متابعة
Bhavani Thuraisingham
Bhavani Thuraisingham
Cyber Security Research and Education Institute, University of Texas at Dallas
بريد إلكتروني تم التحقق منه على utdallas.edu
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16, 507-521, 2007
5662007
Classification and novel class detection in concept-drifting data streams under time constraints
M Masud, J Gao, L Khan, J Han, BM Thuraisingham
IEEE Transactions on knowledge and data engineering 23 (6), 859-874, 2010
5022010
Privacy preservation in wireless sensor networks: A state-of-the-art survey
N Li, N Zhang, SK Das, B Thuraisingham
Ad Hoc Networks 7 (8), 1501-1514, 2009
4332009
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
3582010
ROWLBAC: representing role based access control in OWL
T Finin, A Joshi, L Kagal, J Niu, R Sandhu, W Winsborough, ...
Proceedings of the 13th ACM symposium on Access control models and …, 2008
3372008
Inferring private information using social network data
J Lindamood, R Heatherly, M Kantarcioglu, B Thuraisingham
Proceedings of the 18th international conference on World wide web, 1145-1146, 2009
3222009
Systems and methods for determining user attribute values by mining user network data and information
S Abrol, V Khadilkar, LR Khan, BM Thuraisingham
US Patent 8,965,974, 2015
3052015
technologies, techniques, tools, and Trends
B Thuraisingham, D Maning
CRC press, 1999
2911999
Heuristics-based query processing for large RDF graphs using cloud computing
M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011
2812011
A semantic web based framework for social network access control
B Carminati, E Ferrari, R Heatherly, M Kantarcioglu, B Thuraisingham
Proceedings of the 14th ACM symposium on Access control models and …, 2009
2382009
Knowledge management: Classic and contemporary works
D Morey, MT Maybury, BM Thuraisingham
MIT Press, 2002
2132002
Effective software fault localization using an RBF neural network
WE Wong, V Debroy, R Golden, X Xu, B Thuraisingham
IEEE Transactions on Reliability 61 (1), 149-169, 2011
2122011
A practical approach to classify evolving data streams: Training with limited amount of labeled data
MM Masud, J Gao, L Khan, J Han, B Thuraisingham
2008 Eighth IEEE International Conference on Data Mining, 929-934, 2008
2112008
Preventing private information inference attacks on social networks
R Heatherly, M Kantarcioglu, B Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 25 (8), 1849-1862, 2012
2042012
Systems and methods for automated detection of application vulnerabilities
L Khan, Z Lin, B Thuraisingham, J Sahs, D Sounthiraraj, G Greenwood
US Patent 9,977,904, 2018
2032018
Eksploracja danych
DJ Hand, H Mannila, P Smyth
Wydawnictwa Naukowo-Techniczne, 2005
1942005
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry
M Qiu, K Gai, B Thuraisingham, L Tao, H Zhao
Future generation computer systems 80, 421-429, 2018
1912018
Least cost rumor blocking in social networks
L Fan, Z Lu, W Wu, B Thuraisingham, H Ma, Y Bi
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
1872013
Selective and authentic third-party distribution of XML documents
E Bertino, B Carminati, E Ferrari, B Thuraisingham, A Gupta
IEEE Transactions on Knowledge and Data Engineering 16 (10), 1263-1278, 2004
1832004
Secure knowledge management: confidentiality, trust, and privacy
E Bertino, LR Khan, R Sandhu, B Thuraisingham
IEEE Transactions on systems, man, and cybernetics-Part A: Systems and …, 2006
1812006
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20