Research, Projects and Topics for Theseses (MSc or PhD) Presented by Prof. Ehud Gudes.

Slides:



Advertisements
Similar presentations
Data Mining: Potentials and Challenges Rakesh Agrawal & Jeff Ullman.
Advertisements

NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
System Implementation: Does it help or hinder research? Anthony K. H. Tung National University of Singapore
Introduction to Digital NOTAM
PRIVACY AND SECURITY ISSUES IN DATA MINING P.h.D. Candidate: Anna Monreale Supervisors Prof. Dino Pedreschi Dott.ssa Fosca Giannotti University of Pisa.
Research Areas S. E. Shimony Artificial intelligence and applications. Probabilistic reasoning. Knowledge discovery and data-mining. Meta-reasoning ( “
Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory Secure Communication and Computer Systems Computer.
Accounting Information Systems Chapter Outlines
Research on Intelligent Information Systems Himanshu Gupta Michael Kifer Annie Liu C.R. Ramakrishnan I.V. Ramakrishnan Amanda Stent David Warren Anita.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
1 Towards an end-to-end architecture for handling sensitive data Hector Garcia-Molina Rajeev Motwani and students.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Ling Liu Professor School of Computer Science Georgia Institute of Technology Cloud Computing Research in my group.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Last Words COSC Big Data (frameworks and environments to analyze big datasets) has become a hot topic; it is a mixture of data analysis, data mining,
MAJOR BUSINESS INITIATIVES Gaining Competitive Advantage with IT
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Research and Projects Name: Aloysius. A. EDOH Name: Alo Address: Ext 3344.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Application Provider Visualization Access Analytics Curation Collection.
1 Confidentiality and Trust Management in a Coalition Environment Lecture #11 Dr. Bhavani Thuraisingham February 13, 2008 Data and Applications Security.
SYSTEMS SUPPORT FOR GRAPHICAL LEARNING Ken Birman 1 CS6410 Fall /18/2014.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Tools for Privacy Preserving Distributed Data Mining
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
SWIM-SUIT Information Models & Services
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
METADATA WORKSHOP Conclusions Keith Jeffery Peter Wittenburg.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
Tel Aviv University - Industrial Engineering Department 1 Data Grid In Engineering TOC Grid Overview The PF5 definition: A very high-speed trans-European.
Data Access and Security in Multiple Heterogeneous Databases Afroz Deepti.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
Last Words DM 1. Mining Data Steams / Incremental Data Mining / Mining sensor data (e.g. modify a decision tree assuming that new examples arrive continuously,
Computing Ontology Part II. So far, We have seen the history of the ACM computing classification system – What have you observed? – What topics from CS2013.
E-Commerce Prof. Ir. Kudang B. Seminar, MSc, PhD Direktur Komunikasi & Sistem Informasi IPB Bogor, 12 Nopember 2008.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Transformation Provider Visualization Access Analytics Curation Collection.
Research Interests Andrew Rau-Chaplin
Mining real world data Web data. World Wide Web Hypertext documents –Text –Links Web –billions of documents –authored by millions of diverse people –edited.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Integrating Structured & Unstructured Data. Goals  Identify some applications that have crucial requirement for integration of unstructured and structured.
Sovereign Information Sharing, Searching and Mining Rakesh Agrawal IBM Almaden Research Center.
Lecturer : Assoc. Prof. Dang Tran Khah Presenter: Tran Thach Lam 1.
Department of Computer Science and Automation Indian Institute of Science, Bangalore, India. CSA Research Areas Theoretical Computer Science.
Dr. Bhavani Thuraisingham January 14, 2011 Building Trustworthy Semantic Webs Lecture #1: Introduction to Trustworthy Semantic Web.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
CS570: Data Mining Spring 2010, TT 1 – 2:15pm Li Xiong.
1 Project Implementation Reasonable sophistication Up to 3 people maximum Survey/Analysis type paper Comparative/tradeoff studies Current trends, challenges,
Information Literacy: Web Resources Do you have APA guidelines? How do I cite a blog? Can I start a sentence with "So, I told her to..."?.
Pengantar Sistem Informasi
Data and Applications Security
Of Mice and Men The Future of Healthcare AI Roy Smythe, MD
DB/IR Research at Stony Brook
Latihan Answer the following questions using the relational schema from the Exercises at the end of Chapter 3: Create the Hotel table using the integrity.
Data and Applications Security
ICDIS 2018 Intelligence and Security
What is IR? In the 70’s and 80’s, much of the research focused on document retrieval In 90’s TREC reinforced the view that IR = document retrieval Document.
COSC 6340 Projects & Homeworks Spring 2002
Topics Covered in COSC 6340 Data models (ER, Relational, XML (short))
Team Project, Part II NOMO Auto, Part II IST 210 Section 4
Topics Covered in COSC 6340 Data models (ER, Relational, XML)
Review for Final Exam CSE462 B.Ramamurthy.
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
Definition Of Computer Security
Data and Applications Security
Presentation transcript:

Research, Projects and Topics for Theseses (MSc or PhD) Presented by Prof. Ehud Gudes

3/18/20162 Research Databases I have worked in various area of databases including physical design and indexing, concurrency control, schema integration and query evaluation, Current research focuses on XML. Data mining (a databases/AI sub-area) I have worked on association rules mining, on temporal association rules and on XML and Graph mining. Current research focuses on graph mining and sequence mining. Data Security My work concentrates mainly on authorization models for databases, workflow and RBAC systems. Recent work includes information flow models and database encryption, using data mining for Intrusion detection, and Trust & Reputation in virtual communities General AI (Artificial Intelligence) I am also interested in other areas of AI beside data mining such as Constraints satisfaction and Knowledge-based systems

3/18/20163 Funded Projects IMG4 – a magnet project involving Chip testing companies like: Nova, AMAT, KLA, etc. My role is Data mining for improving the SETUP automation process and an Ontology building project DT: EDARE - A very large research grant on network security for a large telecommunication company for identifying new Malware DT: AAA/TRIC – a very large project managed by me for providing Trust & Reputation, and in particular Cross- community reputation in virtual communities DT: A new database security project. One of the topic is Role mining

3/18/20164 Current and future topics for theses XML/Graph mining and Indexing K-anonymization and Privacy preserving data mining Database encryption and Access control Temporal and Sequence data mining Models for Trust and Reputation Non relational databases Role mining

3/18/20165 Example – Sanitized and privacy preserving distributed frequent pattern mining Several papers exist on privacy preserving association rules mining in distributed environments (horizontal and vertical) New research on Sanitized distributed association rules New research on frequent patterns such as: textual, sequences