Dr. Bhavani Thuraisingham

Publications

Books

    Books Authored

    Series 1: Data Science (Data Management, Data Mining, Data Security for Technical Managers)

  1. Data Management Systems Evolution and Interoperation, CRC Press, May 1997.
  2. Data Mining, Technologies, Techniques Tools and Trends, CRC Press December 1998/January 1999
  3. Web Data Management and Electronic Commerce, CRC Press, June 2000.
  4. Managing and Mining Multimedia Databases, CRC Press, June 2001.
  5. XML, Databases and Semantic Web, CRC Press, March 2002.
  6. Web Data Mining and Counter-terrorism, CRC Press, June 2003.
  7. Database and Applications Security: Integrating Data Management and Information Security, CRC Press/Auerbach, June 2005.
  8. Building Trustworthy Semantic Webs, CRC Press/Auerbach, 2007.
  9. Secure Semantic Service Oriented Systems, CRC Press, November 2010.
  10. Developing and Securing the Cloud, CRC Press, November 2013.
  11. Trustworthy Machine Learning, Contract signed March 2022, Publication in 2025
  12. Series 2: Research from PhD Thesis of Students in Data Science and Cyber Security converted into books)

  13. Design and Implementation of Data Mining Tools, CRC Press, June 2009 (co-authors: L. Khan, M. Awad, L. Wang).
  14. Data Mining Tools for Malware Detection, CRC Press, December 2011 (co-authors: L. Khan, M. Masud).
  15. Secure Data Provenance and Inference Control with Semantic Web, CRC Press, 2015 (co- authors: T. Cadenhead, M. Kantarcioglu, V. Khadilkar).
  16. Analyzing and Securing Social Networks, CRC Press, April 2016 (co-authors: S. Abrol, R. Heatherly, M. Kantarcioglu, L. Khan).
  17. Stream Data Mining and Big Data Analytics for Insider Threat Detection, CRC Press, December 2017/January 2018 (co-authors: P. Pallabi, M. Masud, L. Khan).
  18. Secure Data Science: Integrating Cyber Security and Data Science, April 2022, CRC Press (coauthors: M. Kantarcioglu, L. Khan).

    Books Chapters

  1. Expert System to Design Control Systems, May 1990, Artificial Intelligence in Process Engineering, Academic Press, ed: M. Mavronopoulos (co-authors: F. Konar and P. Felix).
  2. Distributed Database Management Systems: Developments and Challenges, Local Area Network Handbook 1993 (Auerbach Publishers, invited paper, ed: J. Sloane and A. Drinan).
  3. Object-Oriented Approach to the Interoperability of Heterogeneous Database Management Systems, Local Area Network Handbook, 1994 (Aurebach Publishers, invited paper, ed: J. Sloane).
  4. Distributed Object Management System Approach to Integrating Heterogeneous Database Systems, Local Area Network Handbook, 1995 (Auerbach Publishers, invited paper, ed: R. Maybry).
  5. Internet Database Management, Database Management, 1996 (Auerbach Publishers, ed: R. Mabry).
  6. Secure database management, Handbook of Database Management, McGraw Hill 1996 (Ed: P. Fortier, co-author: S. Son et al).
  7. Multimedia database management, Handbook of Database Management, McGraw Hill, 1996 (Ed: P. Fortier, co-author: S. Dao).
  8. Secure Database Systems, Advances on Data Management, 2000 (Editor: O. Diaz and M. Piattini; co-author: E. Ferrari - Artech House).
  9. KM for Heterogeneous information exchange, Kluwer Book (co-author: A Gupta et al), 2002.
  10. Managing Cyber Threats: Issues and Challenges, Kluwer (editor: V. Kumar et al), 2004.
  11. Data Mining for Counter-terrorism, AAAI Press (editor: H. Kargupta et al), 2004 (MGDM Conference, 2002).
  12. Secure Semantic Grids, Web and Information Systems Security, co-author: L. Khan (editors: E. Ferrari et al) Idea Group.
  13. Assured Information Sharing Across Organization Boundaries, Data Mining for Counter-terrorism, Springer, 2006 (editor: H. Chen).
  14. Secure Semantic Web Services, Springer, (editor: M. Gertz), 2008 Assured Information Sharing: Technologies, Challenges and Directions, Intelligence and Security Informatics 2008: 1-15.
  15. Secure Semantic Web Services, Handbook of Database Security, Springer, 2008, p. 231 - 245 (Editor: S. Jajodia and M Gertz)
  16. Policy Management for the Semantic Web, Handbooks in Information System, Volume 4, Ch. 6, p. 159 – 191, 2009, Elsevier (Editors: H. Raghav Rao, Shambhu Upadhyaya)
  17. Privacy Issues in Online Social Networks, Privacy-Aware Knowledge Discovery: November Applications and New Techniques, Data Mining and Knowledge Discovery Series, Chapman, and Hall/CRC (co-authors: B. Carminati et al.) (Editor: F. Bonchi, E. Ferrari).
  18. From cyber terrorism to state actors' covert cyber operations. Strategic Intelligence Management (Editors: Akhgar and Yates) Chapter 19, p. 229 – 233, Elsevier, March 2013(co-author: J. Kallberg).
  19. A Generalized Approach for Social Network Integration and Analysis with Privacy Preservation, Studies in Big Data, Vol. 1, 2014, p. 259 – 280, Springer, 2014 (co-author: C. Yang) (Editor: W. Chu)