Report Number |
Title |
Authors |
Submission Date |
UTDCS-05-05 |
Data Mining Techniques for Biometric Systems |
Latifur Khan, Bhavani Thuraisingham |
2/05 |
UTDCS-39-05 |
Uncertainty: An Extra Layer of Security For Unauthorized Traffic Based Web Services |
Parag Agarwal, B. Prabhakaran, Bhavani Thuraisingham |
12/05 |
UTDCS-02-06 |
Dependable and Secure TMO Scheme |
Jung-In Kim, Bhavani Thuraisingham |
1/06 |
UTDCS-03-06 |
Geography Resource Description Framework (GRDF) and Secure GRDF (S-GRDF) |
Ashraful Alam, Bhavani Thuraisingham |
1/06 |
UTDCS-04-06 |
An Adaptable Perturbation Model of Privacy Preserving Data Mining |
Li Liu, Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan |
1/06 |
UTDCS-05-06 |
Face Recognition Using Various Classifiers: Artificial Neural Network, Linear Discriminant and Principal Component Analysis |
Pallabi Parveen, Bhavani Thuraisingham |
1/06 |
UTDCS-06-06 |
Administering The Semantic Web: CPT: Confidentiality, Privacy and Trust Management |
Nathalie Tsybulnik, Bhavani Thuraisingham |
2/06 |
UTDCS-13-06 |
On the Complexity of the Privacy Problem in Databases |
Bhavani Thuraisingham |
3/06 |
UTDCS-14-06 |
Inference Control for Document Release and Dissemination |
Bhavani Thuraisingham |
3/06 |
UTDCS-15-06 |
Individually Adaptable Perturbation Model for Privacy Preserving Data Mining |
Li Liu, Murat Kantarcioglu, Bhavani Thuraisingham |
3/06 |
UTDCS-22-06 |
Design and Implementation of a Secure Social Network System |
Ryan Layfield, Bhavani Thuraisingham |
4/06 |
UTDCS-27-06 |
Detecting New Malicious Executables Using Data Mining |
Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham, Mamoun A. Awad |
7/06 |
UTDCS-32-06 |
Fingerprint Matching Algorithm Based On Tree Comparison Using Ratios of Relational Distances |
Abinandhan Chandrasekaran, Bhavani Thuraisingham |
7/06 |
UTDCS-39-06 |
A Scalable Clustering Method Based on Density |
Kathryn Bean, Sergey Bereg, Latifur Khan, Bhavani Thuraisingham |
9/06 |
UTDCS-40-06 |
Detecting Malicious Executables Using Assembly Feature Retrieval |
Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham |
9/06 |
UTDCS-43-06 |
Assured Information Sharing: Technologies, Challenges and Directions |
Bhavani Thuraisingham |
10/06 |
UTDCS-44-06 |
Design and Implementation of Policy Enforcement, Data Sharing and Mining Components for Trustworthy Coalitions |
Mamoun Awad, Dilsad Cavus, Latifur Khan, Manjunath Reddy, Bhavani Thuraisingham |
10/06 |
UTDCS-45-06 |
Design and Simulation of Agent-based Trust Management Techniques for a Coalition Environment |
Srinivasan Iyer, Bhavani Thuraisingham |
10/06 |
UTDCS-46-06 |
Research and Simulation of Game Theoretical Techniques for Data Sharing Among Semi-Trustworthy Partners |
Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham |
10/06 |
UTDCS-47-06 |
Defensive Information Operations: Detecting Malicious Executables Using Assembly Feature Retrieval in an Untrustworthy Environment |
M. Mehedy Masud, Latifur Khan, Bhavani Thuraisingham |
10/06 |
UTDCS-48-06 |
Information Operations Across Infospheres: Volume 1 |
Bhavani Thuraisingham, Latifur Khan, Murat Kantarcioglu, Mamoun Awad, Dilsad Cavus, Ryan Layfield, Mehedy Masud, Srinivasan Iyer |
10/06 |
UTDCS-51-06 |
A Novel Privacy Preserving Decision Tree Algorithm |
Li Liu, Murat Kantarcioglu, Bhavani Thuraisingham |
10/06 |
UTDCS-58-06 |
Face Segmentation for Privacy Preserving Video Surveillance |
Sai Chaitanya, Bhavani Thuraisingham |
11/06 |
UTDCS-60-06 |
A Comparative Study of a Key Agreement Protocol Based on ECC and RSA |
Vibha Sethi, Bhavani Thuraisingham |
11/06 |
UTDCS-61-06 |
RFID Technologies and Their Applications |
Abinandhan Chandrasekaran, Bhavani Thuraisingham |
11/06 |
UTDCS-64-06 |
Secure Grid Computing |
Jianmin Zhu, Bhavani Thuraisingham |
12/06 |
UTDCS-65-06 |
Face Recognition Using Multiple Classifiers |
Pallabi Parveen, Bhavani Thuraisingham |
12/06 |
UTDCS-66-06 |
A Framework for a Video Analysis Tool for Suspicious Event Detection |
Gal Levee, Latifur Khan, Bhavani Thuraisingham |
12/06 |
UTDCS-68-06 |
A Model for Risk Adaptive Access Control in RABC Employed Distributed Environments |
Gal Levee, Latifur Khan, Bhavani Thuraisingham |
12/06 |
UTDCS-01-07 |
An Integrated Platform for Secure Geospatial Information Exchange Through the Semantic Web |
Bhavani Thuraisingham, Alam Ashraful, Ganesh Subbiah, Latifur Khan |
1/07 |
UTDCS-02-07 |
Oracle 10 G XE Tutorial (Product of Oracle Corporation) |
Srinivasan Iyer, Bhavani Thuraisingham |
2/07 |
UTDCS-03-07 |
Geospatial Data Mining for National Security: Land Cover Classification And Grouping for Semantic Assessment |
Chuanjun Li, Latifur Khan, M. Husain, Bhavani Thuraisingham, Shaofei Chen, Fang Qiu |
3/07 |
UTDCS-33-07 |
Security for Enterprise Resource Planning Systems |
Wei-She, Bhavani Thuraisingham |
8/07 |
UTDCS-34-07 |
Secure Semantic Web Services |
Bhavani Thuraisingham |
8/07 |
UTDCS-35-07 |
Extended RBAC-Based Design and Implementation for A Secure Data Warehouse |
Bhavani Thuraisingham, Murat Kantarcioglu, Srinivasan Iyer |
9/07 |
UTDCS-39-07 |
Architecture for a Trusted Computing Base For need-to-share in case of emergencies |
Yashaswini Harsha Kumar, Bhavani Thuraisingham, Latifur Khan |
11/07 |
UTDCS-40-07 |
Enforcing Honesty in Assured Information Sharing within a Distributed System |
Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham |
11/07 |
UTDCS-41-07 |
Data Mining for Defensive Operations |
Mohammad Masud, Latifur Khan, Bhavani Thuraisingham |
11/07 |
UTDCS-45-07 |
Information Operations Across Infospheres: Volume 2 |
Latifur Khan, Bhavani Thuraisingham, Murat Kantarcioglu, Yashaswini Harsha Kumar, Mehedy Masud, Ryan Layfield |
12/07 |
UTDCS-01-08 |
Trusted Computing Base for Assured Information Sharing |
Yashaswini Harsha Kumar, Bhavani Thuraisingham, Latifur Khan |
1/08 |
UTDCS-02-08 |
Delegation-based Security Model For Web Services |
Wei She, Bhavani Thuraisingham, I-Ling Yen |
1/08 |
UTDCS-05-08 |
Mining Concept-Drifting Data Stream To Detect Peer to Peer Botnet Traffic |
Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham |
3/08 |
UTDCS-13-08 |
Content-based Ontology Matching for GIS Datasets |
Jeffrey L. Partyka, Latifur Khan, Bhavani Thuraisingham, Neda Alipanah, Shashi Shekhar |
5/08 |
UTDCS-18-08 |
Surgical Haptics and Robotics: Influence of Mismatched Haptic and Visual Display Scales |
Gregory S. Lee, Bhavani Thuraisingham |
7/08 |
UTDCS-20-08 |
Synthesize Virtual World Motions From 2D Video Recognition |
Yohan Jin, Myunghoon Suk, B. Prabhakaran, Bhavani Thuraisingham |
7/08 |
UTDCS-22-08 |
Content-based Ontology Matching For GIS Datasets |
Jeffrey Partyka, Neda Alipanah, Latifur Khan, Bhavani Thuraisingham, Shashi Shekhar |
7/08 |
UTDCS-23-08 |
Secure Haptics and Surgical Robotics: Adaptation to Fitts' Law Performance Measure for Multi-Target Task Comparisons |
Gregory S. Lee, Bhavani Thuraisingham |
8/08 |
UTDCS-32-08 |
A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data |
Mohammad M. Masud, Bhavani Thuraisingham, Jing Gao, Latifur Khan, Jiawei Han |
10/08 |
UTDCS-40-08 |
A Framework for the Relational Transformation of RDF Data |
Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida, Bhavani Thuraisingham |
12/08 |
UTDCS-01-09 |
A Fine Grained Model for Information Flow Control in Web Service Composition |
Wei She, I-Ling Yen, Bhavani Thuraisingham |
1/09 |
UTDCS-03-09 |
Preventing Private Information Inference Attacks on Social Networks |
Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham |
2/09 |
UTDCS-09-09 |
Design of a Temporal Geosocial Semantic Web for Military Stabilization and Reconstruction Operations |
Bhavani Thuraisingham, Latifur Khan, Murat Kantarcioglu |
4/09 |
UTDCS-13-09 |
Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams |
Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham |
6/09 |
UTDCS-25-09 |
DESIGN and Implementation of Restful Web Services for Blackbook |
Pranav Parikh, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham |
8/09 |
UTDCS-28-09 |
A Case Study on Geospatial Data Management with Blackbook |
Sonia Chib, Jyothsna Rachapalli, Bhavani Thuraisingham, Latifur Khan, Murat Kantarcioglu |
9/09 |
UTDCS-36-09 |
Enhanced Information Flow Control for Service Composition and Its Implementation |
Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino |
9/09 |
UTDCS-40-09 |
Cost-based Query Processing for Large RDF Graph Using Hadoop and MapReduce |
Mohammad Husain, Pankil Doshi, Latifur Khan, Syeda A. Rizvi, Murat Kantarcioglu, Bhavani Thuraisingham |
11/09 |
UTDCS-41-09 |
Efficient Query Processing for Large RDF Graphs Using Hadoop and MapReduce |
Mohammad Husain, Pankil Doshi, James McGlothlin, Latifur Khan, Bhavani Thuraisingham, Murat Kantarcioglu |
11/09 |
UTDCS-51-09 |
Secure Dependable and High Performance Cloud Storage |
Yunqi Ye, I-Ling Yen, Liangliang Xiao, Farohk Bastani, Bhavani Thuraisingham |
11/09 |
UTDCS-01-10 |
Semantic Web Implementation Scheme for National Vulnerability Common Platform Enumeration Data) |
Vaibhav Khadilkar, Jyothsna Rachapalli, Bhavani Thuraisingham |
1/10 |
UTDCS-02-10 |
Security Issues for Cloud Computing |
Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham |
2/10 |
UTDCS-03-10 |
Securing the Execution Environment, Applications and Data from Multi-trusted Components |
Elisa Bertino, Gabriel Ghinita, Kevin Hamlen, Murat Kantarcioglu, Hsien-Hsin S. Lee, Ninghui Li, Calton Pu, Ravi Sandhu, Waleed Smari, Bhavani Thuraisingham, Gene Tsudik, Dongyan Xu, Shouhuai Xu |
2/10 |
UTDCS-04-10 |
Ranking Entities from Multiple Ontologies to Facilitate Federated Queries |
Neda Alpinah, Julie Rauer, Latifur Khan, Steven Seida, Bhavani Thuraisingham |
4/10 |
UTDCS-13-10 |
Bi-Directional Translation of Relational Data Into Virtual RDF Stores |
Sunitha Ramanujam, Vaibhav Khadilkar, Latifur Khan, Steven Seida, Murat Kantarcioglu, Bhavani Thuraisingham |
5/10 |
UTDCS-19-10 |
Selected Papers in Security Studies Volume 1: Terrorism and the Application of Information Technology: Volume I: Terrorism Tactics, Trends, and Technologies |
Bhavani Thuraisingham |
7/10 |
UTDCS-20-10 |
RDF Neural Network-based Fault Localization |
W. Eric Wong, Vidroha Debroy, Bhavani Thuraisingham and Richard Golden |
7/10 |
UTDCS-23-10 |
Selected Papers in Security Studies Volume 2: Information Sharing Strategies of the United States Federal Government and Its Allies and Our Contributions Towards Implementing these Strategies Version I |
Bhavani Thuraisingham |
8/10 |
UTDCS-24-10 |
A Comparison of Approaches for Large-Scale Data Mining Utilizing MapReduce in Large-Scale Data Mining |
Amy Xuyang Tan, Valerie Li Liu, Murat Kantarcioglu and Bhavani Thuraisingham |
8/10 |
UTDCS-27-10 |
Ontology-driven Query Expansion Methods To Facilitate Federated Queries |
Neda Alipanah, Pallabi Parveen, Sheetal Menezes, Latifur Khan, Steven B. Seida and Bhavani Thuraisingham |
8/10 |
UTDCS-12-11 |
Federated Query Processing Using Ontology Structure and Ranking in a Service Oriented Environment |
Neda Alipanah, Pallabi Parveen, Latifur Khan, Bhavani Thuraisingham |
3/11 |
UTDCS-22-11 |
RETRO: A Framework for Semantics Preserving SQL-to-SPARQL Translation |
Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham |
8/11 |
UTDCS-27-11 |
Towards the Design and Implementation of a Cloud-centric Assured Information Sharing System |
Bhavani Thuraisingham, Vaibhav Khadilkar, Tyrone Cadenhead, Jyothsna Rachapalli, Murat Kantarcioglu, Kevin Hamlen, Latifur Khan, Farhan Husain |
9/11 |
UTDCS-30-11 |
Optimized Ontology-Driven Query Expansion Using Map-Reduce Framework to Facilitate Federated Queries |
Neda Alipanah, Latifur Khan, Bhavani Thuraisingham |
11/11 |
UTDCS-31-11 |
Risk-Aware Data Processing in Hybrid Clouds |
Vaibhav Khadilkar, Kerim Yasin Oktay, Bijit Hore, Murat Kantarcioglu, Sharad Mehrotra, Bhavani Thuraisingham |
11/11 |
UTDCS-34-11 |
Selected Papers in Security Studies Volume 5: Payment Card Fraud: Challenges and Solutions |
Irina Sakharova, Latifur Khan |
11/11 |
UTDCS-35-11 |
Selected Papers in Security Studies Volume 6: The Continued War on Terrorism - How to Maintain Long-Range Terrorist Deterrence |
Jan Kallberg, Bhavani Thuraisingham |
11/11 |
UTDCS-36-11 |
Selected Papers in Security Studies Volume 7: Data Supply Chain Management: Supply Chain Management for Incentive and Risk-based Assured Information Sharing |
Bhavani Thuraisingham |
12/11 |
UTDCS-12-12 |
Selected Papers in Security Studies Volume 8: Designer Satellite Collisions from Covert Cyber War |
Jan Kallberg, Bhavani Thuraisingham |
8/12 |
UTDCS-13-12 |
Selected Papers in Security Studies Volume 9: Common Criteria Meets Realpolitik: Trust, Alliances, and Poteltial Betrayal |
Jan Kallberg |
8/12 |