Download presentation
Presentation is loading. Please wait.
Published byConstance O’Connor’ Modified over 9 years ago
1
Economic Development for the DFW Metroplex Related to Security: An Academic Perspective Dr. Bhavani Thuraisingham The University of Texas at Dallas December 2006
2
2 10/19/2015 01:02 Contact Information 0 Dr. Bhavani Thuraisingham Professor of Computer Science and Director of Cyber Security Research Center The University of Texas at Dallas Richardson, TX 75083 Phone: 972-883-4738 Fax: 972-883-2349 bhavani.thuraisingham@utdallas.edu www.utdallas.edu/~bxt043000/
3
3 10/19/2015 01:02 Areas for Economic Development related to Security 0 Border Security -Technologies for protecting the borders will have an impact on the economy 0 Education -Build an educated workforce 0 Inland Port -Technologies for Inland Port to promote trade with China and other countries 0 Why we should not outsource data yet -Serious security and privacy concerns
4
4 10/19/2015 01:02 Border Security 0 We need to monitor the borders and ports to prevent and detect terrorism 0 Our research is focusing on the following topics for national security -Surveillance for suspicious events -Data mining for Counter-terrorism -RFID data management -Cannot forget about PRIVACY
5
5 10/19/2015 01:02 Video Surveillance and Suspicious Event Detection 0 Huge amounts of video data available in the security domain 0 Need for tools to aid human analyst; pointing out areas in video where unusual activity occurs; 0 We have developed a system to detect suspicious events 0 Biometrics for Face detection 0 Investigating Privacy Preserving Surveillance
6
6 10/19/2015 01:02 What is Data Mining? Data Mining Knowledge Mining Knowledge Discovery in Databases Data Archaeology Data Dredging Database Mining Knowledge Extraction Data Pattern Processing Information Harvesting Siftware The process of discovering meaningful new correlations, patterns, and trends by sifting through large amounts of data, often previously unknown, using pattern recognition technologies and statistical and mathematical techniques (Data Mining: Technologies, Techniques, Tools and Trends, CRC Press, 1998 Author: Bhavani Thuraisingham)
7
7 10/19/2015 01:02 Data Mining for Counterterrorism: Non-real-time Analysis 0 Gather data from multiple sources -Information on terrorist attacks: who, what, where, when, how -Personal and business data: place of birth, ethnic origin, religion, education, work history, finances, criminal record, relatives, friends and associates, travel history,... -Unstructured data: newspaper articles, video clips, speeches, emails, phone records,... 0 Integrate the data, build warehouses and federations 0 Develop profiles of terrorists, activities/threats 0 Mine the data to extract patterns of potential terrorists and predict future activities and targets 0 Find the “needle in the haystack” - suspicious needles? 0 Need to maintain PRIVACY -Privacy Preserving Data Mining
8
8 10/19/2015 01:02 RFID Data Management 0 RFID: Radio Frequency Identifier 0 We are developing a data management system to manage the RFID data streams emanating from the tags 0 Query processing in data streams 0 Security and privacy techniques to ensure authorized access and privacy of individuals 0 Digital identity management
9
9 10/19/2015 01:02 Security Education at the University of Texas at Dallas (UTD) 0 We are NSA/DHS Center for Excellence on Information Assurance Education 0 Focus areas include: System security, Data and Applications security, Network security, Secure geospatial data management 0 Strong team also focusing on data mining for national security as well as cyber security 0 Also developing system for Emergency Preparedness 0 Research for NSF, Air Force, EPA, DFW Corporations, and discussing plans with DHS 0 Strong collaboration with Industry through contracts and student worker positions
10
10 10/19/2015 01:02 Technologies for Inland Port Creation 0 Data Mining and Knowledge Management technologies will strengthen DFW position in becoming the major city in USA for trade 0 DFW is the 8 th largest city in US, has one of the nation’s largest hub airport in the heart of the country with easy access to almost every city in US and several countries -We must get the nonstop route to/from Beijing 0 Data mining will help us to determine who our competitors are, what are their strategies, what actions do we need to take? 0 Knowledge management technologies will improve e-business, supply chain management, enterprise resource planning, enterprise security, all critical for trade 0 UTD has strength in both data mining and knowledge management technologies; we are also conducting research on supply chain management and e-business
11
11 10/19/2015 01:02 Outsourcing Data 0 Daily we are hearing about job losses due to outsourcing 0 We need to be very careful when outsourcing our critical data -Accounting data, Income tax data, etc. 0 Maintaining security and privacy for outsourced data is very difficult at present -We are conducting research on querying encrypted data and practical solutions are yet to be developed; need lot more research 0 Even if key attributes are suppressed, Inference Problem may be possible 0 We don’t want our precious and valuable data to go into the wrong hands 0 Tradeoffs between Outsourcing and Security
12
12 10/19/2015 01:02 In Summary 0 Continue with Border security activities with attention to Privacy 0 Education is our strength; promote Math and Science in DFW; encourage people from other states to migrate to DFW for our education; close collaboration with Industry 0 Develop technologies to enable DFW become a major Indoor port for USA and our Trade partners 0 Be careful about outsourcing our data and conduct research on security solutions
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.