large-Scale Data Mining (2010) (7)
- Design and Implementation of a Cloud-Based Assured Information Sharing System (2012) (7)
- Secure information integration with a semantic web-based framework (2012) (7)
- Secure Grid Computing (2006) (7)
- Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement Documents (2012) (7)
- E-Mail Worm Detection Using Data Mining (2007) (7)
- QoS Aware Dependable Distributed Stream Processing (2008) (7)
- A NEW VIEW OF INFORMATION MODELING (1992) (7)
- Metadata Repository (2009) (7)
- Challenges and Future Directions of Software Technology: Secure Software Development (2010) (7)
- Identification of related information of interest across free text documents (2011) (7)
- Heterogeneous Information Exchange and Organizational Hubs (2002) (7)
- WS-Sim: A Web Service Simulation Toolset with Realistic Data Support (2010) (7)
- Centralized Security Labels in Decentralized P2P Networks (2007) (7)
- Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems (2008) (7)
- A Construction of Cartesian Authentication Code from Orthogonal Spaces over a Finite Field of odd Characteristic (2009) (7)
- Journal of Intelligent Information Systems: Editorial (2004) (7)
- Dependable and secure TMO scheme (2006) (7)
- Data Supply Chain Management: Supply Chain Management for Incentive and Risk-based Assured Information Sharing (2011) (6)
- Secure query processing in distributed database management systems-design and performance studies (1990) (6)
- Relationalizing RDF stores for tools reusability (2009) (6)
- Adaptable real-time distributed object management for command and control systems (1999) (6)
- Developing and Securing the Cloud (2018) (6)
- Recovery Point Selection on a Reverse Binary Tree Task Model (1989) (6)
- Risk-Aware Data Processing in Hybrid Clouds (2011) (6)
- Web Data Mining for Counter-Terrorism (2003) (6)
- Design and implementation of a secure social network system (2009) (6)
- Assured Information Sharing Life Cycle (2009) (6)
- Multilevel Security for Multimedia Database Systems (1990) (6)
- Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries (2008) (6)
- REDACT: a framework for sanitizing RDF data (2013) (6)
- A Data Access Model for Privacy-Preserving Cloud-IoT Architectures (2020) (6)
- The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research (2017) (6)
- Security Issues in Data Warehousing and Data Mining: Panel Discussion (1997) (6)
- Imbalanced Adversarial Training with Reweighting (2021) (6)
- Secure Semantic Service-Oriented Systems (2016) (6)
- Cloud-Centric Assured Information Sharing (2012) (6)
- Design and implementation of a query processor for a trusted distributed data base management system (1993) (6)
- Information Retrieval and Web Data Mining (2003) (5)
- The World Wide Web and XML (2002) (5)
- RDFKB: A Semantic Web Knowledge Base (2011) (5)
- A Category-Based Model for ABAC (2018) (5)
- Evolving stream classification using change detection (2014) (5)
- Integrating Cyber Security and Data Science for Social Media: A Position Paper (2018) (5)
- Dependable Semantic Web (2002) (5)
- Privacy-preserved social network integration and analysis for security informatics (2010) (5)
- Data intensive query processing for semantic web data using hadoop and mapreduce (2011) (5)
- Secure query processing in intelligent database management systems (1989) (5)
- Expanded Semantic Graph Representation for Matching Related Information of Interest across Free Text Documents (2012) (5)
- Guest editorial: special issue on privacy preserving data management (2006) (5)
- Access control for web data: models and policy languages (2006) (5)
- Data Mining for Security Applications and Its Privacy Implications (2009) (5)
- Hypersemantic Data Modeling for Inference Analysis (1994) (5)
- GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game (2020) (5)
- SQL extensions for security assertions (1991) (5)
- Design and implementation of SNODSOC: Novel class detection for social network analysis (2012) (5)
- CORBA-based real-time trader service for adaptable command and control systems (1999) (5)
- Artificial Intelligence and Data Science Governance: Roles and Responsibilities at the C-Level and the Board (2020) (5)
- Using OWL to Model Role Based Access Control (2008) (5)
- Special Issue on Robustness and Efficiency in the Convergence of Artificial Intelligence and IoT (2021) (4)
- Large-Scale Realistic Network Data Generation on a Budget (2018) (4)
- Secure Data Provenance (2014) (4)
- Design and Simulation of Trust Management Techniques for a Coalition Data Sharing Environment (2007) (4)
- Near real-time atrocity event coding (2016) (4)
- Security constraint processing during the update operation in a multilevel secure database management system (1991) (4)
- Cyber Security and Data Governance Roles and Responsibilities at the C-Level and the Board (2019) (4)
- Rules to frames and frames to rules (1989) (4)
- Security and Privacy for Sensor Databases (2003) (4)
- Next - Location Prediction Using Federated Learning on a Blockchain (2020) (4)
- Detecting Remote Exploits Using Data Mining (2008) (4)
- Necessary and sufficient conditions for transaction-consistent global checkpoints in a distributed database system (2009) (4)
- Can AI be for Good in the Midst of Cyber Attacks and Privacy Violations?: A Position Paper (2020) (4)
- Data allocation and spatio-temporal implications for video-on-demand systems (1995) (4)
- Chapter 1 A DATA MINING TECHNIQUE TO DETECT REMOTE EXPLOITS (2007) (4)
- Trust management in a distributed environment (2005) (4)
- Data and Information Security (2001) (4)
- Security and privacy issues for sensor databases (2004) (4)
- GCI: A Transfer Learning Approach for Detecting Cheats of Computer Game (2018) (4)
- Cylindrical decision problems for system functions (1983) (3)
- Application of object-oriented technology for integrating heterogeneous database systems (1995) (3)
- Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping (2007) (3)
- Admin-CBAC: An Administration Model for Category-Based Access Control (2020) (3)
- Homeland Security Data Mining and Link Analysis (2009) (3)
- Dependable Infrastructures and Data Managers for Sensor Networks (2003) (3)
- Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners (2009) (3)
- Adaptable object request brokers for information survivability of evolvable real-time command and control systems (1999) (3)
- Simulation of join query processing algorithms for a trusted distributed database management system (1993) (3)
- Relationalization of provenance data in complex RDF reification nodes (2010) (3)
- Hacking social network data mining (2017) (3)
- Data quality: developments and directions (2001) (3)
- Current status of R&D in trusted database management systems (1992) (3)
- After the ‘War on Terror’—how to maintain long-range terrorist deterrence (2014) (3)
- Data management research at the MITRE Corporation (1995) (3)
- Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis (2009) (3)
- Update-Enabled Triplification of Relational Data into Virtual RDF Stores (2010) (3)
- Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation Systems (2020) (3)
- Foundations of Multilevel Databases (1992) (3)
- Design and implementation of a distributed database (1993) (3)
- Real-Time Stream Data Analytics for Multi-purpose Social Media Applications (2015) (3)
- Intelligent MapReduce Based Framework for Labeling Instances in Evolving Data Stream (2013) (3)
- Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack (2018) (3)
- Security for object-oriented systems (1993) (3)
- Measuring expertise and bias in cyber security using cognitive and neuroscience approaches (2013) (3)
- Towards the Design and Implementation of a Cloud-centric Assured Information Sharing System (2011) (3)
- Prototyping as a Research Tool for MLS/DBMS (1988) (3)
- Differences in Fitts' Law Task Performance Based on Environment Scaling (2008) (2)
- Digital Trust: Trust Management in Cyberspace (2020) (2)
- Where Did the Political News Event Happen? Primary Focus Location Extraction in Different Languages (2019) (2)
- Metadata Aspects of Mining (2014) (2)
- Calculating Edit Distance for Large Sets of String Pairs using MapReduce (2014) (2)
- Representation of One-One Degrees by Decision Problems for System Functions (1982) (2)
- From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency (2017) (2)
- Multilevel Secure Teleconferencing over Public Switched Telephone Network (2005) (2)
- Secure Semantic Sensor Web and Pervasive Computing (2010) (2)
- Graph-Based Data-Collection Policies for the Internet of Things (2018) (2)
- Multilevel Secure Database Management System (2009) (2)
- AI applications in distributed system design issues (1988) (2)
- Trust Management and the Semantic Web (2007) (2)
- The concept of n-cylinder and its relationship to simple sets (1983) (2)
- Information and communications security, privacy and trust: Standards and regulations (2010) (2)
- On-line anomaly detection based on relative entropy (2011) (2)
- Panel Overview (1998) (2)
- Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper (2017) (2)
- Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON (2007) (2)
- Data Manager for Evolvable Real-time Command and Control Systems (1997) (2)
- Towards access control for visual Web model management (2005) (2)
- Knowledge Mining in Cybersecurity: From Attack to Defense (2022) (2)
- A functional view of multilevel databases (1989) (2)
- Security for Distributed Databases (2001) (2)
- Editorial SACMAT 2007 (2010) (2)
- Emerging Web Services (2015) (2)
- Object-Oriented Data Management and Distribution for Real-Time Command and Control Systems (1997) (2)
- An OpenRBAC Semantic Model for Access Control in Vehicular Networks (2019) (2)
- What's Next in XML and Databases? (2004) (2)
- Data and Application Security (2001) (2)
- Benchmarking real-time distributed object management systems for evolvable and adaptable command and control applications (2000) (2)
- Active real-time database management for command & control applications (1996) (2)
- Multimodal Databases (2009) (2)
- Stream Mining Using Statistical Relational Learning (2014) (2)
- Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy (2012) (2)
- Multilevel Security for Distributed Database Systems (2005) (2)
- WORKSHOP REPORT BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation (2014) (2)
- Issues on the design and implementation of an intelligent database inference controller (1991) (2)
- Secure Model Management Operations for the Web (2005) (2)
- Cloud Governance (2020) (2)
- Secure interoperability of trusted database management systems (1992) (2)
- Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI) (2022) (2)
- Object-oriented technology for health care and medical information systems (1994) (2)
- Privacy Protection of Personal Data in Social Networks (2010) (2)
- GraphBoot: Quantifying Uncertainty in Node Feature Learning on Large Networks (2021) (2)
- Security and Privacy Considerations for Managing and Mining Multimedia Databases (2001) (2)
- Transaction-Consistent Global Checkpoints in a Distributed Database System (2008) (2)
- A nonmonotonic typed multilevel logic for multilevel secure data/knowledge base management systems. II (1992) (2)
- Perturbation based privacy preserving data mining techniques for real-world data (2008) (2)
- Dependable computing for national security: a position paper (2003) (2)
- Panel on XML and Security (2001) (2)
- Semantic Web, Data Mining, and Security (2010) (2)
- Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper (2016) (2)
- Knowledge-based support for the development of database-centered applications (1989) (2)
- Ontology Alignment Using Multiple Contexts (2008) (2)
- Object technology for the integration of the infrastructure, data manager, and tracker for command and control applications (1997) (2)
- Efficient influence spread estimation for influence maximization under the linear threshold model (2014) (1)
- Secure Sensor Semantic Web and Information Fusion (2014) (1)
- Data Management Systems (1997) (1)
- Object Technology for Building Adaptable and Evolvable Autonomous Decentralized Systems (1999) (1)
- Semantic Web-Based Social Network Integration (2016) (1)
- A Database Inference Controller for 3 D Motion Capture Databases (2012) (1)
- Web Information Management and its Application to Electronic Commerce (1999) (1)
- DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection (2021) (1)
- Inference and Aggregation (1992) (1)
- A scalable clustering method based on density (2007) (1)
- Behavioral sequence prediction for evolving data stream (2013) (1)
- Shared Reality: Detecting Stealthy Attacks Against Autonomous Vehicles (2021) (1)
- Secure Semantic Computing (2011) (1)
- Secured data provenance using semantic web technologies (2011) (1)
- Reducibility Relationships Between Decision Problems for System Functions (1987) (1)
- COVID-19: The Information Warfare Paradigm Shift (2020) (1)
- Data security and integrity: developments and directions (2009) (1)
- Secure Cloud Computing Concepts (2013) (1)
- Geospatial Semantic Web, Definition (2008) (1)
- 2015 IEEE 16th International Conference on Information Reuse and Integration (2015) (1)
- RDF-X: a language for sanitizing RDF graphs (2014) (1)
- Tag-based Information Flow Analysis for Document Classification in Provenance (2012) (1)
- Proceedings of the 2017 on Workshop on Privacy in the Electronic Society (2017) (1)
- Security and the World Wide Web (1998) (1)
- Data Mining and Security (2011) (1)
- Multimedia Database Management Systems (1997) (1)
- An Episodic Learning based Geolocation Detection Framework for Imbalanced Data (2021) (1)
- Unsupervised Perturbation based Self-Supervised Adversarial Training (2021) (1)
- Information Management Technologies (2003) (1)
- Enforcing Honesty in Assured Information Sharing Within a Distributed System (2007) (1)
- WI'09/IAT'09 Joint Invited Talks WI-IAT 2009 Data Mining for Malicious Code Detection and Security Applications (2009) (1)
- Message correlation in automated communication surveillance through singular value decomposition and word frequency association (2005) (1)
- Access Control in Database Systems (2013) (1)
- Assured Information Sharing (AIS)Using Private Clouds (2014) (1)
- The Inference Problem (2014) (1)
- Fundamental R&D Issues in Real-Time Distributed Computing (2000) (1)
- Evolvable real-time C3 systems-II: real-time infrastructure requirements (1996) (1)
- A Federated Approach for Learning from Electronic Health Records (2022) (1)
- Proceedings of the 2017 on Cloud Computing Security Workshop (2017) (1)
- A Perspective of the Inference Problem (2005) (1)
- A Generalized Approach for Social Network Integration and Analysis with Privacy Preservation (2014) (1)
- Dependable objects for databases, middleware and methodologies: a position paper (1999) (1)
- Geographically-typed semantic schema matching (2009) (1)
- Learning-based geospatial schema matching guided by external knowledge (2011) (1)
- Core Data Mining Technologies (2003) (1)
- Privacy and Security Challenges in GIS (2008) (1)
- Consistent data access in a distributed database management system for command and control applications (1994) (1)
- Data-Driven Time Series Forecasting for Social Studies Using Spatio-Temporal Graph Neural Networks (2021) (1)
- Information Sharing Strategies of the United States Federal Government and Its Allies and Our Contributions Towards Implementing these Strategies. Version 1 (2010) (1)
- Analyzing and Securing Social Networks (2016) (1)
- Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students (2015) (1)
- Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics (2016) (1)
- Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data (2022) (1)
- Keynote: Security Engineering: Developments and Directions (2009) (1)
- Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization (2008) (1)
- MapReduce-guided scalable compressed dictionary construction for evolving repetitive sequence streams (2013) (1)
- Design of a temporal geosocial semantic web for military stabilization and reconstruction operations (2009) (1)
- E-Commerce and XML (2002) (1)
- Redaction based RDF access control language (2014) (1)
- Using CORBA to Integrate Database Systems (2001) (1)
- Directions and trends of XML and web service security (2006) (1)
- Parallel processing and trusted database management systems (1993) (1)
- Design and Implementation of a Data Mining System for Malware Detection (2012) (1)
- The Concept of n-Cylinder and its Application (1986) (1)
- Data Mining Tools (2014) (1)
- Email Worm Detection Using Data Mining (2016) (1)
- Simulating bioterrorism through epidemiology approximation (2008) (1)
- Attacklets: Modeling High Dimensionality in Real World Cyberattacks (2018) (1)
- Blockchain-Enabled Service Optimizations in Supply Chain Digital Twin (2022) (1)
- Access Control and Semantic Web (2014) (1)
- Evaluation and Results (2011) (1)
- ACM Multimedia '94 conference workshop on multimedia database management systems (1995) (1)
- Data Mining for Detecting Malicious Executables (2011) (1)
- E-Commerce, Business Intelligence, and Counter-Terrorism (2003) (1)
- Graph-Based Specification of Admin-CBAC Policies (2021) (1)
- Towards developing a standard multilevel relational data model for representing a multilevel universe (1999) (1)
- Secure Dependable Data Management (2005) (1)
- Multimedia systems security (2007) (1)
- Data and applications security (2004) (1)
- Cyber Security Meets Big Knowledge: Towards a Secure HACE Theorem (2020) (0)
- Privacy and the Semantic Web (2007) (0)
- WWW Prediction Results (2009) (0)
- Data Mining for Detecting Remote Exploits (2011) (0)
- Unified Framework for Secure Big Data Management and Analytics (2017) (0)
- Secure Semantic E-Business (2007) (0)
- Secure Semantic Grids (2005) (0)
- Assured information sharing (ais) using the cloud (2013) (0)
- Novel Approaches to Handle the Inference Problem (2014) (0)
- Confidentiality, Privacy, and Trust for Big Data Systems (2017) (0)
- Experimental Cloud Query Processing System (2013) (0)
- Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations (2009) (0)
- Mining Databases on the Web (2003) (0)
- Experimental Cloud Systems for Security Applications (2013) (0)
- IEEE IRI 2014 message from program co-chairs (2014) (0)
- Data Mining Tool for Web Page Surfing Prediction (2009) (0)
- Metadata, Ontologies, and XML (2002) (0)
- Issues on real-time object request brokers (1997) (0)
- Big Data Analytics for Malware Detection (2017) (0)
- Web Data Management and Mining.......................................... (2009) (0)
- Message from the General Chairs BigDataSecurity/HPSC/IDS 2021 (2021) (0)
- Real-time data mining of multimedia objects - Object-Oriented Real-Time Distributed Computing, 2001. ISORC - 2001. Proceedings. Fourth IEEE Inte (2004) (0)
- Inference and Provenance (2014) (0)
- Security for Object-Oriented Systems: An Editorial Overview (1993) (0)
- IEEE IRI 2012 INTERNATIONAL TECHNICAL PROGRAM COMMITTEE (2012) (0)
- Cloud Computing Concepts (2013) (0)
- Image Classification Models (2009) (0)
- Firewall Policy Analysis (2011) (0)
- Data mining for the e-business: developments and directions (2000) (0)
- Object-oriented approach to interconnecting trusted database management systems (1993) (0)
- Database Management and the Internet: Developments and Challenges (2001) (0)
- Conclusion to Part IV (2013) (0)
- Data Management Technologies (2005) (0)
- Secure Geospatial Semantic Web (2007) (0)
- Information Retrieval Systems and XML (2002) (0)
- Mining Text, Image, Video, and Audio Data (2001) (0)
- A framework for automated image annotation (2007) (0)
- The World Wide Web, E-Commerce, and Business Intelligence (2003) (0)
- Message from the General Chairs: IEEE BigDataSecurity/HPSC/IDS 2020 (2020) (0)
- Analysis of heuristic based access pattern obfuscation (2013) (0)
- Semantic Web Mining (2003) (0)
- Integrity Management and the Semantic Web (2007) (0)
- TrustCom 2013: Message from the program chairs (2013) (0)
- Big Data Management and Analytics Technologies (2017) (0)
- Emerging Secure Web Services (2010) (0)
- SOA and Web Services (2010) (0)
- Secure Cloud Computing Functions (2013) (0)
- Social Network Analytics and Privacy Considerations (2016) (0)
- The Role of Artificial Intelligence and Cyber Security for Social Networks and Internet of Transportation (2020) (0)
- Revisiting Security Threats with Respect to Web Mining (2003) (0)
- Social Networking on the Cloud (2013) (0)
- IEEE ISI 2009 welcome message from conference co-chairs (2009) (0)
- Social Networking in the Cloud (2016) (0)
- Conclusion to Part VI (2013) (0)
- A Game Theoretic Framework for Adversarial Classification (2017) (0)
- Security Models for Web Services (2010) (0)
- Building an Infrastructure, an Education Initiative, and a Research Program for a Secure Cloud (2013) (0)
- A Semantic Web-Based Inference Controller for Provenance Big Data (2017) (0)
- Integrating object-oriented technology and security technology (1993) (0)
- IWSPA 2017 chairs' welcome (2017) (0)
- Database Systems Technology (2001) (0)
- Intrusion Detection Results (2009) (0)
- Conclusion to Part VII (2013) (0)
- Message from the workshop on semantics, security, and privacy chairs (2011) (0)
- Security and the Semantic Web (2007) (0)
- Stream Data Analytics (2017) (0)
- Web Services for Secure Activity Management (2010) (0)
- Guest Editorial: Special Issue on Frontiers of Trust, Security and Privacy for Computer and Communication Networks (2014) (0)
- Personalized Hashtag Recommendation with User-level Meta-learning (2022) (0)
- Unified Framework for Analyzing and Securing Social Media (2016) (0)
- Next Steps for BDMA and BDSP (2017) (0)
- Cloud Service Providers, Products, and Frameworks (2013) (0)
- Data and Applications Security: Past, Present and the Future (2003) (0)
- Some Other Technologies for Data Mining 6S 4.1 Overview (2014) (0)
- Secure Cloud Computing Guidelines (2013) (0)
- Security and XML (2007) (0)
- Research, Standards, Products, and Applications (2007) (0)
- Knowledge Management for Heterogeneous Information Exchange (2002) (0)
- Big Data, Security, and the Internet of Things (2017) (0)
- Data Mining for Email Worm Detection (2011) (0)
- Toward an Experimental Infrastructure and Education Program for BDMA and BDSP (2017) (0)
- Managing and Mining Multimedia Data, Animations and Annotations (2009) (0)
- Some Applications for Web Mining (2003) (0)
- Deploying malware detection software for smart phones (2014) (0)
- Stream Data Analytics for Multipurpose Social Media Applications (2016) (0)
- Stream Mining and Big Data for Insider Threat Detection (2017) (0)
- FOR INFORMATION SURVIVABILITY OF EVOLVABLE REAL-TIME COMMAND AND CONTROL SYSTEMS (2004) (0)
- Cloud Computing Functions (2013) (0)
- Conclusion to Part I (2001) (0)
- Implementation of an Access Control System for Social Networks (2016) (0)
- An Education Program for a Secure Cloud (2013) (0)
- Multimedia for Collaboration, Knowledge Management, and Training for the Web (2001) (0)
- Secure Semantic Data, Information, and Knowledge Management (2007) (0)
- Panel: Using information re-use and integration principles in big data (2012) (0)
- Graph Mining for Insider Threat Detection (2011) (0)
- PASSAT 2009 Organizing and Program Committee (2009) (0)
- Toward a Trustworthy Cloud (2013) (0)
- Access Control and Inference for Social Networks (2016) (0)
- Data Mining for Active Defense (2011) (0)
- The SCRUB security data sharing infrastructure (2008) (0)
- A Multi-Partition, Multi-Chunk Ensemble for Classifying Concept-Drifting Data Streams (2017) (0)
- Integrity Management, Data Provenance, and Web Services (2010) (0)
- Summary and Directions (2001) (0)
- Specialized Web Services and Security (2013) (0)
- Design and implementation of an active real-time database management system (1996) (0)
- Services and Security Technologies (2010) (0)
- Conclusion to Part V (2013) (0)
- “SUSPICIOUS” EVENT DETECTION IN VIDEO APPROVED BY SUPERVISORY COMMITTEE: (2009) (0)
- Assured Semantic Information Sharing (2007) (0)
- Secure Cloud Query Processing with Relational Data for Social Media (2016) (0)
- Keynote Speech 1: Integrating Big Data, Data Science and Cyber Security with Applications in Internet of Transportation and Infrastructures (2020) (0)
- Secure Semantic Digital Libraries (2007) (0)
- Introduction to secure Semantic Web (2011) (0)
- Message from the SEPT Organizing Committee (2016) (0)
- Towards Developing a Secure Dependable System: Development, Issues, and Challenges (2006) (0)
- TrustCom2015 Organization Committee (2015) (0)
- Survey of Stream Data Classification (2017) (0)
- Towards the design of a multilevel secure object database management system (1995) (0)
- Security and Privacy with Respect to Inference (2014) (0)
- Multilevel Secure Online Social Networks (2016) (0)
- An individual-based model of information diffusion combining friends’ influence (2013) (0)
- Session details: Keynote Address (2018) (0)
- System Function Languages (1993) (0)
- Big Data Management and Cloud for Assured Information Sharing (2017) (0)
- Standards, Prototypes, and Products for Multimedia Data Management and Mining (2001) (0)
- A Cloud-Based Policy Manager for Assured Information Sharing (2014) (0)
- Conclusion to Part VIII (2013) (0)
- MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data (2022) (0)
- Security and Privacy Issues for Data Mining (2014) (0)
- Security for XML, RDF, and the Semantic Web (2005) (0)
- Social Networks: A Survey (2016) (0)
- Advanced Persistent Threat Detection Using Data Provenance and Metric Learning (2022) (0)
- Secure Cloud Query Processing with Relational Data (2013) (0)
- Information Retrieval Systems (2003) (0)
- Keynote: Why a Cyber Security Career for a Woman? (2017) (0)
- Secure Sensor Semantic Web and Information Fusion Final Report Contributions by The University of Texas at Dallas in collaboration with (2014) (0)
- Secure E-Commerce, Collaboration, and Knowledge Management (2005) (0)
- Session details: Panel Session (2015) (0)
- ICWS 2014 message from the research track chairs (2014) (0)
- Inference Control through Query Modification (2014) (0)
- Implementing an Inference Controller for Social Media Data (2016) (0)
- Session details: Smartphone Security Keynote and Software Vulnerabilities Session (2017) (0)
- Basic Concepts in XML (2002) (0)
- A Non-monotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge - II. (1992) (0)
- Building Adaptable and Evolvable Real-Time Command and Control Systems (2007) (0)
- Developing an Educational Infrastructure for Analyzing and Securing Social Media (2016) (0)
- Dynamic Growing Self-Organizing Tree Algorithm (2009) (0)
- Subspace Clustering and Automatic Image Annotation (2009) (0)
- Appendix C: A Perspective of the Inference Problem (2014) (0)
- Computing transitive closures of multilevel relations (1990) (0)
- Access Control for Web Services (2010) (0)
- Discretionary and Multilevel Security for Object Database Systems (2010) (0)
- Appendix A: Data Management Systems, Developments, and Trends (2014) (0)
- Metadata for Multimedia Databases (2001) (0)
- Processes and Techniques for Web Data Mining (2003) (0)
- Secure Social Media Systems (2016) (0)
- Secure Semantic Service Oriented Information Grid for Cyber Physical System and Applications (2009) (0)
- Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions (2000) (0)
- Aspects of Analyzing and Securing Social Networks (2016) (0)
- Integrating Big Data, Data Science and Cyber Security with Applications in Cloud and Internet of Things (2021) (0)
- Scalable and Efficient RBAC for Provenance (2014) (0)
- Trust Management and Web Services (2010) (0)
- Towards the design and implementation of a multilevel secure deductive database management system (1993) (0)
- Experimental Cloud Query Processing System for Social Networks (2016) (0)
- Ensemble-Based Insider Threat Detection (2017) (0)
- Experimental Semantic Web-Based Cloud Computing Systems (2013) (0)
- CLOUD 2017: Message from the General Chairs (2017) (0)
- Sanitization of Social Network Data for Release to Semitrusted Third Parties (2016) (0)
- Some elementary closure properties of n-cylinders (1983) (0)
- Secure Cloud Query Processing for Semantic Web-Based Social Media (2016) (0)
- Queries with Regular Path Expressions (2014) (0)
- Chapter 15 DETECTING REMOTE EXPLOITS USING DATA MINING (2008) (0)
- Integrating security technology and object-oriented technology (panel) (1993) (0)
- Social Network Classification through Data Partitioning (2016) (0)
- Semantic Web Services (2010) (0)
- Proceedings of the 14th IT-IP WG II.3 on Data (2000) (0)
- TweetHood: A Social Media Analytics Tool (2016) (0)
- CSE 2019 Committee Members (2019) (0)
- Survey of Insider Threat and Stream Mining (2017) (0)
- Trust Management and the Cloud (2013) (0)
- Towards the Design of a Multilevel Secure Object-Oriented Database Management System (1995) (0)
- Message from the General Chairs (2018) (0)
- Multi-concept adversarial attacks (2021) (0)
- Techniques and Tools for Social Network Analytics (2016) (0)
- Security standards for the semantic web B (2004) (0)
- Information Operations Across Infospheres Prof (2005) (0)
- Secure Data Warehousing (2005) (0)
- Security and Privacy for Emerging IoT and CPS Domains (2022) (0)
- PTAS for the minimum weighted dominating set in growth bounded graphs (2011) (0)
- Conclusion to Part II (2001) (0)
- Multimedia for the Web and E-Commerce (2001) (0)
- Message from HUMA Symposium Organizing Committee (2015) (0)
- Survivability Issues for Evolvable Real-time Command and Control Systems A Position Paper (2010) (0)
- Adaptive Information Coding for Secure and Reliable Telesurgery Communications (2010) (0)
- Security Issues for c loud c omputing (2010) (0)
- A Privacy-Preserving Architecture and Data-Sharing Model for Cloud-IoT Applications (2022) (0)
- Secure Heterogeneous and Federated Database Systems (2005) (0)
- Security and RDF (2007) (0)
- CAPT: Contrastive Pre-Training based Semi-Supervised Open-Set Learning (2022) (0)
- Digital Identity, Forensics, and Related Topics (2005) (0)
- Multi-dimensional Mapping (2009) (0)
- Data Mining and the Web (2003) (0)
- 2015 IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Baltimore, MD, USA, May 27-29, 2015 (2015) (0)
- Applications of XML to Data Management (2002) (0)
- Social Media Application Systems (2016) (0)
- Security and Provenance (2014) (0)
- Secure Cloud-Based Information Integration (2013) (0)
- Prototyping to explore MLS/DBMS design (1989) (0)
- Privacy and Web Services (2010) (0)
- Some Information on Terrorism, Security Threats, and Protection Measures (2003) (0)
- Information Operations Across Infospheres (2010) (0)
- Migrating Legacy Databases and Applications (Panel) (1998) (0)
- Mining Web Databases for Counter-Terrorism (2003) (0)
- Secure Geospatial, Multimedia, and Sensor Web Services (2010) (0)
- Secure Service-Oriented Computing (2010) (0)
- Experiments and Results for Nonsequence Data (2017) (0)
- Appendix B: Database Management and Security (2014) (0)
- Cloud Data Management (2013) (0)
- An Effective and Efficient Preprocessing-based Approach to Mitigate Advanced Adversarial Attacks (2020) (0)
- IRI 2019 Conference Organizers (2019) (0)
- Service-Oriented Analysis and Design (2010) (0)
- Details of Learning Classes (2017) (0)
- Cloud-Based Data Mining for Insider Threat Detection (2013) (0)
- A roadmap for privacy-enhanced secure data provenance (2014) (0)
- Guest editorial: Information reuse, integration, and reusable systems (2014) (0)
- Mining Usage Patterns and Structure on the Web (2003) (0)
- XML Applications to E-Commerce (2002) (0)
- Specialized Web Services (2010) (0)
- Keynote speech: Cloud-centric assured information sharing (2016) (0)
- On the Complexity of the Privacy Problem in Databases (2008) (0)
- Provenance Data Representation for Inference Control (2014) (0)
- Cloud-Centric Assured Information Sharing for Social Networks (2016) (0)
- Secure SOA and Web Services (2010) (0)
- Developments with Standards, Products, and Tools (2007) (0)
- Tweecalization: Location Mining Using Semisupervised Learning (2016) (0)
- Big Data Analytics and Inference Control (2014) (0)
- Message from DAWAM workshop co-chairs (2009) (0)
- Developments and Challenges in Location Mining (2016) (0)
- Information Management and Web Mining for Counter-Terrorism (2003) (0)
- Dependable Web Services (2010) (0)
- Grand Challenges in Data Integrity and Quality: Panel Discussion (2003) (0)
- Efficient Processing of Large RDF Streams Using Memory Management Algorithms (2010) (0)
- A.4 Data Management Systems Framework (2014) (0)
- Challenges for Stream Data Classification (2017) (0)
- Information Management and Web Data Mining (2003) (0)
- Extending Classification of Social Networks through Indirect Friendships (2016) (0)
- Social Graph Extraction, Integration, and Analysis (2016) (0)
- Architecture for an Inference Controller (2014) (0)
- Data Mining Outcomes, Approaches, and Techniques (2014) (0)
- Message from the ICWS 2012 general chaiirs (2012) (0)
- Understanding News Queries with Geo-Content Using Twitter (2016) (0)
- Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993 (1994) (0)
- Stream Mining for Security Applications (2011) (0)
- Specialized Clouds, Services, and Applications (2013) (0)
- Data Mining for Detecting Botnets (2011) (0)
- Security and Rules (2007) (0)
- Secure Web Data Management and Digital Libraries (2005) (0)
- Email Worm Detection (2011) (0)
- Information Management Technologies and XML (2002) (0)
- HPSC 2019 Committee Members (2019) (0)
- Web Database Management and XML (2002) (0)
- Data Mining Tool for Intrusion Detection (2009) (0)
- Secure Service-Oriented Analysis and Design (2010) (0)
- Data Management Systems: Developments and Trends (2002) (0)
- National Security, Privacy, Civil Liberties, and Web Mining (2003) (0)
- Inference Control for Social Media (2016) (0)
- Risk and Inference Control (2014) (0)
- Secure Semantic Web and Web Services (2010) (0)
- Supporting Technologies for BDMA and BDSP (2017) (0)
- Representation of One-One Degrees by n-Cylindrical Decision Problems (1988) (0)
- Chapter 3 Data Mining for Counter-Terrorism (2003) (0)
- Issues on Real-Time Object Request Brokers ( Position Paper ) (1999) (0)
- Trustworthy Machine Learning for Securing IoT Systems (2022) (0)
- Distributed Multimedia Database Systems (2001) (0)
- Scalability Using Big Data Technologies (2017) (0)
- A Research Initiative for a Secure Cloud (2013) (0)
- Data Science, COVID-19 Pandemic, Privacy and Civil Liberties (2020) (0)
- Directions for BDSP and BDMA (2017) (0)
- Security and Ontologies (2007) (0)
- Prototypes and Products (2005) (0)
- Integrating Object-Oriented Technolgy and Security Technology: A Panel Discussion (1993) (0)
- LPC: A Logits and Parameter Calibration Framework for Continual Learning (2022) (0)
- Web Services for Secure Data, Information, and Knowledge Management (2010) (0)
- Developments and Challenges in Distributed Data Communications Management Systems (1999) (0)
- Privacy and Cloud Services (2013) (0)
- Design and Implementation of a Semantic Web-Based Inference Controller: A Summary (2015) (0)
- Security and Privacy in Communication Networks: 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers (2016) (0)
- Database Systems and Related Technologies (2002) (0)
- Effective Web Page Prediction Using Hybrid Model (2009) (0)
- Prototypes, Products, and Standards for Web Data Mining (2003) (0)
- IDS 2019 Committee Members (2019) (0)
- Security Engineering: Developments and Directions. (2009) (0)
- Message from the program chairs of BigDataSecurity 2015 (2015) (0)
- 2015 IEEE International Conference on Information Reuse and Integration, IRI 2015, San Francisco, CA, USA, August 13-15, 2015 (2015) (0)
- Web Database Management (2003) (0)
- Multimedia Query Processing (2001) (0)
- Cloud Computing and Semantic Web Technologies (2016) (0)
- Data Reduction Using Hierarchical Clustering and Rocchio Bundling (2009) (0)
- IRI 2019 Panel II (2019) (0)
- Security Impact on Database Functions (2005) (0)
- Analysis of Cyberactivism : A Case Study of Online Free Tibet Activities (2007) (0)
- Insider Threat Detection for Sequence Data (2017) (0)
- Multilevel Relational Data Models (2005) (0)
- Secure Specialized Web Services (2010) (0)
- Secure Multimedia Data Management Systems (2005) (0)
- Suggested Reading: Books in Database Systems and Information Security (2005) (0)
- Secure Cloud Computing Products (2013) (0)
- Conclusion to Part IX (2013) (0)
- Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces (2021) (0)
- Enhanced Weighted Feature Selection (2009) (0)
- Data Mining Tool for Image Classification (2009) (0)
- Multimedia Data and Information Models (2001) (0)
- An Automated Vulnerability Detection Framework for Smart Contracts (2023) (0)
- I Applications in Distributed System Design Issues (0)
- Session details: Privacy, Society, and Me (2017) (0)
- Data Mining for Surveillance Applications (2006) (0)
- Trustworthy Machine Learning (2022) (0)
- Tweeque: Identifying Social Cliques for Location Mining (2016) (0)
- Uncertainty: An extra layer of security for unauthorized traffic based web services (2006) (0)
- Using game theory to mitigate the effects of a bioterrist attack (2008) (0)
- Information Retrieval and Web Mining for Counter-Terrorism (2003) (0)
- A.5 Building Information Systems from Framework (2014) (0)
- Aspects of Objects and Security (2005) (0)
- Secure Sensor and Wireless Information Management (2005) (0)
- Introduction to the Special Issue on Smart Systems for Industry 4.0 and IoT (2022) (0)
- BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation September 16-17 , 2014 The University of Texas at Dallas (2015) (0)
- Ranking Entities from Multiple Ontologies to Facilitate Federated Queries (2010) (0)
- Secure service composition with information flow control (2011) (0)
- Data, Information, and Knowledge Management (2013) (0)
- Multi-Generational Database Inference Controllers (2020) (0)
- Attacks on Social Media and Data Analytics Solutions (2016) (0)
- Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications (2011) (0)
- Guest editorial: Information reuse, integration, and reusable systems (2014) (0)
- Mimicking Human Behavior in Shared-Resource Computer Networks (2019) (0)
- Security, XML, and Web Services (2010) (0)
- Architectures for Multimedia Database Systems (2001) (0)
- Domain-Specific Semantic Webs and Security (2007) (0)
- Multimedia Data Management and Mining (2009) (0)
- 1 Information Operations Across Infospheres (0)
- Social Media and Bioterrorism (2016) (0)
- DESIGN AND IMPLEMENTATION OF A DISTRIBUTED DATABASE INFERENCE CONTROLLER (1993) (0)
- Web Usage and Structure Mining for Counter-Terrorism (2003) (0)
- Message from PASSAT 2009 Program Chair (2009) (0)
- Handbook of Data Management, 1998 Edition (1998) (0)
- The World Wide Web, E-Business, and E-Commerce (2001) (0)
- Multimedia Storage Management (2001) (0)
- Cloud Computing Tools and Frameworks (2014) (0)
- On the mitigation of bioterrorism through game theory (2009) (0)
- Process ing in LDV : A Secure Database System (2004) (0)
- Dependable Computing for National Security. (2003) (0)
- Secure Multimedia Data Management Research Directions (2002) (0)
- Access Control for Social Networks (2016) (0)
- Experimental Cloud Computing Systems (2013) (0)
- Our Approach to Studying Privacy in Social Networks (2016) (0)
- Workshop summary discussions WORDS 99 (1999) (0)
- XML-Related Data and Information Management Tools for the Web (2002) (0)
- Image Classification and Performance Analysis (2009) (0)
- Detecting Remote Exploits (2011) (0)
- Message from the PriSecCSN2012 workshop chairs (2012) (0)
- Privacy and Security Aspects of Data Mining Proceedings of a Workshop held in Conjunction with 2005 (2005) (0)
- COMPSAC 2015 Symposium on Security, Privacy and Trust in Computing (SEPT) Message from SEPT Organizing Committee (2015) (0)
- Service-Oriented Computing and Security (2013) (0)
- Data Stream Classification with Limited Labeled Training Data (2017) (0)
- Security-Constraint Processing for Inference Control (2005) (0)
- Conclusion to Part III (2001) (0)
- Social Network Integration and Analysis with Privacy Preservation (2016) (0)
- Message from the BigDataSecurity/HPSC/IDS 2018 General Chairs (2018) (0)
- Message from the ICWS 2 16 general chairs (2016) (0)
- Security, RDF, and Web Services (2010) (0)
- Temporal Geosocial Mobile Semantic Web (2016) (0)
- Introduction to the special issue on Computer security and standards: Overview of security-standards activities (1995) (0)
- Workshop Summary (1993) (0)
- Secure Services Technologies (2010) (0)
- Discretionary Security for Distributed Database Systems (2005) (0)
- Experimental Secure Cloud Computing Systems (2013) (0)
- Social Media Integration and Analytics Systems (2016) (0)
- Network and Web Security and E-Commerce and Other Applications (2000) (0)
- Digital Identity Management (2010) (0)
- B. Artificial Intelligence (2014) (0)
- Secure Data, Information, and Knowledge Management (2007) (0)
- Conceptual Structures for Inference Control (2005) (0)
- An Expert Network Simulation And Design System (1989) (0)
- Big Data Management for Secure Information Integration (2017) (0)
- Confidentiality, Privacy, and Trust for Social Media Data (2016) (0)
- Secure Cloud Data Management (2013) (0)
- Semantic Web Mining for Counter-Terrorism (2003) (0)
- Message from the SSW'08 organizers (2008) (0)
- An Infrastructure for a Secure Cloud (2013) (0)
- Security constraint processing in a distributed database environment (1994) (0)
- Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects (1993) (0)
- Stream Data Analytics for Insider Threat Detection (2017) (0)
- From Mainframe to the Cloud (2013) (0)
- Secure Semantic Interoperability (2007) (0)
- Classification of Social Networks Incorporating Link Types (2016) (0)
- Panel Session: What Are the Key Challenges in Distributed Security? (2008) (0)
- Design of the Data Mining Tool (2011) (0)
- Technologies and Techniques for Multimedia Data Mining (2001) (0)
- Secure Data Sharing Through Untrusted Clouds with Blockchain-enhanced Key Management (2020) (0)
- Directions in Data Stream Classification (2017) (0)
- Semantic Web Services and Security (2013) (0)
- Security as a Service (2013) (0)
- Secure Social Media Directions (2016) (0)
- Design and Implementation of a Semantic Cloud-Based Assured Information Sharing System (2013) (0)
- Security, Rules, and Web Services (2010) (0)
- Research contributions in secure dependable data management (2010) (0)
- Security, Ontologies, and Web Services (2010) (0)
- Semantic Web-Based Social Network Representation and Analysis (2016) (0)
- Applications of XML to Information Management (2002) (0)
- Multiple Evidence Combination for WWW Prediction (2009) (0)
- Secure computing with the actor paradigm (1993) (0)
- Message from the conference chairs (2013) (0)
- Service-Oriented Computing (2010) (0)
- ICWS 2015 Organizing Committee (2015) (0)
- Advanced Concepts in XML (2002) (0)
- Insider Threat Detection as a Stream Mining Problem (2017) (0)
- Cloud Query Processing System for Big Data Management (2017) (0)
- Secure Cloud Query Processing with Semantic Web Data (2013) (0)
- Implementing the Inference Controller (2014) (0)
- Secure Data Management (2007) (0)
- Inference Controller Design (2014) (0)
- Secure Semantic Web Services (2008) (0)
- Database Security, VI: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992 (1993) (0)
- Integrity Management and Data Provenance for Social Media (2016) (0)
- Secure Sematic Service - Oriented Systems (2011) (0)
- Al Qaeda Terrorist Financing (2013) (0)
- Experimental BDMA and BDSP Systems (2017) (0)
- The Design of an Ontology for ATT&CK and its Application to Cybersecurity (2023) (0)
- Geospatial Schema Matching with High-Quality Cluster Assurance and Location Mining from Social Network (2010) (0)
- Data Mining and Insider Threat Detection (2017) (0)
- Big Data Analytics for Malware Detection in Smartphones (2017) (0)
- Message from the General Chairs of CSCloud/SSC 2016 (2016) (0)
- Policy Enforcement and Related Issues (2005) (0)
- Message from SEPT Symposium Organizing Committee (2015) (0)
This paper list is powered by the following services:
Other Resources About Bhavani Thuraisingham
What Schools Are Affiliated With Bhavani Thuraisingham?
Bhavani Thuraisingham is affiliated with the following schools: