Dr. Kevin Hamlen Cyber Security
- Kevin W. Hamlen and Micah Jones. Aspect-Oriented In-lined Reference Monitors. In Proceedings of the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS), June 2008.
- Micah Jones and Kevin W. Hamlen. Enforcing IRM Security Policies: Two Case Studies. In Proceedings of the IEEE Intelligence and Security Informatics (ISI) Conference, June 2009.
- Micah Jones and Kevin W. Hamlen. Disambiguating Aspect-oriented Security Policies. In Proceedings of the 9th International Conference on Aspect-Oriented Software Development (AOSD), 193-204, March 2010.
- Aditi Patwardhan, Kevin W. Hamlen, and Kendra Cooper. Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors. In Proceedings of the International Workshop on Visual Languages and Computing (VLC), October 2010.
- Micah Jones and Kevin W. Hamlen. A Service-oriented Approach to Mobile Code Security. In Proceedings of the 8th International Conference on Mobile Web Information Systems (MobiWIS), 531-538, September 2011.
- Kevin W. Hamlen, Micah M. Jones, and Meera Sridhar. Chekov: Aspect-oriented Runtime Monitor Certification via Model-checking. Technical Report UTDCS-16-11, Computer Science Department, The University of Texas at Dallas, Richardson, Texas, May 2011.
Dr. Bhavani Thuraisingham Cyber Security
Journal Papers
Conference Papers
Technical Reports
Dr. Latifur Khan Data Security
-
Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints Mohammad M. Masud, JingGao, Latifur Khan, Jiawei Han, and Bhavani Thuraisingham, IEEE Transactions on Knowledge & Data Engineering (TKDE), 2011, IEEE Computer Society, June 2011, Vol. 23, No. 6, Page 859-874. (Full paper). (Impact Factor: 2.285)
-
Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing Mohammad Husain, Mohammad Mehedy Masud, James McGlothlin, and Latifur Khan IEEE Transactions on Knowledge & Data Engineering (TKDE), 2011, IEEE Computer Society, September 2011, Vol. 23, No. 9, Page 1312-1327. (Full paper). (Impact Factor: 2.285)
-
Optmized ontology-driven query expansion using map-reduce framework to facilitate federated queries Neda Alipanah, Latifur Khan, Bjavani Thurisingham Comput. Syst. Sci. Eng. 27(2): (2012)
-
Multimodal concept fusion using semantic closeness for image concept disambiguation. Multimedia Tools Appl Ahmad Adel Abu Shareha, Mandava Rajeswari, Latifur Khan, Dhanesh Ramachandram. 61(1): 69-86 (2012)
-
Cloud-based Malware Detection for Evolving Data Streams Tahseen Al-Khateeb, Mohammad Mehedy Masud, Kevin Hamlen, Latifur Khan, Jing Gao, Jiawei Han and Bhavani Thuraisingham ACM Transactions on Management Information Systems, Vol. 2, No. 3, Page 16-1-27. (Invited Paper)
-
Geographically-Typed Semantic Schema Matching Jeffrey Partyka, P. Parveen, Latifur Khan, Bhavani Thuraisingham, Shashi Shekhar Web Semantics Journal: Science, Services and Agents on the World Wide Web, Elsevier, Vol. 9, No 1, March 2011, Pages 52-70. (Full paper) (Impact Factor is 3.412).
-
Geospatial Resource Description Framework (GRDF) and security constructs Ashraful Alam, Latifur Khan, Bhavani Thuraisingham Computer Standards & Interfaces Vol. 33, No. 1, Page: 35-41 (2011). (Full paper) (Impact Factor: 1.373)
-
Ontology based policy interoperability in geo-spatial domain Mohammad Farhan Husain, Tahseen Al-Khateeb, Mohmmad Alam, Latifur Khan Computer Standards & Interfaces Vol. 33, No. 1, Page: 214-219 (2011). (Full paper) (Impact Factor: 1.373)
-
Weakly Supervised Caused Identification from Aviation Safety Reports via Semantic Lexicon Construction Muhammad Abedin, Vincent Ng and Latifur Khan Journal of Artificial Intelligence Research (JAIR) by AAAI press, Vol. 38 (2010) Page 569-631. (Full paper)
-
Objective Risk Evaluation for Automated Security Management Mohammad Salim Ahmed, Ehab Al Shaer and Latifur Khan Journal of Network and Systems Management, Special Issue on Security Management, Springer. Journal of Network and Systems Management (JNSM), Springer New York, ISSN 1064-7570, pp. 1-24, 2010. (Full Paper) (Impact Factor: 1.356)
-
Secure Data Objects Replication in Data Grids Manghui Tu, Peng Li, I-Ling Yen, Bhavani Thuraisingham, and Latifur Khan IEEE Transactions on Dependable and Secure Computing, January-March 2010, Vol. 7 No.1, page 50-64. (Full Paper) (Impact Factor: 2.093)
-
Analysis of Firewall Policy Rules Using Traffic Mining Techniques, Muhammad Abedin, Syeda Nessa, Latifur Khan, Ehab S. Al-Shaer, Mamoun Awad, International Journal of Internet Protocol Technology, Special Issue on: Recent Advances in Network Security Attacks and Defenses, Volume 5, Numbers 1-2, 9 April 2010, pp. 3-22 (20) Inderscience Publishers. (Full paper)
-
Bi-directional Translation of Relational Data into Virtual RDF Stores Sunitha Ramanujam, Vaibhav Khadilkar, Latifur Khan, Steven Seida, Murat Kantarcioglu, Bhavani Thuraisingham International Journal of Semantic Computing (IJSC), World Scientific, Vol. 4, No. 4, Page: 423-457, 2010. (Full Paper)
-
Relationalization of Provenance Data in Complex RDF Reification Nodes, Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida and Bhavani Thuraisingham Electronic Commerce Research Journal - special issue on Trust and Privacy Aspects of Electronic Commerce (Invited Paper), Vol. 10, No. 3-4, Page: 389-421, 2010, Springer Netherlands. (Full paper)
-
Knowledge-based Image Annotation Refinement Yohan Jin, Latifur Khan, and Balakrishnan Prabhakaran Journal of Signal Processing Systems, Springer New York, Volume 58, Number 3 March, 2010, Page:387-406 (Full Paper) (Impact Factor: 0.533)
-
R2D: A Framework for the Relational Transformation of RDF Data Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida and Bhavani Thuraisingham International Journal of Semantic Computing (IJSC), World Scientific Publisher (Special issue) Volume: 3, Issue: 4 (2009) pp. 471-498, DOI: 10.1142/S1793351X09000884. (Full paper)
-
Exploiting an antivirus interface Kevin W. Hamlen, Vishwath Mohan, Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Computer Standards & Interfaces, Vol. 31 No. 6, Page: 1182-1189 (2009) (Full Paper), (Impact factor: 1.373)