Bhavani Thuraisingham
Bhavani Thuraisingham
Cyber Security Research and Education Institute, University of Texas at Dallas
Verified email at utdallas.edu
TitleCited byYear
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16 (4), 507-521, 2007
4002007
Privacy preservation in wireless sensor networks: A state-of-the-art survey
N Li, N Zhang, SK Das, B Thuraisingham
Ad Hoc Networks 7 (8), 1501-1514, 2009
3312009
Classification and novel class detection in concept-drifting data streams under time constraints
M Masud, J Gao, L Khan, J Han, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (6), 859-874, 2010
3032010
R OWL BAC: representing role based access control in OWL
T Finin, A Joshi, L Kagal, J Niu, R Sandhu, W Winsborough, ...
Proceedings of the 13th ACM symposium on Access control models and …, 2008
2682008
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
2462010
Inferring private information using social network data
J Lindamood, R Heatherly, M Kantarcioglu, B Thuraisingham
Proceedings of the 18th international conference on World wide web, 1145-1146, 2009
2362009
Heuristics-based query processing for large RDF graphs using cloud computing
M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011
2212011
Data mining: technologies, techniques, tools, and trends
B Thuraisingham
CRC press, 2014
2132014
A semantic web based framework for social network access control
B Carminati, E Ferrari, R Heatherly, M Kantarcioglu, B Thuraisingham
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1882009
Knowledge management: Classic and contemporary works
D Morey, MT Maybury, BM Thuraisingham
MIT Press, 2002
1822002
Eksploracja danych
DJ Hand, H Mannila, P Smyth
Wydawnictwa Naukowo-Techniczne, 2005
1702005
Preventing private information inference attacks on social networks
R Heatherly, M Kantarcioglu, B Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 25 (8), 1849-1862, 2012
1652012
Apparatus for design of a multilevel secure database management system based on a multilevel logic programming system
BM Thuraisingham
US Patent 5,481,700, 1996
1561996
Design of LDV: A Multilevel Secure Relational Database Management
PD Stachour, B Thuraisingham
IEEE Transactions on Knowledge & Data Engineering, 190-209, 1990
1491990
Selective and authentic third-party distribution of XML documents
E Bertino, B Carminati, E Ferrari, B Thuraisingham, A Gupta
IEEE Transactions on Knowledge and Data Engineering 16 (10), 1263-1278, 2004
1472004
A practical approach to classify evolving data streams: Training with limited amount of labeled data
MM Masud, J Gao, L Khan, J Han, B Thuraisingham
2008 Eighth IEEE International Conference on Data Mining, 929-934, 2008
1442008
Secure knowledge management: confidentiality, trust, and privacy
E Bertino, LR Khan, R Sandhu, B Thuraisingham
IEEE Transactions on systems, man, and cybernetics-Part A: Systems and …, 2006
1402006
Storage and retrieval of large rdf graph using hadoop and mapreduce
MF Husain, P Doshi, L Khan, B Thuraisingham
IEEE International Conference on Cloud Computing, 680-686, 2009
1352009
Secure database systems
E Ferrari, B Thuraisingham
Advanced databases: technology and design. Artech House 285, 2000
1352000
Semantic web-based social network access control
B Carminati, E Ferrari, R Heatherly, M Kantarcioglu, B Thuraisingham
computers & security 30 (2-3), 108-115, 2011
1232011
The system can't perform the operation now. Try again later.
Articles 1–20