Dr. Bhavani Thuraisingham

Publications

Referred Journal Publications

    Intersection of Data Science and Cyber Security

  1. Multilevel Security in Database Management Systems, Computers and Security Journal, June 1987 (North Holland), Vol. 6, No. 3, pp. 252-260, (co-authors: P. Dwyer, G. Gelatis).
  2. Security Checking in Relational Database Management Systems Augmented with Inference Engines, Computers and Security Journal, December 1987 (North Holland), Vol. 6, No. 6, pp. 479-492.
  3. Multilevel Security Issues in Distributed Database Management Systems, Computers and Security Journal August 1988 (North Holland), Vol. 7, No. 4, (co-author: J. McHugh).
  4. Secure Query Processing Strategies, IEEE Computer, March 1989, Vol. 22, No. 3 (invited paper, co- authors: T. F. Keefe and W. T. Tsai).
  5. SODA - A Secure Object-Oriented Database System, Computers and Security Journal, Vol. 8, October 1989 (co-authors: W. T. Tsai and T. F. Keefe).
  6. Prototyping to Explore MLS/DBMS Design, Computers and Security Journal, May 1989 (Elsevier, formerly North Holland), Vol. 8, No. 3(co-authors: W. T. Tsai and D. Thomsen).
  7. A Functional View of Multilevel Databases, Computers and Security Journal (Elsevier), Vol. 8, No. 8, December 1989.
  8. Towards the Design of a Secure Data/Knowledge Base Management System, Data and Knowledge Engineering Journal, March 1990, (North Holland), Vol. 5, No. 1.
  9. Security in Object-Oriented Database Systems, Journal of Object-Oriented Programming, March/April 1990, Vol. 2, No. 6. (reprinted in book on object-oriented database mgmt syst. by SIG publishers).
  10. Design of LDV - A Multilevel Secure Database Management System, IEEE Transactions on Knowledge and Data Engineering, June 1990, Vol. 2, No. 2 (co-author: P. Stachour).
  11. SQL Extensions for Security Assertions, Computer Standards, and Interfaces Journal, 1990 (North Holland), Vol. 11, No.1, 5-14 (co-author: P. Stachour).
  12. AI Applications in Multilevel Database Security, Computer Security Journal, 1990 (Miller Freeman Publishers), Vol. 6, No. 1, (co-authors: W. Tsai, T. Keefe, and D. Thomsen)
  13. Multilevel Secure Object-Oriented Data Model - Issues on Noncomposite Objects, Composite Objects, and Versioning, Journal of Object-Oriented Programming, Volume 4, November/December 1991. (Version of the article reprinted by the MITRE Journal, 1992.) (Also, reprinted in book on object- oriented database management systems by SIG publishers.)
  14. Multilevel Security Issues in Distributed Database Management Systems – II, Computers and Security Journal (Elsevier), Volume 10, No. 8, December 1991.
  15. Multilevel Security Issues in Distributed Database Management - III, Computers and Security (Elsevier), Vol. 11, November 1992 (co-author: H. Rubinovitz).
  16. Design and Implementation of a Distributed Query Processor for a Trusted Distributed Database Management Systems, Journal of Systems and Software, April 1993 (North Holland), Vol. 21, No. 1 (co-author: Harvey Rubinovitz).
  17. Design and Implementation of a Database Inference Controller, Data and Knowledge Engineering Journal, December 1993 (North Holland), Vol. 11, No. 3, p. 271 – 297, (co-authors: W. Ford, M. Collins, J. O'Keeffe); (Article reprinted by the MITRE Journal, 1994).
  18. Integrating Intelligent Database Technology and Trusted Database Technology, Computer Security Journal, 1993 (Miller Freeman Publishers).
  19. Simulation of Join Query Processing Algorithms for a Trust Distributed Database Management System, Information and Software Technology Journal (Chapman and Hall), Vol. 35, No. 5, 1993 (co- author: Harvey Rubinovitz) (version of conf. paper published in Simulation Conference, 1991). published by Computer Standards Interface Journal special issue in 1999 as one of the seminal papers to appear in the journal).
  20. Multilevel Security for Information Retrieval Systems, Information and Management Journal (North Holland) Vol. 24, 1993.
  21. User-Role Based Security for Collaborative Computing Environment, Multimedia Review: The Journal of Multimedia Computing (Penton Media publishers), Summer 1993 (co-authors: S. Demurjian and T.C. Ting).
  22. Security Issues for Federated Database Systems, Computers and Security (North Holland), Vol. 13, No. 6, p. 509 – 525, December 1994.
  23. Multilevel Security in Information Retrieval Systems - II, Information and Management Journal (North Holland), Vol. 28, No. 1, 1995.
  24. Security Constraint Processing in a Multilevel Secure Distributed Database Management System, IEEE Transactions on Knowledge and Data Engineering, April 1995 (co-author: W. Ford).
  25. Towards the Design of a Multilevel Secure Object-Oriented Database Management System, Journal of Object-Oriented Programming, June 1995.
  26. MOMT: A Multilevel Object Modeling Technique for designing Secure Database Applications, Journal of Object-Oriented Programming, 1996 (co-authors: D. Marks and P. Sell).
  27. Adaptable Object Request Brokers for Information Survivability for Real-time Command and Control Systems, Distributed Computer Systems, 1999, p. 242 – 245 (co-author: J. Maurer).
  28. Secure Distributed Database Systems, Information Security Journal (Elsevier Science special issue in Database Security), 2001.
  29. Selective and Authentic Third-Party Publication of XML Documents, IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 10, p. 1263 – 1278, 2004 (co-author: E. Bertino et al). (version also published as MIT Working Paper, 2002)
  30. Secure Sensor Information Management & Mining, IEEE Signal Processing, May 2004.
  31. Security and Privacy for Sensor Databases, Sensor Letters, Inaugural Issue (American Scientific), Vol. 2, No.1, March 2004.
  32. Security and Privacy for Multimedia Database Management Systems, Multimedia Tools (Kluwer), Vol. 33, No. 1, October 2007 (keynote at IEEE Multimedia Software Engineering and Distributed Multimedia 2003).
  33. Privacy-preserving Data Mining: Developments and Directions, Journal of Database Management, (special issue in Database Technologies for National Security), p. 75 – 87, March 2005.
  34. Privacy Constraint Processing in a Privacy-Enhanced Database Management System, Data and Knowledge Engineering Journal, Vol. 55, No. 2, p. 159 - 188 (North Holland), 2005.
  35. Security Standards for the Semantic Web, Computer Standards, and Interface Journal (North Holland), Vol. 27, p. 257 – 268, March 2005 (version of COMPSAC Conference workshop paper, 2003).
  36. Access Control for Web Data: Models and Policy Languages, Invited Paper - Annales des Telecommunications, p. 245, Vol. 61, No. 3-4, March/April 2006 (co-authors: B. Carminati, E. Ferrari).
  37. Directions for Security and Privacy for Semantic E-Business Applications, Invited Paper, Communications of ACM, December 2005.
  38. A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering, VLDB Journal, Vol. 16, No. 1, January 2007 (co-authors: M. Awad et al).
  39. A Framework for a Video Analysis Tool for Suspicious Event Detection, Multimedia Tools, Vol. 35 No. 1, October 2007 (co-author: G. Lavee et al).
  40. Standards for Secure Data Sharing Across Organizations, Computer Standards and Interface Journal, Vol. 29, No. 1, January 2007 (co-author: D. Harris et al).
  41. Secure Knowledge Management: Confidentiality, Trust and Privacy, IEEE Transactions on Systems, Man and Cybernetics, May 2006 (co-authors: E. Bertino et al) (based on keynote presented at SKM 2004).
  42. PP-trust-X: A System for Privacy Preserving Trust Negotiation, ACM Transactions on Information and Systems Security, Vol. 10, No. 3, Article 12, July 2007 (co-author: E. Bertino et al).
  43. Administering the Semantic Web: Confidentiality, Privacy and Trust Management, International Journal of Information Security and Privacy, January 2007 (co-author: N. Tsybulnik, A. Ashraful).
  44. Secure Grid Computing, International Journal of Computer Science and Network Security, August 2006 (co-author: J. Zhu).
  45. Security for ERP Systems, Information Systems Security Journal, May 2007 (co-author: W. She).
  46. Secure Data Warehousing, Data Warehousing Journal, IDEA Press, 2007 (co-authors: Srinivasan, M. Kantarcioglu).
  47. E-Mail Worm Detection Using Data Mining. Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham: IJISP 1(4):47-61 (2007)
  48. Email Worm Detection Using Data Mining, International Journal of Information Security and Privacy, Vol. 1, Issue 4, Page: 47-61, 2007 (co-authors: M. Masud, L. Khan et al).
  49. Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries, International Journal of Information Security and Privacy, 2008. (co-authors: Y. Harsha Kumar et al).
  50. A Scalable Multi-Level Feature Extraction Technique to Detect Malicious Executables, Information Systems Frontiers, (Springer Netherlands), Vol. 10, No. 1, Page 33-45, March 2008 (co-authors: M. Masud, L. Khan).
  51. The Applicability of the Perturbation Based Privacy Preserving Data Mining for Real-World Data, " Data and Knowledge Engineering (DKE), Vol. 65, No. 1, p.5-21, 2008 Leading Journal (co-authors: L. Liu, M. Kantarcioglu).
  52. A Risk Management Approach to RBAC, Risk and Decision Analysis Journal, 2008 (co- authors: E. Celikel, M. Kantarcioglu, E. Bertino).
  53. Exploiting an Antivirus Interface, Computer Standards & Interfaces, Vol. 31, No. 6, p. 1182- 1189, November 2009 (co-authors: K. Hamlen, V. Mohan, M. Masud, L. Khan).
  54. Privacy Preservation in Wireless Sensor Networks: A State-of-the-art Survey, Ad-Hoc Networks Journal, Vol. 7, No. 8, November 2009 (co-authors: L. Na et al).
  55. Design and Implementation of a Secure Social Network System, Computer Systems Science and Engineering, Vol. 24, No. 2, March 2009 (co-authors: R. Layfield et al).
  56. Delegation Model for Web Services, Journal of Web Services Research 2009 (co-authors: W. She, I. Yen).
  57. Relationalization of Provenance Data in Complex RDF Reification Nodes, Special Issue of Electronic Commerce Research Journal on Trust, and Privacy Aspects of Electronic Commerce, 2009 (co- authors: S. Sriram et al).
  58. Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints Accepted and to appear in IEEE Transactions on Knowledge and Data Engineering, 2010 (co- authors: M. Masud, L. Khan, J. Han).
  59. Semantic Web, Data Mining and Security, IEEE Intelligent Systems Special Issue on AI, and Security Informatics, 2010 (co-authors: M. Kantarcioglu and L. Khan).
  60. Secure Data Objects Replication in Data Grid, IEEE Transactions on Dependable and Secure Computing, January 2010 (co-authors: Manghui Tu, Peng Li, I-Ling Yen, Bhavani Thuraisingham, and Latifur Khan).
  61. Security Issues for Cloud Computing, Journal of Information Security and Privacy, Vol. 4, No. 2, 2010, p. 36 – 48 (coauthors: K. Hamlen, L. Khan, M. Kantarcioglu).
  62. Policy Management for Assured Information Sharing, Journal of Information Security and Privacy, September 2010 (co-authors: M. Awad et al).
  63. Privacy-Preserved Social Network Integration and Analysis for Security Informatics IEEE Intelligent Systems Special Issue, Vol. 25, No. 5, p. 88 – 90, 2010 (co-author: C. Yang).
  64. Geospatial Resource Description Framework (GRDF) and security constructs, Computer Standards & Interfaces, Vol. 33, No. 1, p. 35-41, 2011 (co-authors: Ashraful Alam, Latifur Khan).
  65. Semantic Web-based Social Network Access Control, Computers and Security, Vol. 30, No. 2 – 3, 2011 (special issue for SACMAT conference) (co-authors: B. Carminati et al).
  66. Adaptive Information Coding for Secure and Reliable Wireless Telesugery Communications, Journal of Mobile Networks and Applications (MONET), Springer online (http://www.springerlink.com/content/r71p755326k68814/), July 2011 (coauthors: K. Sarac et al)
  67. Cyberphysical Systems Security Applied to Telesurgical Robotics, Computer Standards & Interfaces, Vol. 34, No. 1, p. 225-229, January 2012 (co-author: Gregory S. Lee).
  68. Data Security Services, Solutions and Standards for Outsourcing, Computer Standards and Interfaces Journal, Volume 35, No 1, 2013, p. 1-5 (co-author: K. Hamlen).
  69. Security-aware Service Composition with Fine-grained Access and Information Flow Control, IEEE Transactions on Services Computing, Volume 6, No. 3, July – Sept. 2013 (co-authors: W. She et al.).
  70. Effective Software Fault Localization using an RBF Neural Network, IEEE Transactions on Reliability, Volume 61, No. 1, p. 149 – 169, 2012 (co-authors: W. E. Wong, V. Debroy, R. Golden, X. Xu).
  71. Secure Semantic Computing, International Journal of Semantic Computing, Volume 5, No. 2, pg. 121 – 131, 2011 (co-author: K. Hamlen).
  72. Cloud-based Malware Detection for Evolving Data Streams, ACM Transactions on Management Information Systems, Volume 2, No. 3, Article 16, 2011 (co-authors: M. Masud et al.).
  73. Bin-Carver: Automatic Recovery of Binary Executable Files, Journal of Digital Investigation (special issue of the digital forensics research workshop), Volume 9, Supplement, S108 – S117, 2012 (co-authors: Zhiqiang Lin et al.).
  74. Preventing Private Information Inference Attacks on Social Networks, IEEE Transactions on Knowledge and Data Engineering, Volume 25, No. 8, p. 1849 – 1862, 2013 (co-authors: R. Heatherly, M. Kantarcioglu).
  75. Design and Implementation of a Data Mining System for Malware Detection, Journal of Design and Process Engineering, Volume 16, No. 2, p. 33 – 49, 2012 (co-authors: T. Al-Khateeb, M. Masud, K. Hamlen, and L. Khan).
  76. Evolving Insider Threat Detection Stream Mining Perspective, International Journal on Artificial Intelligence Tools, Volume 22, No. 5, 2013 (co-authors: Parveen Pallabi et al.)
  77. A roadmap for privacy-enhanced secure data provenance, Journal of Intelligent Information Systems, 43(3): 481-501 (2014) (co-authors: Elisa Bertino, Gabriel Ghinita, Murat Kantarcioglu, Dang Nguyen, Jae Park, Ravi S. Sandhu, Salmin Sultana, Bhavani M. Thuraisingham, S. Xu).
  78. Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems, IEEE Transactions on Services Computing, Accepted 2015 (co-authors, I-Yen, et al.)
  79. Online Anomaly Detection for Multi-source VMware Using a Distributed Streaming Framework, Software: Practice and Experience, published online January 2016 (coauthor: M. Solaimani et al)
  80. INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research. IEEE Security & Privacy 15(4): 72-78 (2017) (coauthors: A. Sherman et al)
  81. Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Generation Comp. Syst. 80: 421-429 (2018) (coauthors: Meikang Qiu, et al).
  82. BiMorphing: A Bi-Directional Bursting Defense Against Website Fingerprinting Attacks, Accepted for publication in IEEE Transactions on Dependable and Secure Computing, 2019. (coauthor: L. Khan et al).
  83. GraphBoot: Quantifying Uncertainty in Node Feature Learning on Large Networks," Accepted IEEE Transactions on Knowledge and Data Engineering, 2019 (coauthor: M. Kantarcioglu et al)
  84. GCI: A GPU Based Transfer Learning Approach for Detecting Cheats of Computer Game, IEEE Transactions on Dependable and Secure Computing, 2020 (Co-authors: M. Islam, L Khan et al)
  85. Trustworthy Machine Learning, IEEE Intelligent Systems 2022
  86. GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game, IEEE Transactions on Dependable and Secure Computing, 2022 (co-authors: L. Khan et al)
  87. Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data, IEEE TDSC, accepted 2024 (coauthor: L. Khan)
  88. Blockchain-enabled Service Optimizations in Supply Chain Digital Twin, IEEE Transactions on Services Computing, Coauthors: M. Qiu et al), 2023
  89. A Privacy-Preserving Architecture and Data-Sharing Model for Cloud-IoT Applications, IEEE Transactions on Dependable and Secure Computing, accepted 2023 (Co-Author: M. Fernandez).
  90. Mitigating Query-based Neural Network Fingerprinting via Data Augmentation, ACM Transactions on Sensor Networks, 2023 (co-author: M. Qiu, et al).
  91. Data Science (Data Management, Data Mining, analytics, and AI/ML)

  92. AI Applications in Distributed System Design Issues, 1988, IEEE Network, Vol. 2, No. 6, (co-author: J. Larson).
  93. From Rules to Frames and Frames to Rules, October 1989, AI Expert (Miller Freeman Publishers) Volume 2, No. 10. (Reviewed by Editorial Board).
  94. A New View of Information Modeling: A Bridge Between Data and Information, Information Systems Management Journal (Auerbach), Vol. 9, No., Spring 1992 (co-author: V. Venkataraman; also, reprinted in Handbook of Data Management 1993, Editor: von Halle and Kull).
  95. On Developing Multimedia Database Management Systems Using the Object-Oriented Approach, Multimedia Review: Journal of Multimedia Computing, Vol. 3, No.2, 1992.
  96. Web Information Management and Its Application to Electronic Commerce, International Journal on Artificial Intelligence Tools (World Scientific), Vol. 8, No. 2, June 1999.
  97. Information Demands Drive Data Base Interoperability, SIGNAL Magazine: AFCEA Journal, December 1995.
  98. A Primer for Understanding Data Mining, IEEE ITPro, Vol., 2, No. 1, January/February 2000.
  99. Emerging Standards for Data Mining, Computer Standards, and Interface Journal (North Holland), Vol. 23, No. 3, 2001 (co-author: C. Clifton).
  100. Foundations of Data Mining: Position Paper, Communications of Institute for Information and Computing Machinery (Taiwan Journal), May 2002. (PAKDD 2002 workshop paper published as special issue in journal).
  101. Collaborative Commerce and Knowledge Management, Knowledge Management Journal (Wiley Interscience), 2002.
  102. Managing and Mining Multimedia Databases, International Journal of Artificial Intelligence Tools (World Scientific), Vol. 13, No. 3, 2004 (keynote at ICTAI99).
  103. Predicting WWW Surfing Using Multiple Evidence Combination, VLDB Journal, May 2008 (co- author: M. Awad et al).
  104. A Framework for Automated Image Annotation, International Journal of Computer Systems Science and Engineering, Vo1. 22, No. 1 – 2, 2007, (co-author: L Wang et al).
  105. A Scalable Clustering Method Based on Density, WSEAS Transactions on Computing Research, 2008 (co-authors: L. Khan and S. Bereg).
  106. Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing, IEEE Internet Computing, Vol. 12, No. 1, p. 38-44, January - February 2008, (co-authors: P. K. Chitumalla, D. Harris, L. Khan).
  107. R2D: A Bridge Between the Semantic Web and Relational Visualization Tools, Semantic Computing Journal, 2009. (co-authors: S. Sriram et al).
  108. Necessary and Sufficient Conditions for Transaction-consistent Global Checkpoints in a Distributed Database System, Information Sciences, Vol. 179, No. 20, p. 3659 – 3672, September 2009, (co- authors: J. Wu, D. Manivannan).
  109. Update Enabled Triplification of Relational Data into Virtual RDF Stores International Journal of Semantic Computing, World Scientific, Vol. 4, No. 4 December 2010, p. 423 – 451 (selected from Proc. of Fourth IEEE International Conference on Semantic Computing [IEEE ICSC 2010], September 22-24, 2010, Carnegie Mellon University, Pittsburgh, PA, USA). (co-authors: S. Ramanujam, V. Khadilkar, L. Khan, S. Seida, M. Kantarcioglu).
  110. Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing, IEEE Transactions on Knowledge and Data Engineering, Vol. 23, No. 9, p. 1312-1327, 2011 (co-authors: Mohammad Farhan Husain, James P. McGlothlin, Mohammad M. Masud, Latifur R. Khan).
  111. Enhanced Geographically Typed Semantic Schema Matching, Journal of Web Semantics, Vol. 9, No. 1, p. 52-70, 2011 (co-authors: Jeffrey Partyka, Pallabi Parveen, Latifur Khan, Shashi Shekhar).
  112. Tweelocal: Identifying Social Cliques for Intelligence Location Mining, The Human Journal ASE Press, Volume 1, 2013 (co-authors: S. Abrol, L. Khan)
  113. Deep Residual-based Enhanced JPEG Compression on the Internet of Things, Accepted IEEE Transactions on the Foundations on Industrial Informatics, 2020 (coauthors: M. Qiu at al)
  114. SACOOS: A Semi-Supervised Framework for Emerging Class Detection and Concept Drift Adaption over Data Streams, Accepted IEEE TKDE, 2022 (Coauthor: L Khan et al)
  115. Distributed Processing and Real-Time System

  116. Recovery Point Selection on a Reverse Binary Tree Task Model, August 1989, IEEE Transactions on Software Engineering, Vol. 15, No.8, (co-authors: W. T. Tsai and S. K Chen).
  117. Real-time Transaction Processing, Computer Systems: Science and Practice (Chapman and Hall), 1999 (co-authors: L. DiPippo, V. Wolfe et al).
  118. Real-time CORBA, IEEE Transactions on Parallel and Distributed Systems, Vol. 11, No. 10, October 2000 (co-author: V. Wolfe et al).
  119. Scheduling and Priority Mapping for Static Real-Time Middleware, Real-time Systems Journal (Kluwer), Vol. 20, p. 155 -182, 2001 (co-author: V. Wolfe, L. DiPippo et al).
  120. Computability/Complexity Theory

  121. Representation of One-One Degrees by Decision Problems, 1982, Journal of Computer and Systems Sciences (Academic Press), Vol. 24, p. 373-377.
  122. Some Elementary Closure Properties of N-Cylinders, 1983, Notre Dame Journal of Formal Logic, Vol. 24, No. 2, p. 242-253.
  123. The Concept of N-Cylinder and its Relationship to Simple Sets, 1983, Notre Dame Journal of Formal Logic, Vol. 24, No. 3, p. 328-336.
  124. Cylindrical Decision Problems, 1983, Notre Dame Journal of Formal Logic, Vol. 24, No. 2, p. 188- 198.
  125. System Functions and their Decision Problems, 1984, Mathematical Logic Quarterly Journal, Vol. 30, No. 7 - 8, p. 119-128. (formerly Zeitschrift fur Mathematische Logik und Grundlagen der Mathematik)
  126. The Concept of N-Cylinder and its Application , 1986, Mathematical Logic Quarterly Journal, Vol. 32, No. 13 - 16, p. 211-219.
  127. Reducibility Relationships Between Decision Problems for System Functions, 1987, Mathematical Logic Quarterly Journal, Vol. 33, No. 4, p. 305-312.
  128. Representation of One-One Degrees by N-Cylindrical Decision Problems, 1988, Mathematical Logic Quarterly Journal, Vol. 34, No. 6.
  129. System Function Languages, Mathematical Logic Quarterly, Vol. 39, No. 1, 1993.
  130. A Construction of Cartesian Authentication Codes from Orthogonal Spaces over a Finite Field of Odd Characteristic, Discrete Mathematics, Algorithms and Applications, Vol. 1, No. 1, March 2009 (co-authors: Z. Li et al).
  131. A Better Approximation for Minimum Average Routing Path Clustering Problem in 2-D Underwater Sensor Networks, Discrete Mathematics, Algorithms and Applications, Vol. 1, No. 2, June 2009 (co- authors: W. Wang et al).
  132. PTAS for the minimum weighted dominating set in growth bounded graphs, Journal of Global Optimization, Vol. 23, No. 4 p.443-450, 2012 (co-authors: Zhong Wang, Wei Wang, Joon-Mo Kim, Weili Wu).
  133. An individual-based model of information diffusion combining friends' influence, J. Comb. Optim. 28(3): 529-539 (2014) (co-authors: Lidan Fan, Zaixin Lu, Weili Wu, Yuanjun Bi, Ailian Wang)
  134. National Security and Counter-Terrorism (Political Science Related)

  135. After the ‘War on Terror' – How to Maintain Long-range Terrorist Deterrence, Journal of Policing, Intelligence and Counter Terrorism, Vol. 9, No. 1, p. 19 – 31, 2014. (co-author: Jan Kallberg). DOI: 10.1080/18335330.2013.877376
  136. Cyber Operations – Bridging from Concept to Cyber Superiority, Joint Forces Quarterly, 1st quarter, Issue 68, 2013 (Q1 in their field – below 10 % acceptance rate) (co-author: J. Kallberg). (Also, appeared in ARSTRAT IO Newsletter, Volume 14, No. 4, January 2013.)
  137. Reducing the Potential Perpetrator Perceived Opportunity by Injecting Fear of Failure, Terrorism and Political Violence (Special issue) 2014 (co-author: J. Kallberg).
  138. State Actors' Offensive Cyber Operations - Breaking Intellectual Ceiling Reverses the Security Paradigm, IEEE IT-Professional, Volume 15, No. 3, p. 32 – 35, May – June 2013 (co-author: J. Kallberg)
  139. COVID-19: The Information Warfare Paradigm Shift, Computers and Society, also appeared in Cyber Defense Review, September 2020 (coauthor: J. Kallberg et al)