A new intrusion detection system using support vector machines and hierarchical clustering L Khan, M Awad, B Thuraisingham The VLDB journal 16 (4), 507-521, 2007 | 467 | 2007 |
Privacy preservation in wireless sensor networks: A state-of-the-art survey N Li, N Zhang, SK Das, B Thuraisingham Ad Hoc Networks 7 (8), 1501-1514, 2009 | 384 | 2009 |
Classification and novel class detection in concept-drifting data streams under time constraints M Masud, J Gao, L Khan, J Han, BM Thuraisingham IEEE Transactions on Knowledge and Data Engineering 23 (6), 859-874, 2010 | 382 | 2010 |
Security issues for cloud computing K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010 | 296 | 2010 |
ROWLBAC: representing role based access control in OWL T Finin, A Joshi, L Kagal, J Niu, R Sandhu, W Winsborough, ... Proceedings of the 13th ACM symposium on Access control models and …, 2008 | 295 | 2008 |
Inferring private information using social network data J Lindamood, R Heatherly, M Kantarcioglu, B Thuraisingham Proceedings of the 18th international conference on World wide web, 1145-1146, 2009 | 287 | 2009 |
Heuristics-based query processing for large RDF graphs using cloud computing M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011 | 252 | 2011 |
Data mining: technologies, techniques, tools, and trends B Thuraisingham CRC press, 1998 | 245 | 1998 |
A semantic web based framework for social network access control B Carminati, E Ferrari, R Heatherly, M Kantarcioglu, B Thuraisingham Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 214 | 2009 |
Preventing private information inference attacks on social networks R Heatherly, M Kantarcioglu, B Thuraisingham IEEE Transactions on Knowledge and Data Engineering 25 (8), 1849-1862, 2012 | 203 | 2012 |
Knowledge management: Classic and contemporary works D Morey, MT Maybury, BM Thuraisingham MIT Press, 2002 | 195 | 2002 |
Eksploracja danych DJ Hand, H Mannila, P Smyth Wydawnictwa Naukowo-Techniczne, 2005 | 185 | 2005 |
Selective and authentic third-party distribution of XML documents E Bertino, B Carminati, E Ferrari, B Thuraisingham, A Gupta IEEE Transactions on Knowledge and Data Engineering 16 (10), 1263-1278, 2004 | 174 | 2004 |
A practical approach to classify evolving data streams: Training with limited amount of labeled data MM Masud, J Gao, L Khan, J Han, B Thuraisingham 2008 Eighth IEEE International Conference on Data Mining, 929-934, 2008 | 173 | 2008 |
Storage and retrieval of large rdf graph using hadoop and mapreduce MF Husain, P Doshi, L Khan, B Thuraisingham IEEE International Conference on Cloud Computing, 680-686, 2009 | 164 | 2009 |
Secure knowledge management: confidentiality, trust, and privacy E Bertino, LR Khan, R Sandhu, B Thuraisingham IEEE Transactions on systems, man, and cybernetics-Part A: Systems and …, 2006 | 162 | 2006 |
Design of LDV: A multilevel secure relational database management system PD Stachour, B Thuraisingham IEEE Transactions on Knowledge and Data Engineering 2 (2), 190-209, 1990 | 160 | 1990 |
Apparatus for design of a multilevel secure database management system based on a multilevel logic programming system BM Thuraisingham US Patent 5,481,700, 1996 | 157 | 1996 |
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry M Qiu, K Gai, B Thuraisingham, L Tao, H Zhao Future Generation Computer Systems 80, 421-429, 2018 | 156 | 2018 |
Semantic web-based social network access control B Carminati, E Ferrari, R Heatherly, M Kantarcioglu, B Thuraisingham computers & security 30 (2-3), 108-115, 2011 | 145 | 2011 |