Bhavani Thuraisingham

Louis A. Beecherl Jr. Distinguished Professor
Professor of Computer Science
Executive Director of the Cyber Security Research and Education Institute
Tags: Security Computer Science

Professional Preparation

D. Eng. - Computer Science
University of Bristol, UK - 2011
Ph.D. - Mathematics (in the area of Theory of Computation and Computability Theory)
University of Wales, Swansea, UK - 1979
M.Sc - Mathematical Logic and Foundations of Computer Science;
University of Bristol, UK - 1977
B.S. - Pure Mathematics, Applied Mathematics, and Physics
University of Ceylon - 1975

Research Areas

Research Interests
  • Assured Information Sharing
  • Secure Geospatial Data Management 
  • Surveillance/Biometrics 
  • Cyber Security
  • Privacy
  • Data Mining for Counter-terrorism

Publications

Federated Query Processing Using Ontology Structure and Ranking, To appear in IEEE Transactions on Service Computing, 2012 (co-authors: Neda Alipanah, Latifur Khan). 2012 - Publication
The Continued War on Terrorism - How to Maintain Long-range Deterrence Against Terrorism, To appear in Journal of Policing, Intelligence and Counter Terrorism, October 2012. (co-author: Jan Kallberg). 2012 - Publication
Cyberphysical Systems Security Applied to Telesurgical Robotics, Computer Standards & Interfaces, Vol. 34, No. 1, p. 225-229, January 2012 (co-author: Gregory S. Lee). 2012 - Publication
Data Security Services, Solutions and Standards for Outsourcing, To appear in Computer Standards and Interfaces Journal, 2012 (co-author: K. Hamlen). 2012 - Publication
Security-aware Service Composition with Fine-grained Access and Information Flow Control, To appear in IEEE Transactions on Services Computing, 2012 (co-authors: W. She et al). 2012 - Publication
Database Inference Controller for 3D Motion Capture Database, To appear in Journal of Information Security and Privacy, 2012 (co-author: R. Natarajan et al). 2012 - Publication
Effective Software Fault Localization using an RBF Neural Network, To appear in IEEE Transactions on Reliability , 2012 (co-authors: W. E. Wong, V. Debroy, R. Golden, X. Xu).  2012 - Publication
Secure Semantic Computing, To appear in the Semantic Computing Journal 2012 (co-author: K. Hamlen). 2012 - Publication
Malware Detection in the Cloud, To appear in ACM Transactions on Management Information Systems, 2012 (co-author: M. Masud et al). 2012 - Publication
Bin-Carver: Automatic Recovery of Binary Executable Files, To appear in the Journal of Digital Investigation (Special issue of the digital forensics research workshop), 2012 (co-authors: Z. Lin et al). 2012 - Publication

Projects

Data and Applications Security
2018–2018 Texas Enterprise Research Funds 2004-20082004 2008; part of technology funds awarded to UTDallas by Texas Instruments and Texas state government
Data and Applications Security Workshop
2018–2018 The National Science Foundation, 2007-2008 (PI)
A Semantic Framework for Policy Specification and Enforcement
2018–2018 The National Science Foundation, 2007-2009 (PI)Response to Program Solicitation: 07-500Collaboration with UMBC and UTSA
Identity Assurance
2018–2018 Unisys Corporation Center for Ethical Information Assurance, 2007-2008 (PI)One of 5 universities chosen
System Integrity Control
2018–2018 Air Force Office of Scientific Research 2006-2009 (Co-PI)Response to BAA: Air Force Office of Scientific Research BAA 2006-Subcontract from Purdue UniversityPI: M. Kantarcioglu

Additional Information

Professional Training
  • Cybil Programming through Control Data Institute 84,
  • The Intelligence Community, AFCEA 94.
  • Mid Management Development Program - 7 month course offered through the MITRE Institute; Apr. 97
  • Certificate in Java Programming, at Learning Tree International ('Sept 98-' July 00; 5 courses; 15 credits)
  • Program Director Training, National Science Foundation, March 2002
  • Executive leadership certificate, UTD Management School, 2006-2008
  • Certificate in Criminology, Planned at University of Texas at Dallas, 08-09 (15 credit hours)
  • Professional development: Readings on Terrorism and understanding terrorists
Fellow of three professional organizations: IEEE (Institute for Electrical and Electronics Engineers), AAAS (American Association for the Advancement of Science) and BCS (British Computer Society) for her work in data security
Research Funding

Air Force office of Scientific Research 2005 - 2008 (PI)
Topic: Information Operations Across Infospheres: Assured Information Sharing
Response to BAA: Air Force Office of Scientific Research BAA 2005-I
Subcontract to UTSA
Amount: 300K

CH2MHILL 2005-2007 - Co-PI
Topic: Geospatial Data Management Equipment Grant
PI. D. Harris
Amount: 50K

Raytheon Corporation 2006-2009 (PI)
Topic: Geospatial semantic web research, data mining and security
Raytheon University Research Program
Amount: 400K

Raytheon Corporation 2007-2008 (co-PI)
Topic: Geospatial semantic web development for security applications
PI: L. Khan
Amount: 100K

Air Force Office of Scientific Research 2006-2009 (Co-PI)
Topic: System Integrity Control       
Response to BAA: Air Force Office of Scientific Research BAA 2006-I
Subcontract from Purdue University
PI: M. Kantarcioglu
Amount: 150K

The National Science Foundation, 2007-2009 (PI)
Topic: A Semantic Framework for Policy Specification and Enforcement
Response to Program Solicitation: 07-500
Collaboration with UMBC and UTSA
Amount: 590K

The National Science Foundation, 2007-2008 (PI)
Topic: Data and Applications Security Workshop
Amount: 50K
 
National Geospatial Intelligence Agency 2007-2010 (Co-PI)
Topic: Geospatial data mining for crime analysis
Response to Program Solicitation NURI-007
Subcontract from U. of MN
Amount: 150K

National Aeronautic Space Administration: 2008-2010 (Co-PI)
Topic: Data Mining of Fault reports
Response to NASA BAA
Subcontract from University of Illinois, Urbana Champaign
PI: L. Khan
Amount: 360K

Department of Defense, 2008-2011 (PI)
Topic: Assured Information Sharing 2008-2013
Multiuniversity research initiative funded by the DoD/AFOSR
Response to MURI 2007 BAA
Subcontract from UMBC
Amount: $1.0m

Department of Defense, 2008-2011 (PI)
Topic: Secure Grid Information Management (PI), 2008-2011
Multiuniversity research initiative funded by the DoD
Subcontract to the University of Texas at Arlington and Purdue University
Amount: $2.2m

Intelligence Community Advanced Research Projects Agency, 2008-2011
Topic: Novel Semantic Framework for Knowledge Discovery and Disseminatioon (PI)
Response to KDD BAA
Amount: 550K
 
Department of Defense, 2009-2013
Topic: Secure Sensor Semantic Web (PI)
Subcontracts to UTA, Purdue, Collin County-TX
Amount: $1.5m

National Science Foundation, 2009
Topic: Intelligence and Security Informatics (Students Scholarships)
Amount: $10K

Texas Enterprise Research Funds for research in Data and Applications Security 2004-2008; part of technology funds awarded to UTDallas by Texas Instruments and Texas state government 

News Articles

Prof Gives Keynote Speech on Data Mining and Privacy
Dr. Bhavani Thuraisingham, a UT Dallas professor of computer science, delivered a keynote address titled “Privacy, Security and Trust for Data Mining” at an international conference on knowledge discovery and data mining in Las Vegas on Aug. 24. “Ever since the explosion of data-mining techniques for counter-terrorism, there have been major concerns about privacy,” she said. “Together with UT Dallas computer science professors Murat Kantarcioglu and Latifur Khan and our students, we’ve been developing data-mining techniques for surveillance and social networking,” she said. “But at the same time, we’ve also been exploring the privacy aspects.”
Cybersecurity Institute Director Honored for Lasting Research Work
Dr. Bhavani Thuraisingham, the Louis A. Beecherl Jr. Distinguished Professor of Computer Science at UT Dallas, is the inaugural recipient of the CODASPY Award for Outstanding Research on Data Security and Privacy.

The award was presented at the Association of Computing Machinery’s Conference on Data and Applications Security and Privacy (CODASPY).
The award recognizes Thuraisingham’s innovative and lasting research contributions, which have spanned over three decades at Honeywell, MITRE, the National Science Foundation (NSF) and UT Dallas. The award citation notes her work on multilevel secure databases (1980s), the inference problem (1990s), assured information sharing (2000s) and secure data management on the cloud (2010s).
Computer Scientist Receives Prestigious Degree From University of Bristol
Computer science professor Bhavani Thuraisingham recently received the higher doctorate degree of doctor of engineering from her alma mater, Britain's University of Bristol. 

The degree recognizes Thuraisingham's large body of influential published research in the field of secure data management over the past 25 years.

"Higher doctorates are a higher tier of research doctorates which may be awarded on the basis of a formally submitted substantial body of published original research of a very high standard  or on an honorary basis...when a university wishes to formally recognize an individual's achievements and contributions to a particular field," according to university regulations.
Cybersecurity Expert Wins IBM Award as Course Collaboration Begins
Dr. Bhavani Thuraisingham, executive director of the Cyber Security Research and Education Institute (CSI) at UT Dallas, is a recipient of a 2013 IBM Faculty Award in Cyber Security.

The award, initiated by an IBM employee, is given to researchers at leading global universities who have outstanding reputations for contributions to the field.
“We consider this another excellent milestone in the ever-growing relationship between IBM and The University of Texas at Dallas,” said Marisa Viveros, vice president for Cyber Security Innovation at IBM. “It is truly a pleasure to work with a group of such dedicated and outstanding academic leaders.”
Investment in Cloud Computing Research Pays Off
The decision three years ago by UT Dallas researchers to bolster their efforts in the field of cloud computing is paying dividends: Not only do they now have $5 million in cloud-related research, but their graduate students find they have their choice of internships and job offers.

Indeed, two recent PhD graduates have been hired by leading corporate players in the field, Amazon.com and IBM’s T.J. Watson Research Center.

Cloud computing is a model for providing on-demand Internet-based access to a shared pool of computing resources, including networks, storage and applications. It’s meant to make it as simple to obtain an array of electronic data resources as it is to get electricity itself.