Search For:

Displaying 1-50 out of 124 total
Trust Management in a Distributed Environment (This is the position paper of Bhavani Thuraisingham, a panelist of the plenary panel, which arrived late. Please see Plenary Panel: Security and Privacy in Distributed Collaborative Systems, page 267.)
Found in: Computer Software and Applications Conference, Annual International
By Bhavani Thuraisingham
Issue Date:July 2005
pp. 561-562
No summary available.
   
Supervised Learning for Insider Threat Detection Using Stream Mining
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Pallabi Parveen,Zackary R. Weger,Bhavani Thuraisingham,Kevin Hamlen,Latifur Khan
Issue Date:November 2011
pp. 1032-1039
Insider threat detection requires the identification of rare anomalies in contexts where evolving behaviors tend to mask such anomalies. This paper proposes and tests an ensemble-based stream mining algorithm based on supervised learning that addresses thi...
 
Data Mining for Malicious Code Detection and Security Applications
Found in: European Intelligence and Security Informatics Conference
By Bhavani Thuraisingham
Issue Date:September 2011
pp. 4-5
Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Data mining has many applications in security including for national security...
 
Data Mining for Malicious Code Detection and Security Applications
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Bhavani Thuraisingham
Issue Date:September 2009
pp. 6-7
Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Data mining has many applications in security including for national security...
 
Data Mining for Malicious Code Detection and Security Applications
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Bhavani Thuraisingham
Issue Date:September 2009
pp. 6-7
Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Data mining has many applications in security including for national security...
 
Secure Multimedia Data Management Research Directions
Found in: Microelectronics Systems Education, IEEE International Conference on/Multimedia Software Engineering, International Symposium on
By Bhavani Thuraisingham
Issue Date:December 2002
pp. xiii
No summary available.
   
Preventing Private Information Inference Attacks on Social Networks
Found in: IEEE Transactions on Knowledge and Data Engineering
By Raymond Heatherly,Murat Kantarcioglu,Bhavani Thuraisingham
Issue Date:August 2013
pp. 1849-1862
Online social networks, such as Facebook, are increasingly utilized by many people. These networks allow users to publish details about themselves and to connect to their friends. Some of the information revealed inside these networks is meant to be privat...
 
Least Cost Rumor Blocking in Social Networks
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)
By Lidan Fan, Zaixin Lu, Weili Wu,Bhavani Thuraisingham, Huan Ma, Yuanjun Bi
Issue Date:July 2013
pp. 540-549
In many real-world scenarios, social network serves as a platform for information diffusion, alongside with positive information (truth) dissemination, negative information (rumor) also spread among the public. To make the social network as a reliable medi...
 
Security-Aware Service Composition with Fine-Grained Information Flow Control
Found in: IEEE Transactions on Services Computing
By Wei She,I-Ling Yen,Bhavani Thuraisingham,Elisa Bertino
Issue Date:July 2013
pp. 330-343
Enforcing access control in composite services is essential in distributed multidomain environment. Many advanced access control models have been developed to secure web services at execution time. However, they do not consider access control validation at...
 
Tweeque: Spatio-Temporal Analysis of Social Networks for Location Mining Using Graph Partitioning
Found in: 2012 International Conference on Social Informatics (SocialInformatics)
By Satyen Abrol,Latifur Khan,Bhavani Thuraisingham
Issue Date:December 2012
pp. 145-148
Because of privacy and security reasons, most of the people on social networking sites like Twitter are unwilling to specify their locations in the profiles. In this paper, we present a completely novel approach, Tweeque which is a spatio-temporal mining a...
 
Sparse Bayesian Adversarial Learning Using Relevance Vector Machine Ensembles
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Yan Zhou,Murat Kantarcioglu,Bhavani Thuraisingham
Issue Date:December 2012
pp. 1206-1211
Data mining tasks are made more complicated when adversaries attack by modifying malicious data to evade detection. The main challenge lies in finding a robust learning model that is insensitive to unpredictable malicious data distribution. In this paper, ...
 
Stream Classification with Recurring and Novel Class Detection Using Class-Based Ensemble
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Tahseen Al-Khateeb,Mohammad M. Masud,Latifur Khan,Charu Aggarwal,Jiawei Han,Bhavani Thuraisingham
Issue Date:December 2012
pp. 31-40
Concept-evolution has recently received a lot of attention in the context of mining data streams. Concept-evolution occurs when a new class evolves in the stream. Although many recent studies address this issue, most of them do not consider the scenario of...
 
Self-Training with Selection-by-Rejection
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Yan Zhou,Murat Kantarcioglu,Bhavani Thuraisingham
Issue Date:December 2012
pp. 795-803
Practical machine learning and data mining problems often face shortage of labeled training data. Self-training algorithms are among the earliest attempts of using unlabeled data to enhance learning. Traditional self-training algorithms label unlabeled dat...
 
Expanded Semantic Graph Representation for Matching Related Information of Interest across Free Text Documents
Found in: 2012 IEEE Sixth International Conference on Semantic Computing (ICSC)
By James R. Johnson,Anita Miller,Latifur Khan,Bhavani Thuraisingham
Issue Date:September 2012
pp. 60-66
This research proposes an expanded semantic graph definition that serves as a basis for an expanded semantic graph representation and graph matching approach. This representation separates the content and context and adds a number of semantic structures th...
 
Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement Documents
Found in: 2012 European Intelligence and Security Informatics Conference (EISIC)
By James R. (Bob) Johnson,Anita Miller,Latifur Khan,Bhavani Thuraisingham
Issue Date:August 2012
pp. 148-155
This paper defines and shows the merit of measures for quantifying the degree of relatedness of information of interest and the importance of new information found within a large number of free text documents. These measures are used for identifying and so...
 
Cloud Guided Stream Classification Using Class-Based Ensemble
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Tahseen M. Al-Khateeb,Mohammad M. Masud,Latifur Khan,Bhavani Thuraisingham
Issue Date:June 2012
pp. 694-701
We propose a novel class-based micro-classifier ensemble classification technique (MCE) for  classifying data streams. Traditional  ensemble-based data stream classification techniques build  a classification model from each data chunk and  keep an ensembl...
 
Risk-Aware Workload Distribution in Hybrid Clouds
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Kerim Yasin Oktay,Vaibhav Khadilkar,Bijit Hore,Murat Kantarcioglu,Sharad Mehrotra,Bhavani Thuraisingham
Issue Date:June 2012
pp. 229-236
This paper explores an efficient and secure mechanism to partition computations across public and private machines in a hybrid cloud setting. We propose a principled framework for distributing data and processing in a hybrid cloud that meets the conflictin...
 
Role-based integrated access control and data provenance for SOA based net-centric systems
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Wei She,I-Ling Yen,Farokh Bastani,Bao Tran,Bhavani Thuraisingham
Issue Date:December 2011
pp. 225-234
Service-oriented architecture (SOA) has been widely adopted in the development of many net-centric application systems. In SOA, services potentially from different domains are composed together to accomplish critical tasks. In these systems, security and t...
 
Detecting Recurring and Novel Classes in Concept-Drifting Data Streams
Found in: Data Mining, IEEE International Conference on
By Mohammad M. Masud,Tahseen M. Al-Khateeb,Latifur Khan,Charu Aggarwal,Jing Gao,Jiawei Han,Bhavani Thuraisingham
Issue Date:December 2011
pp. 1176-1181
Concept-evolution is one of the major challenges in data stream classification, which occurs when a new class evolves in the stream. This problem remains unaddressed by most state-of-the-art techniques. A recurring class is a special case of concept-evolut...
 
Rule-Based Run-Time Information Flow Control in Service Cloud
Found in: Web Services, IEEE International Conference on
By Wei She,I-Ling Yen,Bhavani Thuraisingham,San-Yih Huang
Issue Date:July 2011
pp. 524-531
Service cloud provides added value to customers by allowing them to compose services from multiple providers. Most existing web service security models focus on the protection of individual web services. When multiple services from different domains are co...
 
Ontology-Driven Query Expansion Using Map/Reduce Framework to Facilitate Federated Queries
Found in: Web Services, IEEE International Conference on
By Neda Alipanah,Pallabi Parveen,Latifur Khan,Bhavani Thuraisingham
Issue Date:July 2011
pp. 712-713
In view of the need for a highly distributed and federated architecture, a robust query expansion has great impact on the performance of information retrieval. We aim to determine ontology-driven query expansion terms using different weighting techniques. ...
 
Scalable Complex Query Processing over Large Semantic Web Data Using Cloud
Found in: Cloud Computing, IEEE International Conference on
By Mohammad Farhan Husain,James McGlothlin,Latifur Khan,Bhavani Thuraisingham
Issue Date:July 2011
pp. 187-194
Cloud computing solutions continue to grow increasingly popular both in research and in the commercial IT industry. With this popularity comes ever increasing challenges for the cloud computing service providers. Semantic web is another domain of rapid gro...
 
Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing
Found in: IEEE Transactions on Knowledge and Data Engineering
By Mohammad Farhan Husain,James McGlothlin,Mohammad Mehedy Masud,Latifur R. Khan,Bhavani Thuraisingham
Issue Date:September 2011
pp. 1312-1327
Semantic web is an emerging area to augment human reasoning. Various technologies are being developed in this arena which have been standardized by the World Wide Web Consortium (W3C). One such standard is the Resource Description Framework (RDF). Semantic...
 
Geospatial Schema Matching with High-Quality Cluster Assurance and Location Mining from Social Network
Found in: Data Mining Workshops, International Conference on
By Latifur Khan, Jeffrey Partyka, Satyen Abrol, Bhavani Thuraisingham
Issue Date:December 2010
pp. 517
No summary available.
 
Addressing Concept-Evolution in Concept-Drifting Data Streams
Found in: Data Mining, IEEE International Conference on
By Mohammad M. Masud, Qing Chen, Latifur Khan, Charu Aggarwal, Jing Gao, Jiawei Han, Bhavani Thuraisingham
Issue Date:December 2010
pp. 929-934
The problem of data stream classification is challenging because of many practical aspects associated with efficient processing and temporal behavior of the stream. Two such well studied aspects are infinite length and concept-drift. Since a data stream ma...
 
A Token-Based Access Control System for RDF Data in the Clouds
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Arindam Khaled, Mohammad Farhan Husain, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham
Issue Date:December 2010
pp. 104-111
The Semantic Web is gaining immense popularity—and with it, the Resource Description Framework (RDF)broadly used to model Semantic Web content. However, access control on RDF stores used for single machines has been seldom discussed in the literature. One ...
 
Bi-directional Translation of Relational Data into Virtual RDF Stores
Found in: International Conference on Semantic Computing
By Sunitha Ramanujam, Vaibhav Khadilkar, Latifur Khan, Steven Seida, Murat Kantarcioglu, Bhavani Thuraisingham
Issue Date:September 2010
pp. 268-276
A vast majority of the world’s valuable data currently exists in relational databases and other legacy storage systems. In order for Semantic Web applications to access such legacy data without replication or synchronization of the same, the gap between th...
 
Ranking Ontologies Using Verified Entities to Facilitate Federated Queries
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Neda Alipanah, Piyush Srivastava, Pallabi Parveen, Bhavani Thuraisingham
Issue Date:September 2010
pp. 332-337
In view of the need for highly distributed and federated architecture, ranking ontologies from different data sources in a specific domain have great impact on the performance of web applications. Since ontologies for a same domain usually overlap, we aim ...
 
WS-Sim: A Web Service Simulation Toolset with Realistic Data Support
Found in: Computer Software and Applications Conference Workshops
By Wei She, I-Ling Yen, Bhavani Thuraisingham
Issue Date:July 2010
pp. 109-114
Service-oriented computing has become the most promising paradigm for system integration and interoperation. Many different models and mechanisms have been proposed to achieve security, dependability, real-time, etc. capabilities in service composition and...
 
Challenges and Future Directions of Software Technology: Secure Software Development
Found in: Computer Software and Applications Conference, Annual International
By Bhavani Thuraisingham, Kevin W. Hamlen
Issue Date:July 2010
pp. 17-20
Developing large scale software systems has major security challenges. This paper describes the issues involved and then addresses two topics: formal methods for emerging secure systems and secure services modeling.
 
Data Intensive Query Processing for Large RDF Graphs Using Cloud Computing Tools
Found in: Cloud Computing, IEEE International Conference on
By Mohammad Farhan Husain, Latifur Khan, Murat Kantarcioglu, Bhavani Thuraisingham
Issue Date:July 2010
pp. 1-10
Cloud computing is the newest paradigm in the IT world and hence the focus of new research. Companies hosting cloud computing services face the challenge of handling data intensive applications. Semantic web technologies can be an ideal candidate to be use...
 
Policy-Driven Service Composition with Information Flow Control
Found in: Web Services, IEEE International Conference on
By Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino
Issue Date:July 2010
pp. 50-57
Ensuring secure information flow is a critical task for service composition in multi-domain systems. Research in security-aware service composition provides some preliminary solutions to this problem, but there are still issues to be addressed. In this pap...
 
Secure Semantic Sensor Web and Pervasive Computing
Found in: Sensor Networks, Ubiquitous, and Trustworthy Computing, International Conference on
By Bhavani Thuraisingham, Kevin W. Hamlen
Issue Date:June 2010
pp. 5-10
In this paper we discuss issues on developing a secure semantic sensor web. SensorML is the starting point for this work. We explore the layers for a semantic sensor web and discuss security issues. We also discuss secure peer-to-peer computing as it relat...
 
Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints
Found in: IEEE Transactions on Knowledge and Data Engineering
By Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham
Issue Date:June 2011
pp. 859-874
Most existing data stream classification techniques ignore one important aspect of stream data: arrival of a novel class. We address this issue and propose a data stream classification technique that integrates a novel class detection mechanism into tradit...
 
R2D: A Bridge between the Semantic Web and Relational Visualization Tools
Found in: International Conference on Semantic Computing
By Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida, Bhavani Thuraisingham
Issue Date:September 2009
pp. 303-311
The widespread deployment of Resource Description Framework has resulted in the emergence of a new data storage paradigm, the RDF Graph Model, which, in turn, requires a rich suite of modeling and visualization tools to aid with data management. This paper...
 
Semantic Schema Matching without Shared Instances
Found in: International Conference on Semantic Computing
By Jeffrey Partyka, Latifur Khan, Bhavani Thuraisingham
Issue Date:September 2009
pp. 297-302
Semantic heterogeneity across data sources remains a widespread and relevant problem requiring innovative solutions. Our approach towards resolving semantic disparities among distinct data sources aligns their constituent tables by first choosing attribute...
 
Semantic Web for Content Based Video Retrieval
Found in: International Conference on Semantic Computing
By Sancho C. Sebastine, Bhavani Thuraisingham, Balakrishnan Prabhakaran
Issue Date:September 2009
pp. 103-108
This paper aims to provide a semantic web based video search engine. Currently, we do not have scalable integration platforms to represent extracted features from videos, so that they could be indexed and searched. The task of indexing extracted features f...
 
Dynamic Service and Data Migration in the Clouds
Found in: Computer Software and Applications Conference, Annual International
By Wei Hao, I-Ling Yen, Bhavani Thuraisingham
Issue Date:July 2009
pp. 134-139
Cloud computing is an emerging computation paradigm. To support successful cloud computing, service oriented architecture (SOA) should play a major role. Due to the nature of widely distributed service providers in clouds, the service performance could be ...
 
The SCIFC Model for Information Flow Control in Web Service Composition
Found in: Web Services, IEEE International Conference on
By Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino
Issue Date:July 2009
pp. 1-8
Existing web service access control models focus on individual web services, and do not consider service composition. In composite services, a major issue is information flow control. Critical information may flow from one service to another in a service c...
 
A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data
Found in: Data Mining, IEEE International Conference on
By Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham
Issue Date:December 2008
pp. 929-934
Recent approaches in classifying evolving data streams are based on supervised learning algorithms, which can be trained with labeled data only. Manual labeling of data is both costly and time consuming. Therefore, in a real streaming environment, where hu...
 
Trustworthy Semantic Web Technologies for Secure Knowledge Management
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Bhavani Thuraisingham, Pranav Parikh
Issue Date:December 2008
pp. 186-193
Semantic web technologies have many applications due to their expressive and reasoning power. At the same time, secure knowledge management is becoming a crucial area for many corporations where the data, information and knowledge including the intellectua...
 
Data Mining for Security Applications
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen
Issue Date:December 2008
pp. 585-589
Ensuring the integrity of computer networks, both in relation to security and with regard to the institutional life of the nation in general, is a growing concern. Security and defense networks, proprietary research, intellectual property, and data based m...
 
An Effective Evidence Theory Based K-Nearest Neighbor (KNN) Classification
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Lei Wang, Latifur Khan, Bhavani Thuraisingham
Issue Date:December 2008
pp. 797-801
In this paper, we study various K nearest neighbor (KNN) algorithms and present a new KNN algorithm based on evidence theory. We introduce global frequency estimation of prior probability (GE) and local frequency estimation of prior probability (LE). A GE ...
 
Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems
Found in: High-Assurance Systems Engineering, IEEE International Symposium on
By Yunqi Ye, I-Ling Yen, Liangliang Xiao, Bhavani Thuraisingham
Issue Date:December 2008
pp. 383-391
Storage system is an important component in many data intensive applications, including data grid. Security, availability, and high performance are important issues in the storage system design. In this paper we present a Peer-to-Peer (P2P) storage system ...
 
Enhancing Security Modeling for Web Services Using Delegation and Pass-On
Found in: Web Services, IEEE International Conference on
By Wei She, I-Ling Yen, Bhavani Thuraisingham
Issue Date:September 2008
pp. 545-552
In recent years, the issues in web service security have been widely investigated and various security standards have been proposed. But most of these studies and standards focus on the access control policies for individual web services and do not conside...
 
QoS Aware Dependable Distributed Stream Processing
Found in: Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
By Vana Kalogeraki, Dimitrios Gunopulos, Ravi Sandhu, Bhavani Thuraisingham
Issue Date:May 2008
pp. 69-75
In this paper we describe our approach for developing a QoS-aware, dependable execution environment for large-scale distributed stream processing applications. Distributed stream processing applications have strong timeliness and security demands. In parti...
 
Geospatial Resource Description Framework (GRDF) and security constructs
Found in: Data Engineering Workshops, 22nd International Conference on
By Ashraful Alam, Latifur Khan, Bhavani Thuraisingham
Issue Date:April 2008
pp. 475-481
The Semantic Web enables an automated, ontology based information aggregation mechanism. In geographic domain, automatic aggregation is a particularly important task in light of the over-abundance of data formats and types. Because the formats and types ar...
 
Message from the SSW'08 organizers
Found in: Data Engineering Workshops, 22nd International Conference on
By Bhavani Thuraisingham, Barbara Carminati
Issue Date:April 2008
pp. 445
No summary available.
   
Secure Data Objects Replication in Data Grid
Found in: IEEE Transactions on Dependable and Secure Computing
By Manghui Tu, Peng Li, I-Ling Yen, Bhavani Thuraisingham, Latifur Khan
Issue Date:January 2010
pp. 50-64
Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical information. To achieve performance goals in data accesses, these data fragmentation app...
 
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case
Found in: Availability, Reliability and Security, International Conference on
By William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham
Issue Date:March 2008
pp. 237-244
Network data needs to be shared for distributed security analysis. Anonymization of network data for sharing sets up a fundamental tradeoff between privacy protection versus security analysis capability. This privacy/analysis tradeoff has been acknowledged...
 
 1  2 Next >>