Intersection of Data Science and Cyber Security
- Secure Query Processing Using AI Techniques, January 1988, Proceedings of the IEEE Hawaii International Conference on Systems Sciences, p. 561-570, (co-authors: W. T. Tsai and T. F. Keefe) - Best Paper Award for Software Tracks (enhanced version in IEEE Computer 1989).
- Foundations of Multilevel Databases, May 1988, Proceedings 1st RADC Database Security Invitational Workshop, Menlo Park, CA, (Proceedings published by Springer Verlag, 1992, Ed: T. Lunt – Book Chapter).
- Security for Large Systems, AAAI Conference Workshop on Large AI Systems, St Paul, MN, August 1988 (coauthor: Teresa Lunt)
- Design of an Update Processor for MLS/DBMS, October 1988, Invited paper, Proceedings of the 11th National Computer Security Conference, Baltimore, MD; addendum to Proceedings (co-authors: P. Stachour and P. Dwyer).
- Query Processing in LDV: A Secure Database System, December 1988, Proceedings of the 4th IEEE Aerospace Computer Security Conference, Orlando, FL (co-authors: P. Dwyer, E. Onuegbe and P. Stachour).
- A Multilevel Security Model for Object-Oriented Systems, October 1988, Proceedings of the 11th National Computer Security Conference, Baltimore, MD, (co-authors: W. T. Tsai and T. F. Keefe).
- Prototyping as a Research Tool for MLS/DBMS, October 1988, Proceedings of the IFIP WG 11.3 Conference on Database Security, Kingston, Ontario, Canada, (also published as book chapter by North Holland, 1989: Database Security II: Status and Prospects) (co-authors: W. Tsai and D. Thomsen).
- Security Checking with Prolog-Extensions, May 1989, Proceedings of the 2nd RADC Database Security Invitational Workshop, Franconia, NH.
- Mandatory Security in Object-Oriented Database Systems, October 1989, Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages and Applications (ACM OOPSLA) Conference, New Orleans, LA.
- A Multilevel Secure Object-Oriented Data Model, October 1989, Proceedings of the 12th National Computer Security Conference, Baltimore, MD.
- Secure Query Processing in Intelligent Database Management Systems, December 1989, Proceedings of the 5th IEEE Computer Security Applications Conference Tucson, AZ.
- Novel Approaches to Handle the Inference Problem, June 1990, Proceedings of the 3rd RADC Database Security Workshop, New York.
- The Inference Problem in Multilevel Secure Database Management Systems, June 1990, Proceedings of the 3rd RADC Database Security Workshop, New York (co-authors: W. Ford, M. Collins, J. O'Keeffe).
- Trusted Distributed Database Management Systems, June 1990, Proceedings of the 3rd RADC Database Security Workshop, New York, (co-author: H. Rubinovitz).
- Recursion Theoretic Properties of the Inference Problem in Database Security, June 1990, presented at the 3rd IEEE Foundations of Computer Security Workshop, Franconia, NH (public release was not obtained in time for proceedings; printed as MITRE Paper M291 May 1990).
- Mathematical Formalisms for Multilevel Object-Oriented Systems, paper presented at the Workshop on Object-Oriented Database Security, April 1990, Karlsruhe, West Germany.
- Neural Network Applications in Intrusion Detection, paper distributed and presented at the 7th Intrusion Detection Workshop, May 1991, Menlo Park, CA (co-author: W. Ford).
- Secure Interoperability of Trusted Database Management Systems, Technical paper presented at the ACM Workshop on Data Management Security and Privacy Standards, December 1991, San Antonio, TX, (Held in conjunction with the 7th IEEE Computer Security Applications Conference).
- Object-oriented Approach to Interconnecting Trusted Database Management Systems, technical paper presented at the ACM Workshop on Data Management Security and Privacy Standards, December 1992, San Antonio, TX (Held in conjunction with the 8th IEEE Computer Security Applications Conference) (co-author: H. Rubinovitz).
- Fuzzy Logic and Multilevel Databases, presented at the 1st Boston Area Fuzzy Logic Workshop, February 1993.
- Towards a Global Multilevel Data Model in a Secure Heterogeneous Database System, Presented at the TIMS/ORSA Conference, October 1993 (abstract in proceedings).
- Security and Integrity Constraint Processing in a Multilevel Secure Distributed Environment, Information Security for the 90s, AFCEA Conference, May 1993, Ft. Monmouth, NJ (co-authors: A. Abreu, H. Rubinovitz, M. Collins).
- Transaction Management for Real-time Command and Control Systems, Paper distributed and presented at ATMA, September 1996, Goa, India (co-author: P. Krupp, et al).
- RT-OMT: An Object-Oriented Design and Analysis Methodology for Real-time Database Systems Applications, Proceedings of the OOPSLA Conference Workshop on Object-Oriented Real-time Systems Analysis, October 1994, Portland, OR (co-author: A. Schafer).
- Adaptable Real-time Command and Control Systems, Work in Progress Session, RTSS, 1998, Madrid, Spain (co-author: S. Wohlever et al) (paper in workshop report proceedings).
- Technologies and Security Issues for the Semantic Web, Data and Knowledge Engineering Workshop, May 2002, Sonoma, CA.
- Geospatial RDF and Secure GRDF, presented at the Geospatial Semantic Web workshop at Semantic Web Symposium, Athens, GA, November 2006 (co-author: A. Ashraful).
- Building Trustworthy Geospatial Semantic Web, Geospatial Technologies in Homeland Security Conference, November 2006, College Station, TX.
- Geospatial Data Mining for Crime Analysis, Next Generation Data Mining Conference, October 2007, Baltimore, MD (co-author: S. Shekhar et al).
- Data Mining, Security and Privacy, Position Paper, NSF Workshop, September 2007, Arlington, VA.
- Geospatial Data Mining for Crime Analysis, Next Generation Data Mining Conference, October 2007, Baltimore, MD (co-author: S. Shekhar et al).
- Multilevel Security for Multimedia Database Systems, September 1990, Proceedings of the 4th IFIP WG 11.3 Conference on Database Security, Halifax, England, (also published as book chapter by North Holland, 1991, p. 99 - 116).
- Secure Query Processing in Distributed Database Management Systems - Design and Performance Study, December 1990, Proceedings of the 6th IEEE Computer Security Applications Conference, Tucson, AZ, (co-author: A. Kamon).
- A Note on Security Constraint Processing in a Multilevel Secure Database Management System, April 1991, Proceedings of the 4th RADC Database Security Workshop, Little Compton, RI (co- author: W. Ford, M. Collins).
- Trusted Distributed Database Management Systems R & D - A Progress Report, April 1991, Proceedings of the 4th RADC Database Security Workshop, Little Compton, RI, (co-authors: H. Rubinovitz).
- Handling Security Constraints During Multilevel Database Design, April 1991, Proceedings of the 4th RADC Database Security Workshop, Little Compton, RI.
- Implementation and Simulation of Secure Distributed Query Processing Algorithms, Proceedings of the 1991 Computer Simulation Conference, Baltimore, MD, (co-author: H. Rubinovitz).
- A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge Base Management System - II, June 1991, Proceedings of the 4th IEEE Computer Security Foundations Workshop, Franconia, NH.
- Issues on the Design and Implementation of an Intelligent Database Inference Controller, Proceedings of the 1991 IEEE International Conference on Systems, Man, and Cybernetics, Charlottesville, VA (co-author: W. Ford).
- The Use of Conceptual Structures to Handle the Inference Problem, Proceedings of the 5th IFIP WG 11.3 Conference on Database Security, Shepherdstown, VA., November 1991 (Also published by North Holland, 1992)
- Security Constraint Processing During the Update Operation in a Multilevel Secure Database System, Proceedings of the 7th IEEE Computer Security Applications Conference, San Antonio, TX, December 1991 (co-authors: M. Collins, W. Ford).
- Design and Simulation of Secure Distributed Concurrency Control Algorithms, Proceedings of the 1992 Computer Simulation Conference, Nevada, July 1992. (co-author: H. Rubinovitz).
- A Nonmonotonic Typed Multilevel Logic for Multilevel Database Management Systems - II, June 1992, Proceedings of the 5th IEEE Computer Security Foundations Workshop, Franconia, NH.
- Knowledge-based Inference Control in a Multilevel Secure Database Management System, Proceedings of the 15th National Computer Security Conference, Baltimore, MD, October 1992.
- A Note on the Security Impact on Real-time Database Management Systems, Proceedings of the 5th RADC Database Security Workshop, New York, October 1992.
- Secure Computing with the ACTOR Paradigm, Presented at the ACM/SIGSAC New Computer Security Paradigms Workshop, Little Compton, RI, September 1992. (Proceedings published by ACM Press, 1993)
- An Object-Oriented Approach to Modeling Multilevel Database Applications, Proceedings of the ACM Conference Workshop on Object-Oriented Programming Language, Systems, and Applications, Vancouver, B.C., October 1992 (co-author: P. Sell).
- Towards the Design and Implementation of a Multilevel Secure Deductive Database Management System, Proceedings of the 26th Hawaii International Conference on Systems Sciences, January 1993.
- Parallel Processing and Trusted Database Management Systems - Applying One Technology to the Other, Proceedings of the 1993 ACM Conference in Computer Science, Indianapolis, Indiana (co- author: W. Ford).
- Security and Integrity Constraint Processing in a Multilevel Secure Distributed Environment, MILCOM 93, October 1993 (classified session) (co-authors: A. Abreu, H. Rubinovitz, M. Collins).
- Towards a Multilevel Secure Database Management System for Real-time Applications, Proceedings of the First IEEE Workshop in Real-time Computing, May 1993 (co-author: S. Son).
- Design and Implementation of a Distributed Database Inference Controller, Proceedings of the 17th IEEE COMPSAC Conference, November 1993. (co-authors: H. Rubinovitz, D. Foti, A. Abreu).
- Security and Integrity in Distributed Database System, Database Colloquium 93, San Diego, CA, August 1993 (co-authors: D. Small, D. Goldsmith) (proceedings available in electronic media).
- Applying OMT for Multilevel Database Applications, Proceedings of the 7th IFIP Working Conference on Database Security, Huntsville, Alabama, September 1993. (co-author: P. Sell) (also published as book chapter by North Holland, 1994).
- Object-oriented Approach to Interconnecting Trusted Database Management Systems, September 1993, ACM OOPSLA-93 Conference Workshop on Object Persistence in Heterogeneous Database Environments, Washington D.C. (co-author: H. Rubinovitz).
- Security Constraint Processing in a Distributed Database Environment, Proceedings of the 1994 ACM Computer Science Conference, Phoenix, AZ, March 1994. (co-author: H. Rubinovitz).
- Hypersemantic Data Modeling for Inference Analysis, Proceedings of the 8th IFIP Working Conference in Database Security, Hildesheim, Germany, August 1994. (co-authors: D. Marks, L. Binns) (also published as book chapter by North Holland 1995).
- A Fine-grained Access Control Model for Object-oriented DBMS, Proceedings of the 8th IFIP Working Conference in Database Security, Hildesheim, Germany, August 1994 (co-authors: A. Rosenthal et al) (also as book chapter by North Holland, 1995).
- An Adaptive Policy for Improved Timeliness in Secure Database Systems, Proceedings of the 9th IFIP Working Conference in Database Security, New York, August 1995. (co-authors: S. Son and R. David, also as book chapter by North Holland 1996).
- Design and Implementation of a Database Inference Controller Utilizing a Deductive Object- Oriented Data Model, Proceedings of the 13th DOD Database Colloquium, San Diego, CA, August 1996. (co-authors: M. Collins, D. Marks, B. Newman).
- Survivability Issues for Evolvable Real-time Command and Control Systems, Proceedings of the Information Survivability Workshop, February 1997 (co-authors: P. Krupp, J. Maurer).
- Adaptable Object Request Brokers for Information Survivability of Command and Control Systems, Proceedings of the Information Survivability Workshop, October 1998 (co-author: J. Maurer et al).
- Data Mining, Data Warehousing and Security, Proceedings of the IFIP Conference Book, Chapman, and Hall, 1997 (version of keynote address at conference, 1996; editor: P. Samarati and R. Sandhu) (also presented at CODATA Conference, Paris, June 1999).
- Adaptable Object Request Brokers for Information Survivability of Evolvable Real Time Command and Control Systems, proceedings IEEE FTDCS Conference, Cape Town, South Africa, December 1999 (co-author: J. Maurer).
- Directions for Web and E-Commerce Security, Proceedings WET ICE June 2001, Boston, MA (co- authors: C. Clifton, E. Bertino et al).
- Data and Applications Security: Developments and Directions Proceedings IEEE COMPSAC, 2002, Oxford, UK.
- Building Secure Survivable Semantic Webs, Proceedings IEEE ICTAI 2002, Washington DC.
- Security Issues for the Semantic Web, Proceedings IEEE COMPSAC 2003, Dallas, TX.
- Dependable Computing for National Security: A Position Paper, Proceedings of the 6th International Symposium on Autonomous Decentralized Systems, April 2003, Pisa, Italy (ISADS).
- Data and Applications Security: Past, Present and Future, Proceedings of IFIP Conference Book (Kluwer), 2004 (version of keynote address at conference, Colorado, 2003; editor: I. Ray)
- Security and Privacy for Web Databases and Services, Proceedings of the EDBT Conference, March 2003, Crete, Greece (co-author: E. Ferrari) (based on keynote address at EDBT).
- Using RDF for Policy Specification and Enforcement, Proceedings of the DEXA Workshop on Web Semantics, Zaragoza, Spain, August 2004 (co-author: B. Carminati et al).
- On the Complexity of the Privacy Problem in Databases, Proceedings Foundations of Data Mining, Workshop, England, 2004 (Proceedings by lecture notes, Springer).
- Towards Access Control for Visual Web Model Management, Proceedings IEEE E-Commerce Workshop, Hong Kong, May 2005 (co-author: G. Song et al).
- Trust Management in a Distributed Environment, Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC), Edinburgh, Scotland, July 2005.
- Secure Model Management Operations for the Web, Proceedings IFIP Data and Applications Security Conference, Connecticut, August 2005 (co-authors: G. Song et al).
- Multilevel Secure Teleconferencing over Public Switched Telephone Network, IFIP Data and Applications Security Conference, Connecticut, 2005 (co-author: I. Youn et al).
- Dependable Real-time Data Mining, Proceedings ISORC 2005, Seattle (co-author: L. Khan et al).
- A Framework for a Video Analysis Tool for Suspicious Event Detection, ACM SIGKDD Multimedia Data Mining Workshop, Chicago, IL 2005 (co-author: G. Lavee et al).
- Message Correlation in Automated Communication Surveillance through Singular Value Decomposition, Proceedings ACM MM Workshop, Chicago, IL, 2005 (co-author: R. Layfield, et al).
- Privacy Preserving Data Mining, Proceedings IEEE ICDM Workshop on Privacy preserving Data Mining, Houston, TX, 2005.
- Dependable and Secure TMO Scheme, Proceedings of the 9th IEEE ISORC, Gyeongju, South Korea, April 2006 (co-author: J. Kim).
- Access control, confidentiality, and privacy for video surveillance databases. SACMAT 2006: 1-10, Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan
- Design of a Secure CAMIN Application Systems based on Secure and Dependable TMO, Proceedings ISORC, May 2007, Santorini, Greece, (co-author: J. Kim).
- Security for Web Services, Proceedings ACM Workshop in Secure Web Services, May 2006 (co- author: C. Farkas et al) (California)
- Detection and Resolution of Anomalies in Firewall Policy Rules, Proceedings IFIP Data and Applications Security Conference, Sophia Antipolis, France, 2006 (co-author: M. Abedin et al).
- A Knowledge Based Approach to Detect New Malicious Executables, Proceedings Second SKM Workshop, Brooklyn, NY, September 2006 (co-author: L. Khan et al; enhanced version appeared in Information Systems Frontiers).
- Access Control for Geospatial Web Services, Proceedings ACM CCS Conference Workshop, and November 2006. Fairfax, VA (co-author: A. Ashraful et al).
- Geospatial RDF, ISWC Conference on Geospatial Semantic Web, Athens, GA, Nov. 2006 (co- author: A. Ashraful).
- Face Recognition Using Multiple Classifiers, IEEE ICTAI Conference Proceedings, November 2006 Washington DC, (co-author: P. Parveen).
- The Applicability of the Perturbation Model-based Privacy-preserving Data Mining, Proceedings IEEE ICDM Conference Workshop on Privacy Preserving Data Mining, Hong Kong, December 2006. (enhanced version appeared in DKE 2008) (co-author: L. Liu).
- Design and Simulation of Trust Management Techniques for a Coalition Data Sharing Environment, Proceedings FTDCS, 2007, Sedona, Arizona (co-author: S. Iyer).
- Fingerprint Matching Algorithm, Proceedings ARES, Vienna, Austria, April 2007.
- Extended RBAC - Based Design and Implementation for a Secure Data Warehouse, Proceedings ARES, April 2007, Vienna Austria, (enhanced version appeared in International Journal of Business Intelligence and Data Mining, Vol. 2, No. 4, p. 367 – 382, 2007) (co-author: S. Iyer).
- Managing Risks in RBAC Employed Distributed Environments, Proceedings of the 2nd International Symposium on Information Security (IS 2007) (co-authors: Ebru Celikel, Murat Kantarcioglu, and Elisa Bertino).
- Risk Management and Security, Proceedings Decision and Risk Analysis Conference, Richardson, TX, May 2007.
- Geospatial Data Mining for National Security, Proceedings ISI, New Brunswick, NJ, May 2007 (co- author: Chuanjun et al).
- Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web, Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), Bologna, Italy, June 2007.
- A Hybrid Model to Detect Malicious Executables, Proceedings ICC 2007, Glasgow, Scotland (co- authors: M. Masud, L. Khan).
- Enforcing Honesty in Assured Information Sharing within a Distributed System, Proceedings IFIP Data and Applications Security, Redondo Beach, CA, July 2007 (co-authors: R. Layfield et al).
- SCRUB-tcpdump: A Multilevel Packet Anonymizer Demonstrating Privacy and Analysis Tradeoffs, Proceedings SecureComm, Nice, France, September 2007 (co-authors: W. Yurcik, et al).
- Secure Peer-to-Peer Networks for Trusted Collaboration, Proceedings of the 2nd IEEE International Workshop on Trusted Collaboration (TrustCol), White Plains, NY November 2007.
- Centralized Security Labels in Decentralized P2P Networks, Computer Security Applications Conference, Miami Beach, FL, December 2007 (ACSAC) (co-authors: N. Tsybulnik and K. Hamlen)
- Delegation-Based Security Model for Web Services, IEEE International Symposium on High Assurance Systems Engineering (HASE), p. 82-91, Dallas, TX, November 2007 (co-authors: Wei She, I. Yen).
- Building Secure Applications for Peer to Peer Systems, Proceedings TRUST workshop, New York, November 2007.
- Detecting Remote Exploits Using Data Mining, Proceedings IFIP Digital Forensics Conference, Kyoto, Japan, January 2008 (co-author: M. Masud et al).
- Geospatial Resource Description Framework (GRDF) and Security Constructs, Proceedings ICDE Conference Workshop in Secure Semantic Web, April 2008, Cancun, Mexico (co-author: A. Alam et al).
- Measuring Anonymization Privacy/Analysis Tradeoffs Inherent to Sharing Network Data, Network Operations and Management Symposium (NOMS) 2008, p. 991-994, Salvador, Brazil (co-authors: W. Yurick et al).
- The SCRUB Security Data Sharing Infrastructure, Network Operations and Management Symposium (NOMS) 2008: 630-644, Salvador, Brazil (co-authors: Y. Yurick et al) (also software available as Opensource).
- Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization, Financial Cryptography and Data Security, 2008, p. 323-324, Cozumel, Mexico (co- authors: W. Yurick et al).
- Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case, International Conference on Availability, Reliability and Security (ARES) 2008, p. 237-244, Barcelona, Spain (co- authors: W. Yurick et al).
- ROWLBAC - Representing Role Based Access Control in OWL, Proceedings ACM SACMAT June 2008, Colorado, (co-authors: T. Finin, L Kagal et al).
- Accountability for Grid, DOE Conference on Cyber Security, Knoxville, TN, (co-author: E. Bertino)
- Role Based Access Control and OWL, Proceedings of the Fourth OWL: Experiences and Directions Workshop, April 2008, Washington, DC (co-author: T. Finin et al).
- Data Mining for Cyber Security Applications, The 3rd International Workshop on Trustworthiness, Reliability and Service in Ubiquitous and Sensor Networks (TRUST), EUC 2008, Shanghai, China, (co-authors: L. Khan, K. Hamlen et al).
- Trustworthy Semantic Web Technologies for Secure Knowledge Management, TSP 2008, Shanghai, China (co-author: P. Parikh).
- Secure, Highly Available, and High-Performance Peer-to-Peer Storage Systems, IEEE High Assurance Systems Engineering Symposium (HASE) 2008, Nanjing, China (co-author: Y. Ye et al).
- Role Based Access Control and OWL. OWLED (Spring) 2008, Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham
- Enhancing Security Modeling for Web Services Using Delegation and Pass-On, The IEEE International Conference on Web Services (ICWS) 2008, Beijing, China (co-author: She, Wei; Yen, I-Ling).
- Flow-based Identification of Botnet Traffic by Mining Multiple Log Files, In proceedings of the International Conference on Distributed Frameworks & Applications (DFMA), Penang, Malaysia, Oct. 2008, (co-authors: M. Masud, T. Al-khateeb, L. Khan, K. Hamlen).
- Incentive and Trust Issues in Assured Information Sharing, Invited Paper, CollaborateCom, Orlando, FL, November 2008 (co-authors: R. Layfield and M. Kantarcioglu).
- Privacy Preserving Decision Tree Mining from Perturbed Data, HICSS 2009, Hawaii: 1-10, Nominated for best paper award (co-authors: Li Liu and Murat Kantarcioglu).
- Effective and Efficient Implementation of an Information Flow Control Protocol for Service Composition, Proceedings of the Service Oriented Computing and Applications Workshop, Taipei, Taiwan, Jan. 2009 (co-authors: W. She, I. Yen, E. Bertino).
- The SCIFC Model for Information Flow Control in Web Service Composition The IEEE International Conference on Web Services (ICWS) 2009, Los Angeles, CA (co-authors: W. She, I. Yen, E. Bertino).
- Secure Semantic Service Oriented Grid for Cyber Physical System and Applications, Proceedings DHS/CPS Workshop on Cyber Physical Systems Security, Newark, NJ, July 2009 (co-authors: I. Yen et al).
- Design and Implementation of a Secure Social Network System, IEEE ISI Conference Workshop on Social Computing, 2009, Dallas TX (co-authors: R. Layfield et al).
- Assured Information Sharing Life Cycle, IEEE ISI Conference workshop on Social Computing, 2009 (co-author: T. Finin et al), Dallas, TX.
- A Semantic Web Based Framework for Social Network Access Control, SACMAT 2009: Italy, 177- 186, (co-authors: E. Ferrari, B. Carminati, , R. Heatherly, M. Kantarcioglu).
- Inferring Private Information Using Social Network Data, World Wide Web (WWW) Conference 2009, p. 1145-1146, Madrid, Spain (co-authors: J. Lindamood et al).
- Policy-Driven Service Composition with Information Flow Control, The IEEE International Conference on Web Services (ICWS) 2010, Miami, FL (coauthors: W. She, I. Yen, and E. Bertino)
- Scalable and Efficient Reasoning for Enforcing Role-based Access Control, IFIP 11.3, Rome, Italy 2010 (co-authors: T. Cadenhead, M. Kantarcioglu, and B. Thuraisingham).
- A Token-based Access Control System for RDF Data in the Clouds, IEEE CloudCom 2010, Indianapolis, IN (co-authors: M. Farhan Husain, K. Hamlen et al).
- Secure Data Storage and Retrieval in the Cloud, CollaborateCom 2010, Chicago, IL (co-authors: V. Khadilkar et al)
- An Evaluation of Privacy, Risks and Utility with Provenance, Proceedings, Secure Knowledge Management (SKM) Workshop, November 2010, New Brunswick, NJ (co-authors: T. Cadenhead)
- Identity Management for Cloud, Proceedings Cyber Security and Information Intelligence Research Workshop, Oak Ridge National Laboratory, Oak Ridge, TN, October 2011.
- Rule-Based Run-Time Information Flow Control in Service Cloud, Proceedings of IEEE International Conference on Web Services (ICWS 2011), July 2011, Washington DC (co-authors: Wei She, I-Ling Yen, San-Yih Huang).
- A Language for Provenance Access Control, Proceedings of 1st ACM Conference on Data and Application Security and Privacy (CODASPY) 2011, San Antonio, TX (co-authors: T. Cadenhead, V. Khadilkar, M. Kantarcioglu).
- Differentiating Code from Data in x86 Binaries, Proceedings of ECML/PKDD 2011 (Vol. 3) p. 522 - 536, Athens, Greece (co-authors: R. Wartell, Y. Zhou, K. Hamlen, M. Kantarcioglu).
- Transforming Provenance Using Redaction, Proceedings of SACMAT 2011, Innsbruck, Austria (co- authors: T. Cadenhead, V. Khadilkar, M. Kantarcioglu).
- Secure Data Processing in a Hybrid Cloud, Computing Research Repository (CoRR) abs/1105.1982, 2011 (co-authors: V. Khadilkar, M. Kantarcioglu, S. Mehrotra).
- On Secure and Resilient Telesurgery over Unreliable Networks, The First International Workshop on Cyber-Physical Networking Systems, p. 725 – 730, Shanghai, China, April 2011, (co-authors: M. E. Tozal, Y. Wang, E. Al-Shaer, K. Sarac, B. Chu).
- Towards Privacy Preserving Access Control in the Cloud, Proceedings of CollaborateCom, p. 172- 180 October 2011, Orlando, FL (co-authors: Mohamed Nabeel, Elisa Bertino, Murat Kantarcioglu).
- On-line anomaly detection based on relative entropy, Proceedings of the IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), 2011, p. 33 – 36 (co-authors: M. Masud, et al.).
- Insider Threat Detection Using Stream Mining and Graph Mining, SocialCom/PASSAT 2011, p. 1102-1110, Boston, MA, October 2011 (co-authors: Pallabi Parveen, Jonathan Evans, Kevin W. Hamlen, Latifur Khan).
- Supervised Learning for Insider Threat Detection Using Stream Mining, International Conference on Tools with Artificial Intelligence ICTAI 2011, p.1032-1039, Boca Raton, Florida, Nov. 2011 (co- authors: Pallabi Parveen, Zackary R. Weger, Kevin W. Hamlen, Latifur Khan).
- Cloud-Centric Assured Information Sharing., Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2012), p. 1-26, Kuala Lumpur, Malaysia, May 2012 (co- authors: Vaibhav Khadilkar, Jyothsna Rachapalli, Tyrone Cadenhead, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Mohammad Farhan Husain).
- A Cloud-based RDF Policy Engine for Assured Information Sharing, Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), p. 113-116, Newark, NJ, June 2012 (co-author: T. Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu) (refereed demonstration paper).
- Unsupervised Incremental Sequence Learning for Insider Threat Detection, Proceedings of IEEE Intelligence and Security Informatics (ISI 2012), Washington, DC, June 2012 (co-author: P. Pallabi).
- Towards Cyber Operations - The New Role of Academic Cyber Security Research and Education, Proceedings of IEEE Intelligence and Security Informatics (ISI 2012), Washington DC, June 2012 (co-author: J. Kallberg).
- Cloud Guided Stream Classification using Class-Based Ensemble, Proceedings of IEEE International Conference on Cloud Computing (CLOUD 2012), Honolulu, HI, June 2012 (co-authors: Tahseen M. Al-Khateeb, Mohammad M. Masud, Latifur Khan).
- Risk-Aware Workload Distribution in Hybrid Clouds, Proceedings of IEEE International Conference on Cloud Computing (CLOUD 2012), Honolulu, HI, (co-authors: Kerim Yasin Oktay, Vaibhav Khadilkar, Bijit Hore, Murat Kantarcioglu, Sharad Mehrotra)
- Randomizing Smartphone Malware Profiles against Statistical Mining Techniques, Proceedings of DBSec 2012, p. 239 - 254, Paris, France, July 2012 (co-authors: Abhijith Shastry, Murat Kantarcioglu, Yan Zhou).
- Adversarial Support Vector Machine Learning, Proceedings of ACM SIGKDD Conference Knowledge Discovery, and Data Mining (KDD 2012), Beijing, China, August 2012 (co-authors: Yan Zhou, Murat Kantarcioglu, Bowei Xi).
- REDACT: A Framework for Sanitizing RDF data, Proceedings of WWW 2013, Rio De Janeiro (co- authors: J. Rachapalli, et al.)
- Redaction-based RDF Access Control Language, Proceedings of ACM SACMAT, 2014 (co-authors: J. Rachapalli, M. Kantarcioglu)
- Towards fine grained RDF access control. Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani M. Thuraisingham: SACMAT 2014: 165-176
- RDF-X: a language for sanitizing RDF graphs, Proceedings of WWW (Companion Volume) 2014, p. 363-364 (co-authors: J. Rachapalli, et al.)
- Statistical Technique for Online Anomaly Detection Using Spark Over Heterogeneous Data from Multi-source VMware Performance Data, In Proceedings of 2014 IEEE International Conference on Big Data, Oct. 2014, Washington, DC (co-authors: Mohiuddin Solaimani, Mohammed Iftekhar, Latifur Khan, and Bhavani Thuraisingham)
- Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security, Proceedings of European Intelligence and Security Informatics Conference (EISIC), 2013, p. 212 -215 (co-authors: J. Kallberg, et al.).
- Database Security: Developments and Directions, Visionary Paper, IEEE Big Data Conference (co- located with IEEE Services Computing), New York, City, June 2015
- Spark-based anomaly detection over multi-source VMware performance data in real-time. Mohiuddin Solaimani, Mohammed Iftekhar, Latifur Khan, Bhavani M. Thuraisingham, Joey Burton Ingram: CICS 2014: 66-73
- Honeypot Based Unauthorized Data Access Detection in MapReduce Systems, IEEE International Conference on Intelligence and Security (ISI 2015), Baltimore, MD (co-authors: Huseyin Ulusoy, Murat Kantarcioglu, and Latifur Khan).
- Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry, IEEE Big Data Security 2015, New York, NY (coauthors: Meikang Qiu et al).
- Design and Implementation of a Semantic-web based Inference Controller, IEEE International Conference on Information Reuse, and Integration (IEEE IRI), August 2015 (coauthor: T. Cadenhead)
- Stream-based Social Media Analytics for Multipurpose Applications, IEEE International Conference on Information Reuse, and Integration (IEEE IRI), August 2015 (co-authors: S. Abrol et al).
- P2V: Effective Website Fingerprinting Using Vector Space Representations 2015 IEEE Symposium Series on Computational Intelligence, Cape Town, South Africa. P. 59-66. (co-authors: Al Naami, Khaled, L. Khan, et al).
- Data Driven Approach to the Science of Cyber Security, 2016 IEEE IRI, Pittsburgh, July 2016. (coauthors: M. Kantarcioglu, E. Bertino, T. Finin et al)
- Adaptive Encrypted Traffic Fingerprinting with Bi-Directional Dependence, Proceedings IEEE ACSAC Conference, Los Angeles, CA, December 2016 (co-authors: L. Khan et al)
- A Framework for Secure Data Collection and Management for Internet of Things in the ICSS '16: Proceedings of the 2nd Annual Industrial Control System Security Workshop, (coauthors: M./ Fernandez, M. Kantarcioglu)
- Towards A Framework for Developing Cyber Privacy Metrics: A Vision Paper (BIGDATA2017- 4033) Bhavani Thuraisingham and Murat Kantarcioglu (The University of Texas at Dallas, US), Elisa Bertino and Chris Clifton (Purdue University, US), IEEE BigData Congress, June 2017.
- Hacking Social Network Data Mining, IEEE ISI, July 2017 (coauthors: Yasmeen Alufaisan et al)
- Malware Collection and Analysis: A Position Paper, Proceedings IEEE IRI, August 2017
- Securing Data Analytics on SGX with Randomization, ESORICS 2017, Co-authors. Z. Lin, M. Kantarcioglu, L. Khan et al), 2017.
- From Myths to Norms: Demystifying Data Mining Models with Instance-based Transparency, Proc. IEEE CollaborateCom, 2017 (coauthors: Y. Alufaisan, Y. Zhou, M. Kantarcioglu)
- Unsupervised deep embedding for novel class detection over data stream IEEE BigData 2017: 1830- 1839 (Coauthor: L. Khan et al)
- Towards a Privacy Aware Data Management Framework, ACM SACMAT, 2018 (coauthors: M. Kantarcioglu et al)
- A Category-Based Model for ABAC, CODASPY Conference Workshop in ABAC, March 2018 (coauthor: M. Fernandez)
- Integrating Cyber Security and Data Science for Social Media, IEEE ParSocial, Vancouver, BC, May 2018. (coauthors: M. Kantarcioglu, L. Khan).
- Large Scale Realistic Data Generation on a Budget, IEEE IRI 2018, Salt Lake City July 2018, (Coauthors: Brian Ricks, Patrick Tague)
- Privacy Preserving Synthetic Data Release Using Deep Learning. ECML/PKDD (1) 2018:, Dublin, Ireland (Coauthors: Nazmiye Ceren Abay, Yan Zhou, Murat Kantarcioglu, Latanya Sweeney)
- Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack. ISI 2018: Miami, FL (coauthors: Brian Ricks, Patrick Tague) – Best Paper Award.
- Automated Threat Report Classification over Multi-Source Data. CIC 2018: 236-245 (authors: Gbadebo Ayoade, Swarup Chandra, Latifur Khan, Kevin W. Hamlen)
- Attacklets: Modeling High Dimensionality in Real World Cyberattacks. ISI 2018: 55-57 (coauthors: Cuneyt Gurcan Akcora, Jonathan Z. Bakdash, Yulia R. Gel, Murat Kantarcioglu, Laura R. Marusich,)
- GCI: A Transfer Learning Approach for Detecting Cheats of Computer Game, IEEE Big Data, Seattle, December 2018 (coauthor: L Khan et al)
- Graph-Based Data Collection Policies for the Internet of Things, ACSAC Conference workshop on ICSS, Puerto Rico (authors: Maribel Fernandez, Jenjira Jaimunk)
- Specification and analysis of ABAC policies via the category-based metamodel, ACM CODASPY 2019, Dallas, TX. (coauthor: M. Fernandez et al)
- Multistream Classification for Cyber Threat Data with Heterogeneous Feature Space, WWW 2019, San Francisco, May 2019 (coauthor: L. Khan et al).
- Specification and Analysis of ABAC Policies via the Category-based Metamodel. CODASPY March 2019 (coauthors: Maribel Fernández, Ian Mackie)
- An OpenRBAC Semantic Model for Access Control in Vehicular Networks. SACMAT 2019: June 2019 (coauthors: Sultan Alsarra, I-Ling Yen, Yongtao Huang, Farokh B. Bastani)
- Cyber Security and Data Governance Roles and Responsibilities at the C-Level and the Board IEEE ISI 2019 Shenzhen, China, July 2019
- Privacy-Preserving Architecture for Cloud-IoT Platforms, IEEE ICWS (coauthors: Maribel Fernandez, Jenjira Jaimunk), Milan, Italy, July 2019
- Mimicking Human Behavior in Shared-Resource Computer Networks (coauthors: Brian Ricks, Patrick Tague), IEEE IRI 2019, Los Angeles, CA, August 2019.
- ChainNet: Learning on Blockchain Graphs with Topological Features, IEEE ICDM 2019, Beijing, China (coauthor: M. Kantarcioglu et al)
- Admin-CBAC: An Administration Model for Category-Based Access Control. CODASPY 2020: 73- 84 (coauthors: Clara Bertolissi, Maribel Fernández,
- A Data Access Model for Privacy-Preserving IoT Architectures, ACM SACMAT, June 2020 (Co- Authors: Maribel Fernandez et al).
- Multigenerational Database Inference Controllers, IEEE Big Data Security. Baltimore, MD, 2020. (Invited Paper)
- Artificial Intelligence and Data Science Governance, IEEE IRI, 2020 (Invited Paper)
- Can AI be for Good in the Midst of Cyber Security Attacks and Privacy Violations, Proceedings ACM CODASPY 2020 (Invited Paper)
- The Role of Cyber Security and Artificial Intelligence for Social Media, IEEE IPDPS, 2020 (Invited Paper)
- Cloud Governance and Compliance, IEEE CSCloud 2020 (Invited Paper)
- Security and Privacy for the Internet of Transportation, IEEE Cloud (Invited Paper)
- Cyber Security meets Big Data: Towards a Secure HASE Theorem, IEEE ICKG, Nanjing, China, August 2020 (Invited Paper)
- Blockchain Technologies and their applications in Data Science and Cyber Security, Smartblock 2020. Zengzhou, China, October 2020 (invited paper)
- Secure Data Sharing Through Untrusted Clouds with Blockchain-enhanced Key Management. Smartblock 2020, Zengzhou, China, October 2020 (coauthors: Meikang Qiu et al)
- Data Science, COVID-19 Pandemic. Privacy and Civil Liberties, IEEE Big Data Security, 2020 (Invited Paper), Atlanta, GA.
- MultiModal Deception Detection: Accuracy, Applicability and Generalizability, IEEE TPS-ISA, 2020 (coauthors: V. Belavadi, et al)
- Attacking Machine Learning Models for Social Good. GameSec 2020: 457-471 (coauthors: V. Belavadi et al)
- Graph-Based Specification of Admin-CBAC Policies, ACM CODASPY, 2021, Baltimore, MD (co-authors: M. Fernandez et al).
- DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation, Proceedings ACM ASIACCS 2021 (Coauthors: Yi Zheng et al)
- Unsupervised Perturbation based Self-Supervised Adversarial Training, Proceedings IEEE BigDataSecurity, 2021 (Coauthors: L. Khan et al)
- Social Media Governance and Fake News Detection, Proceedings IEEE CSCloud, Invited Paper, 2021.
- Fairness-aware Online Meta-learning, ACM KDD (Knowledge Discovery and Data Mining) 2021, Singapore, August 2021 (Co-Author: F. Chen et al)
- Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces, ICISS 2021, (Co-authors: L. Khan et al).
- DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection, IEEE TPS 2022 (co-author: B. Ricks et al)
- Shared Reality: Detecting Stealthy Attacks Against Autonomous Vehicles CPSIOTSEC@CCS 2021: 15-26 (coauthors: Raul Quinonez, Sleiman Safaoui, Tyler H. Summers, Bhavani M. Thuraisingham, Alvaro A. Cárdenas)
- Knowledge Mining in Cybersecurity: From Attack to Defense, IFIP Data and Applications Security and Privacy Conference, 2022 (co-authors: Ashrafi Khandkar et al)
- MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data, IFIP IFIP Data and Applications Security and Privacy Conference, 2022 (co-authors: Xiodli Li et al)
- Developing and Securing the IoT, IEEE Smart Cloud 2022 (Invited paper)
- The Design of an Ontology for ATT&CK and its Application to Cybersecurity. CODASPY 2023: 295-297 (coauthors: L. Khan et al)
- SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups. SACMAT 2023: 145-155 (coauthors: I. Ray et al)
- Trustworthy Artificial Intelligence for Securing Transportation Systems. ACM SACMAT 2024
- Utilizing Threat Partitioning for More Practical Network Anomaly Detection. ACM SACMAT 2024 (with Brian Ricks et al)
- An Education Program for Big Data Security and Privacy. BigDataSecurity 2024: 1-4 (with Kim Nimon et al)
- Social Media Governance and Fake News Detection integrated with Artificial Intelligence Governance, IEEE IRI (Co-Author: T. Thomas)
- An Axiomatic Category-Based Access Control Model for Smart Homes, LOPSTR 2024 (co-authors: Clara Bertolissi, Maribel Fernandez and Bhavani Thuraisingham)
Data Science and Machine Learning (Data Management, Mining, AI/ML)
- Design of a Distributed Data Dictionary System, June 1987, Proceedings of the National Computer Conference, Chicago, IL, pp. 583-590, (co-authors: H. Lu and K. Mikkilineni).
- Knowledge-Based User Interface Design Issues for Heterogeneous Networks, September 1988, Proceedings of the Australian Computer Conference, Sydney, Australia.
- Knowledge-Based Support for the Development of Database-centered Applications, February 1989, Proceedings of the 5th IEEE International Conference on Data Engineering, Los Angeles, CA, (co- authors: R. Bell and H. Atchan).
- XIMKON: An Expert Simulation and Control Program, AAAI Conference Workshop on AI in Process Engineering, St Paul, MN (co-authors: F. Konar, 1988).
- XIMKON- An Expert Simulation and Control Program, June 1989, Proceedings of the American Control Conference (enhanced version of AAAI Workshop 1988 paper) Pittsburgh, PA (co-authors: F. Konar and P. Felix).
- Expert Network Simulation and Control, March 1989, Proceedings of the 7th Applications of Artificial Intelligence Conference, Orlando, FL.
- Applying OMT for Designing Medical Database Applications, September 1993, Proceedings of the OOPSLA Conference Workshop on Information Modeling, Washington D.C.
- Extending an Object-Oriented Data Model for Representing Multimedia Database Applications, Proceedings of the OOPSLA 94 Conference Workshop on Precise Behavioral Specification in Object Oriented Information Modeling, Portland, OR. October 1994, (co-author: K. Nwosu).
- Object-Oriented Approach for the Interoperability of Persistent Database Systems, Proceedings of the OOPSLA 94 Conference Workshop on Persistence in Heterogeneous Database Systems, Portland, OR. October 1994, (co-author: R. Nemec).
- Consistent Data Access in a Distributed Database Management System for Command and Control Applications, Proceedings of the High Performing Computing Symposium, April 1994. San Diego, CA (co-authors: D. Small, D. Goldsmith).
- Distributed Database Technology for Mobile Computing and Communications Systems, Proceedings of the IEEE Technology Dual Use and Applications Conference, Utica, NY, May 1994.
- Applying OMT for Designing Multimedia Information Systems Applications, Proceedings of the IEEE Technology Dual Use and Applications Conference, Utica, NY, May 1994. (co-author: K. Nwosu)
- Distributed Multimedia Database Systems, Proceedings of the AIPASG Symposium, March 1994, (Abstract in Proceedings; co-author: B. Lavender).
- Object-Oriented Approach to Federated Data Management, Proceedings of the ISMM International Conference on Intelligent Information Management Systems, Washington D.C., June 1994, (co- author: N. Idris).
- On Dynamic Reallocation of Parallel Retrievable Objects, Proceedings of the Distributed Multimedia Systems Applications Conference, Honolulu, HI, August 1994, (co-author: P. Bobbie).
- Maintaining Integrity in a Distributed Heterogeneous Database Systems, Proceedings of the DOD Database Colloquium 94, San Diego, CA, August 1994, (co-author: D. Goldsmith).
- Distributed Database Management for C3I Systems, Proceedings of the MILCOM 94 Conference, Ft. Monmouth, NJ, October 1994, (co-authors: A. Grasso, M. Collins; classified session).
- Application of Object-Oriented Technology for Integrating Heterogeneous Database Systems, Proceedings of the ACM Computer Science Conference, Nashville TN, March 1995.
- Data Allocation and Spatio Temporal Implication for Video on Demand Systems, Proceedings of the IEEE Phoenix Conference on Computers and Communications, Scottsdale, AZ March 1995, (co- author: K. Nwosu).
- Intelligence Community Initiative in Massive Digital Data Systems, Proceedings of the AIPASG Symposium, March 1995, (co-authors: R. Kluttz, et al); an update published in AIPASG Symposium, March 1996, (co-author: H. Curran et al) Tysons Corner, VA
- Massive Data and Information Systems Initiative at MITRE, Proceedings of the AIPASG Symposium March Tysons Corner, VA, 1995 (also versions given at MITRE conferences).
- Applying OMT to design Medical Information Systems Applications, Proceedings of the Intelligent Information Systems Management Conference, Washington D.C. June 1995.
- Object oriented Technology for Integrating Distributed Heterogeneous Database System, Proceedings of the 1995 DOD Database Colloquium, San Diego, CA (co-authors: M. Ceruti et al).
- Data Mining and Data Visualization, A Position Paper, Databases Issues for Data Visualization Workshop, Atlanta, GA, Oct. 1996 (Springer Verlag, 1996) (co-author: G. Grinstein).
- Interactive Data Mining and its Impact on the World Wide Web, Proceedings Compugraphics and Visualization Techniques, Paris, France December 1996.
- Data Mining in Text, AIPASG, 1997, McLean, VA, (co-author: C. Clifton et al).
- Text Mining and Visualization, Proceedings of the KDD Workshop on Data Mining and Visualization, Newport Beach, CA, August 1997 (also in IEEE Visualization workshop, October 1997: Role of Visualization in Texas Mining).
- Understanding Data Mining and Applying it to C3I Environments, Proceedings IEEE COMPSAC 2000, Taipei, Taiwan, (co-author: M. Ceruti).
- Data Management for Global Command and Control Systems, AFCEA Database Colloquium 2000, San Diego, (co-author: J. Putman et al).
- Experience in Developing an Information-Sharing Environment in a Large Government Enterprise Using WWW, Federation, Business Components, and Data Warehousing Technologies. AFCEA Federal Database Colloquium, 2000 (coauthors: J Putman, M. Ceruti et al)
- Data Mining for E-commerce, Proceedings SPIE, 2000, Orlando, FL, (co-author: A. Grasso et al).
- Neural Networks and Data Mining, AFCEA 2001, San Diego, CA, (co-author: C. Clifton).
- Data Management for the 21st Century, Proceedings IEEE Systems, Man & Cybernetics, July 2002, Hammamet, Tunisia (co-author: M. Ceruti).
- Data Quality, Kluwer 2002 (based on keynote address at IFIP Integrity, November 2001, Brussels, Belgium, (co-author: E. Hughes).
- Reasoning with Semantics-aware Access Control Policies for Geospatial Web Services, Proceedings of ACM SWS, November 2006, Fairfax, VA, (co-authors: A. Alam et al).
- Geospatial Data Qualities as Web Services Performance Metrics, Proceedings ACM International Workshop on Advances in Geographic Information Systems (GIS), November 2007, Seattle WA (co-author: G. Subbiah et al).
- DAGIS: A Geospatial Semantic Web Services Discovery and Selection Framework, GeoS 2007, Mexico City, Mexico, November 2007, (co-author: A. Alam et al).
- Ontology Alignment Using Multiple Contexts. International Semantic Web Conference (Posters & Demos) 2008 (co-authors: J. Partyka et al), Germany.
- Content-based Ontology Matching for GIS Datasets, ACM International Workshop on Advances in Geographic Information Systems (GIS) 2008, Irvine, CA (co-authors: J. Partyka et al).
- A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data, ICDM 2008 (co-authors: M. Masud et al), Pisa, Italy
- A Multi-Partition Multi-Chunk Ensemble Technique to Classify Concept-Drifting Data Streams, PAKDD 2009, Bangkok, Thailand (co-author: M. Masud et al).
- Simulating Bioterrorism Thru Epidemiology Approximation, IEEE International Conference on Intelligence and Security Informatics 2008, (co-authors: Ryan Layfield, Murat Kantarcioglu), Taipei, Taiwan.
- An Effective Evidence Theory Based K-Nearest Neighbor (KNN) Classification, Web Intelligence 2008:797-801, Sydney, Australia (co-authors: Lei Wang, Latifur Khan).
- Inferring Private Information Using Social Network Data, World Wide Web (WWW) Conference 2009: 1145-1146, Madrid, Spain (co-authors: J. Lindamood et al).
- A Relational Wrapper for RDF Reification, Third IFIP WG 11.11 International Conference on (IFIPTM), West Lafayette, USA, June 15-19, 2009, (co-authors: S. Ramanujam, A. Gupta, L. Khan, and S. Seida).
- "Relationalizing RDF Stores for Tools Reusability" ACM 18th International World Wide Web Conference (WWW 2009—Poster Session), Madrid, Spain, April 2009 (co-authors: S. Ramanujam, A. Gupta, L. Khan, and S. Seida).
- On the Mitigation of Bioterrorism through Game Theory, ISI 2009, Dallas, TX (co-authors: Ryan Layfield and Murat Kantarcioglu).
- Social Network Classification Incorporating Link Type, ISI 2009, Dallas TX (co-authors: Raymond Heatherly and Murat Kantarcioglu).
- Design of a Temporal Geosocial Semantic Web for Military Stabilization and Reconstruction Operations, Proceedings SIGKDD Conference Workshop on Intelligence and Security Informatics, 2009 (co-authors: L. Khan et al).
- R2D: Extracting Relational Structure from RDF Stores, IEEE WIC/ACM Conference on Web Intelligence, September 2009 (co-authors: Sunitha Ramanujam, Anubha Gupta, Latifur Khan, and Steven Seida).
- Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams, PKDD, September 2009 (co-authors: M. Masud et al).
- Difference in Fitts' Law Task Performance, EuroHaptics 2008: 295-300, Madrid, Spain (co-author: G. Lee).
- Semantic Schema Matching Without Shared Instances, Proceedings IEEE Semantic Computing Conference, 2009, short paper (co-authors: J. Partyka et al)).
- R2D: A Bridge between the Semantic Web and Relational Visualization Tools, Proceedings IEEE International Conference on Semantic Computing, 2009, long regular paper (co-authors: S. Ramanujam et al).
- Semantic Web for Content Based Video Retrieval, Proceedings IEEE International Conference on Semantic Computing, Berkeley, CA, 2009 (short paper – co-author: B. Prabhakaran et al).
- Geographically-typed Semantic Schema Matching, GIS 2009: 456-459 (co-authors: Jeffrey Partyka, Latifur Khan).
- Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce. CloudCom 2009, Beijing, China (co-authors: M. Husain, P. Doshi, and L. Khan).
- Bi-directional Translation of Relational Data into Virtual RDF Stores, Proceedings IEEE Semantic Computing Conference, September 2010, p. 268 - 276 (coauthors: L. Khan et al).
- Classification and Novel Class Detection of Data Streams in a Dynamic Feature Space, Proceedings European Conference on Machine Learning (ECML), Barcelona, Spain, 2010 (co-authors: L. Khan et al).
- Data Intensive Query Processing for Large RDF Graphs Using Cloud Computing Tools, IEEE Cloud Computing, Miami, July 2010 (co-authors: M. Farhan Husain et al).
- An Analysis of User Influence Ranking Algorithms on Dark Web Forums, Proceedings of ACM SIGKDD Workshop on Intelligence and Security Informatics (ISI-KDD 2010), (co-authors: Christopher Yang, Xuning Tang).
- Ranking Ontologies Using Verified Entities to Facilitate Federated Queries, Web Intelligence 2010, p. 332 – 337, Toronto, Canada (co-authors: Neda Alipanah, Piyush Srivastava, Pallabi Parveen).
- Efficient Processing of Large RDF Streams Using Memory Management Algorithms, The International Semantic Web Conference (ISWC) 2010, Shanghai, November 2010 (co-authors: V. Khadilkar et al).
- Geospatial Schema Matching with High-Quality Cluster Assurance and Location Mining from Social Network, Proceedings of the International Conference on Data Mining (ICDMW) Workshops December 2010, p. 517 (co-authors: Latifur Khan, Jeffrey Partyka, Satyen Abrol).
- Ontology-driven Query Expansion Methods to Facilitate Federated Queries, Proceedings of IEEE International Conference on Service-oriented Computing and Applications (SOCA) 2010, p. 1-8, (co-authors: Neda Alipanah, Pallabi Parveen, Sheetal Menezes, Latifur Khan, Steven Seida).
- Classification and Novel Class Detection in Data Streams with Active Mining, Proceedings of 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2010, p. 311 – 314, Hyderabad, India. (co-authors: M. Masud, J. Gao, L. Khan, J. Han).
- Addressing Concept-Evolution in Concept-Drifting Data Streams, IEEE International Conference on Data Mining (ICDM) Conference, December 2010, p. 929 – 934, Sydney, Australia,. (co-authors: M. Mehedy, L. Khan, J. Han, C. Agrawal et al).
- RDFKB: A Semantic Web Knowledge Base, Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI 2011), p. 2830 - 2831, July 2011, Barcelona, Catalonia, Spain (co- authors: James P. McGlothlin, Latifur Khan).
- Scalable Complex Query Processing Over Large Semantic Web Data Using Cloud, Proceedings of the IEEE International Conference on Cloud Computing (CLOUD 2011), p. 187 – 194, July 2011, Washington DC (co-authors: Mohammad Farhan Husain, James McGlothlin, Latifur Khan).
- Ontology-Driven Query Expansion using Map/Reduce Framework to Facilitate Federated Queries, Proceedings of the IEEE International Conference on Web Services (ICWS 2011), p. 712 – 713, July 2011, Washington, DC (co-authors: Neda Alipanah, Pallabi Parveen, Latifur Khan). Identification of Related Information of Interest Across Free Text Documents, Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI 2011), Beijing, China, p. 107 – 112, (co-authors: James R. Johnson, Anita Miller, Latifur Khan, Murat Kantarcioglu).
- Extraction of Expanded Entity Phrases, Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI 2011), p. 101 – 106, Beijing China (co-authors: James R. Johnson, Anita Miller, Latifur Khan, Murat Kantarcioglu).
- RETRO: A Framework for Semantics Preserving SQL-to-SPARQL Translation, Proceedings of International Semantic Web Conference Workshop, October 2011, Bonn, Germany (co-authors: J. Rachapalli, V. Khadilkar, Murat Kantarcioglu).
- Insider Threat Detection using Stream Mining and Graph Mining, Proceedings of the 3rd IEEE Conference on Privacy, Security, Risk and Trust (PASSAT),October 9-12, 2011, MIT, Boston, USA. (co-authors: Pallabi Parveen, Jonathan Evans, Bhavani Thuraisingham, Kevin W. Hamlen, Latifur Khan)
- Supervised Learning for Insider Threat Detection Using Stream Mining, Proceedings of the 23rd IEEE International Conference on Tools with Artificial Intelligence, Nov. 7-9, 2011, Boca Raton, Florida, USA (co-authors: Pallabi Parveen, Zackary Weger, Kevin Hamlen, Latifur Khan) (Best Paper Award).
- Detecting Recurring and Novel Classes in Concept-Drifting Data Stream, Proceedings of IEEE International Conference on Data Mining (ICDM 2011), p. 1176-1181; Vancouver, Canada, December 2011 (co-authors: Mohammad M. Masud, Tahseen Al-Khateeb, Latifur Khan, Charu C. Aggarwal, Jing Gao, Jiawei Han).
- Stormrider: Harnessing ``Storm' for Social Networks, Proceedings of World Wide Web Conference 2012, Lyon, France (co-authors: Vaibhav Khadilkar, Murat Kantarcioglu) (Refereed poster paper).
- Extracting Semantic Information Structures from Free Text Law Enforcement Data, Proceedings of IEEE ISI 2012, Washington DC (co-authors: A. Miller, J. Johnson, L. Khan).
- Design and Implementation of SNODSOC for Social Network Analysis, Proceedings of IEEE ISI 2012 Workshop in Social Computing, Washington, DC (co-authors: S. Abrol et al.).
- Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement Documents, Proceedings of European International Conference on Intelligence and Security Informatics (EISIC 2012), Odense, Denmark, August 2012 (co-authors: James Johnson, Anita Miller, Latifur Khan).
- Tweecalization: Efficient and intelligent location mining in twitter using semi-supervised learning, Proceedings of CollaborateCom 2012, p. 514-523 (co-authors: Satyen Abrol, Latifur Khan).
- Tweeque: Spatio-temporal analysis of social networks of location mining using graph partitioning, Proceedings of ASE International Conference on Social Informatics, Alexandria, VA, December 2012 (co-authors: S. Abrol, L. Khan).
- Least Cost Rumor Blocking in Social Networks, Proceedings of IEEE ICDCS, 2013 (co-authors: Lidan Fan, Zaixin Lu, Weili Wu, Yuanjun Bi, Huan Ma).
- Behavioral sequence prediction for evolving data stream, Proceedings of IRI 2013: 482-488 (co- authors: Sheikh M. Qumruzzaman, Latifur Khan)
- MapReduce Guided Scalable Compressed Dictionary Construction for Repetitive Sequences, Proceedings of CollaborateCom, 2013 (co-authors: Pallabi Parveen, Latifur Khan).
- Calculating Edit Distance for Large Sets of String Pairs using MapReduce, Conference on Cyber Security and Big Data, Stanford, CA, May 2014 (co-authors: Shagun Jhaver and Latifur Khan)
- Evolving Big Data Stream Classification with MapReduce, IEEE Cloud Computing, Anchorage Alaska, June 2014 (co-authors: Ashanul Haque, Brandon Parker, Latifur Khan)
- Evolving Stream Classification using Change Detection, CollaborateCom (invited paper), Miami, October 2014 (co-authors: Ahmad Mustafa, Ahsanul Haque, Latifur Khan, Michael Baron).
- Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper, Invited Paper, Proceedings of the IEEE Social Media Systems Workshop, Chicago, IL, May 2016, (co-authors: Murat Kantarcioglu, Latifur Khan, Barbara Carminati, Elena Ferrari, Leila Bahri).
- Efficient Handling of Concept Drift and Concept Evolution over Stream Data, IEEE ICDE, Helsinki 2016 (coauthors: Ahsanul Haque et al).
- Spark-Based Political Event Coding, Bigdata Service 2016: 14-23, (co-authors: Mohiuddin Solaimani, Rajeevardhan Gopalan, Latifur Khan, Patrick T. Brandt)
- Near Real-time Atrocity Event Coding, Proceedings IEEE ISI, 2016 (Mohiuddin Solaimani, Sayeed Salam, Latifur Khan, Patrick Brandt, Bhavani Thuraisingham, and Ahmad Mustafa)
- Online Classification of Nonstationary Streaming Data with Dynamic Pitman-Yor Diffusion Trees, Proceedings IEEE IRI, San Diego, CA, August 2017 (coauthor: J. Sah et al)
- Focus location extraction from political news reports with bias correction. BigData 2017: 1956- 1964 (coauthor: L. Khan et al)
- Privacy Preserving Synthetic Data Release Using Deep Learning. ECML-PKDD, 2018, Dublin, Ireland (coauthors: M. Kantarcioglu et al)
- Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack, IEEE ISI, 2018 (coauthors: B. Ricks et al_
- Attacklets: Modeling High Dimensionality in Real World Cyberattacks, IEEE ISI, 2018 (coauthors: M. Kantarcioglu et al)
- Automated Threat Report Classification Over Multi-Source Data, IEEE CIC, 2018 (coauthors: L. Khan et al)
- Towards Self-Adaptive Metric Learning on the Fly, WWW 2019, San Francisco, May 2019 (coauthor: L. Khan et al)
- Where Did the Political News Event Happen? Primary Focus Location Extraction in Different Languages, IEEE CIC, Los Angeles, December 2019. (coauthor: M. Imani et al) (Best Paper Award)
- Next-Location Prediction using Federated Learning on a Blockchain, Proceedings IEEE CogMI, Atlanta, GA December 2020, (Co-authors: Sadaf Md Halim, Latifur Khan)
- Progressive One-Shot Human Parsing, AAAI Conference, 2021, Co-Author: Dacheng Tao et al)
- An Episodic Learning based Geolocation Detection Framework for Imbalanced Data. IJCNN, (co-authors: T. Hemeng et al)
- Data-Driven Time Series Forecasting for Social Studies Using Spatio-Temporal Graph Neural Networks, Co-Authors L. Khan et al, ACM International Conference on Information Technology for Social Good, September 2021
- CAPT: Contrastive Pre-Training based Semi-Supervised Open-Set Learning, IEEE Conference on Multimedia Information Processing, 2022 (coauthor: L. Khan et al)
- Personalized Hashtag Recommendation with User-level Meta-learning, IEEE Compitatonal
- Intellience, Padova, Italy 2022 (coauthors: L. Khan et al)
- Imbalanced Adversarial Training with Reweighting, Proceedings IEEE ICDM, 2022 (coauthor: Jiliang Tang et al).
- 'WokeGPT: Improving Counterspeech Generation Against Online Hate Speech by Intelligently Augmenting Datasets Using a Novel Metric', Interntainal Joint Conference on Neural Networks, June 2023, Goldcoast, Australia (co-authors: L. Khan et al)
- A Transparent Blockchain based College Admission Platform, Proceedins Smartblock/SmartCloud 2023.
- SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups. SACMAT 2023: 145-155 (coauthors: Indrajit Ray et al)
- Secure Multimedia Data Systems in theEra of Artificial Intelligence, IEEE TPS, 2023
- The Design of an Ontology for ATT&CK and its Application to Cybersecurity. CODASPY 2023: 295-297 (Co-Authors: A. Khandakar et al)
- ACM CCS
- A Federated Approach for Learning from Electronic Health Records; IEEE IDS, 2022 Co-Authors: L Khan et al)
Real-Time System and Distributed Processing
- Implementing a Real-Time System on Local Area Network, October 1987, presented at the 12th IEEE Local Computer Network Conference, Minneapolis, MN, Proceedings, pp. 142 (co-authors: W. T. Tsai, K. W. Hwang, abstract in proceedings, paper distributed at conference).
- MCNIU- A High Performance FDDI Local Area Network for Space Station Application, October 1987, Proceedings of the Fiber Optic Communication Local Area Network Conference (FOC/LAN), Anaheim, CA, pp. 69-73, (co-authors: P. Gonia, D. Myers, and T. Chan).
- RT-OMT: A Real-time Object Modeling Technique for Designing Real-time Database Applications: A Position Paper, Proceedings of the 2nd IEEE Realtime Systems Applications Workshop, July 1994, Maryland, (co-author: A. Schafer).
- On Realtime Extensions to the Common Object Request Broker Architecture, Proceedings of the OOPSLA 94 Conference Workshop on CORBA, Portland, OR. September 1994, (co-authors: P. Krupp, A. Schafer, V. Wolfe)
- An Integrated Architecture for Constraint Processing in Real-time Database Management Systems, Proceedings of the 1995 High Performance Computing Symposium, Phoenix, AZ, April 1995.
- Evolvable Real-time C3 Systems, Proceedings of the 1st IEEE Complex Systems Conference, November 1995, Florida, (co-authors: E. Bensley et al).
- Real-time Extensions to Remote Procedure Call, Proceedings of the IEEE High Performance Computing Conference, December 1995, India, (co-authors: V. Wolfe et al).
- Object-oriented Implementation of an Infrastructure and Data Manager for Real-time Command and Control Systems, Proceedings of the IEEE Workshop on Object-Oriented Real-time Dependable Systems (WORDS 1996), Laguna Beach, CA, February 1996, (co-author: E. Bensley et al).
- Design and Implementation of an Active Real-time Database Management System, Proceedings of the Intelligent Information Systems Management Conference, June 1996, Washington DC, (co-authors: G. Gengo).
- Towards Priority Ceilings in Object-based Semantic Real-time Concurrency Control, Proceedings of the 1st Real-time Database Workshop, March 1996, Newport Beach, CA (co-authors: V. Wolfe).
- Evolvable Real-time C3 Systems - II, Proceedings of the 2nd IEEE Complex Systems Conference, October 1996, Montreal, Canada (co-authors: E. Bensley et al).
- Active Real-time Data Management for Command and Control Applications, Proceedings DART Workshop, CIKM Conference, Maryland, November 1996, (co-author: E. Hughes et al).
- Object Technology for the Integration of the Infrastructure, Data Manager, and Tracker for Command and Control Applications, Proceedings of the IEEE Workshop on Object-Oriented Real- time Dependable Systems (WORDS), Newport Beach, CA, February 1997 (co-authors: M. Gates)
- Data Manager for Evolvable Real-time Command and Control, Proceedings VLDB 1997, Athens, Greece (co-author: R. Ginis et al).
- Object-oriented Data Management and Distribution for Real-time Command and Control Systems, Proceedings International Workshop on Real Time Databases 1997, Burlington, VT (co-author: R. Ginis, E. Hughes, et al).
- Schedule and Priority Mapping for Static and Real-time Middleware, Proceedings RT Middleware workshop, San Francisco, CA 1997, (also published in Springer book: Real Time Systems, Vol. 20, No. 2, March 2001) (co-authors: V. Wolfe et al).
- Concurrency Control in Real-time Object-oriented Systems, Proceedings IEEE ISORC, Kyoto, April 1998, (co-authors: M. Squadrito, et al).
- Distributed Adaptable Object-based Architecture for Evolvable Command and Control Systems, Web Proceedings of the DARPA/OMG Workshop on Compositional Software Architecture, January 1998 (co-author: P. Krupp et al), Monterey, CA.
- CORBA-based Real-time Trader Service for Adaptable Command and Control Systems, Proceedings of the IEEE ISORC Conference, May 1999, St. Malo, France (co-author: S. Wohlever et al).
- Adaptable Real-time Distributed Object Management for Command and Control Systems, Proceedings of the IEEE ISADS Conference, March 1999, Tokyo, Japan (co-author: J. Maurer et al).
- Dependable Objects for Databases, Middleware, and Methodologies, Proceedings IEEE WORDS 99F, Monterey, CA. (co-author: Dr. Marion Ceruti).
- Towards a Real-time Agent Architecture: A White Paper, Proceedings IEEE WORDS 99F, Monterey, CA, (co-author: L. DiPippo).
- Benchmarking Distributed Real-time Objects, Proceedings IEEE ISORC 2000, Newport Beach, CA (co-author: John Maurer et al).
- Real-time Data Mining of Multimedia Data Objects, Proceedings IEEE ISORC, ISORC, 2001, Magdeburg, Germany (co-author: M. Ceruti et al).
- Dependable Semantic Web, Proceedings IEEE WORDS 2002, San Diego, CA (keynote address published as paper, also version appeared in IEEE ICTAI 2002, Washington DC) (co-authors: E. Hughes et al)
- Dependable Infrastructures and Data Managers for Sensor Networks, Proceedings IEEE WORDS 2003F, Capri Island, Italy
- QOS Aware Dependable Distributed Steam Processing, ISORC 2008: 69-75 , (co-authors: V. Kalogeraki, D. Gunopulos, R. Sandhu), Orlando, FL.
- Real-time Knowledge Discovery and Dissemination for Intelligence Analysis, Proceedings HICCS 2009, Hawaii (co-author: J. Han et al) Nominated for best paper award.
- Dynamic Service and Data Migration in the Clouds, Proceedings IEEE International Computer Software and Applications Conference (COMPSAC) Workshop, July 2009, Seattle, WA (co- authors: W. Hao, I. Yen).