CFIA page | Affiliated Faculty Members | Non-CS courses with Information Assurance Components | Related links

    Peer Reviewed Publications (journals, conference proceedings) related to Information Assurance Within the Past 3 Years

    • B. Rivera, O. Kosheleva, "How to Predict the Number of Vulnerabilities in a Software System: A Theoretical Justification for an Empirical Formula", Journal of Uncertain Systems, 2015, Vol. 9, to appear.

    • B. Rivera, I. Gallegos, V. Kreinovich, "How to Assign Weights to Different Factors in Vulnerability Analysis: Towards a Justification of a Heuristic Technique", Mathematical Structures and Modelling, 2014, Vol. 30, pp. 87-98.pdf file

    • B. Rivera, *F. Zapata, V. Kreinovich, "From Numerical Probabilities to Linguistic Probabilities: A Theoretical Justification of Empirical Granules Used in Risk Management", Applied Mathematical Sciences, 2014, Vol. 8, No. 144, pp. 7195-7200. pdf file

    • J. Lorkowski, V. Kreinovich, "How to Gauge Unknown Unknowns: A Possible Theoretical Explanation of the Usual Safety Factor of 2", Mathematical Structures and Modeling, 2014, Vol. 32, pp. 49-52. pdf file

    • V. Kreinovich, H.T. Nguyen, S. Sriboonchitta, "Log-Periodic Power Law as a Predictor of Catastrophic Events: A New Mathematical Justification", Proceedings of the International Conference on Risk Analysis in Meteorological Disasters RAMD'2014, Nanjing, China, October 12-13, 2014. pdf file

    • G. Xiang, J. O'Rawe, V. Kreinovich, J. Hajagos, S. Ferson, "Protecting patient privacy while preserving medical information for research", Proceedings of the 6th International Workshop on Reliable Engineering Computing REC'2014, Chicago, Illinois, May 25-28, 2014, pp. 281-293. pdf file

    • J. Day, *A. Jalal-Kamali, V. Kreinovich, "Computing Covariance and Correlation in Optimally Privacy-Protected Statistical Databases: Feasible Algorithms", Proceedings of 3rd World Conference on Soft Computing, San Antonio, December 15-18, 2013, pp. 373-382.

    • A. Jalal-Kamali, V. Kreinovich, "Estimating Third Central Moment C3 for Privacy Case under Interval and Fuzzy Uncertainty", Proceedings of the Joint World Congress of the International Fuzzy Systems Association and Annual Conference of the North American Fuzzy Information Processing Society IFSA/NAFIPS'2013, Edmonton, Canada, June 24-28, 2013, pp. 454-459.

    • F. Zapata, R. Pineda, M. Ceberio, "How to Generate Worst-Case Scenarios When Testing Already Deployed Systems Against Unexpected Situations", Proceedings of the Joint World Congress of the International Fuzzy Systems Association and Annual Conference of the North American Fuzzy Information Processing Society IFSA/NAFIPS'2013, Edmonton, Canada, June 24-28, 2013, pp. 617-622.

    • G. Xiang, S. Ferson, L. Ginzburg, L. Longpr\'e, *E. Mayorga, O. Kosheleva, "Data Anonymization that Leads to the Most Accurate Estimates of Statistical Characteristics: Fuzzy-Motivated Approach", Proceedings of the Joint World Congress of the International Fuzzy Systems Association and Annual Conference of the North American Fuzzy Information Processing Society IFSA/NAFIPS'2013, Edmonton, Canada, June 24-28, 2013, pp. 611-616.pdf file

    • Kiekintveld, *Md.T. Islam, V. Kreinovich, "Security Game with Interval Uncertainty", In: T. Ito, C. Jonker, M. Gini, O. Shehory (eds.), Proceedings of The Twelfth International Conference on Autonomous Agents and Multiagent Systems AAMAS'2013, Saint Paul, Minnesota, May 6-10, 2013, pp. 231-238. pdf file

    • V. Kreinovich, *C. Jacob, D. Dubois, J. Cardoso, M. Ceberio, "Failure Analysis of a Complex System Based on Partial Information about Subsystems, with Potential Applications to Aircraft Maintenance", Applied and Computational Mathematics, 2012, Vol. 11, No. 2, pp. 165-179.

    • V. Kreinovich, *N. Buntao, O. Kosheleva, "Optimizing Computer Representation and Computer Processing of Epistemic Uncertainty for Risk-Informed Decision Making: Finances etc.", Proceedings of the International Conference on Probabilistic Safety Assessment and Management / European Safety and Reliability PSAM'11/ESREL'12, Helsinki, Finland, June 25-29, 2012.

    • C. Kiekintveld, V. Kreinovich, "Efficient approximation for security games with interval uncertainty", Proceedings of the AAAI Spring Symposium on Game Theory for Security, Sustainability, and Health GTSSH'2012, Stanford, March 26-28, 2012.

    • L. Bradel, J. Z. Self, A. Endert, M. S. Hossain, C. North, N. Ramakrishnan. How Analysts Cognitively "Connect the Dots". IEEE Intelligence and Security Informatics Conference (ISI'13), Pages: 24-26, 2013.

    • M. S. Hossain, P. Butler, A. P. Boedihardjo, and N. Ramakrishnan. Storytelling in Entity Networks to Support Intelligence Analysts. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'12), Pages: 1375-1383, 2012.

    • H. Wu, M. Mampaey, N. Tatti, J. Vreeken, M. S. Hossain, and N. Ramakrishnan. Where Do I Start? Algorithmic Strategies to Guide Intelligence Analysts. ACM SIGKDD Workshop on Intelligence and Security Informatics (ISI-KDD 2012), Pages: 3:1-3:8, 2012.

    • M. S. Hossain, C. Andrews, N. Ramakrishnan, and C. North. Helping Intelligence Analysts Make Connections. AAAI'11, Workshop on Scalable Integration of Analytics and Visualization (WS-11-17), Pages: 22-31, 2011.

    • C. Andrews, M. S. Hossain, S. Gad, N. Ramakrishnan, and C. North. Analyst's Workspace: Protecting Vastopolis - VAST 2011 mini-challenge 3 award: Novel Use of Large Screen Workspace to Support Analysis. IEEE Symposium on Visual Analytics Science and Technology (VAST'11), 2011.

    Published Books or Chapters Within the Past 5 Years

    • V.-N. Huynh, V. Kreinovich, S. Sriboonchitta, K. Suriya (eds.), Econometrics of Risk, Springer Verlag, Berlin, Heidelberg, 2015.

    • A. Jalal-Kamali, M.S. Hossain, V. Kreinovich, "How to Understand Connections Based on Big Data: From Cliques to Flexible Granules", In: S.-M. Chen, W. Pedrycz (eds.), Information Granularity, Big Data, and Computational Intelligence, Springer Verlag, Cham, Switzerland, 2015, pp. 63-87.

    • H.T. Nguyen, V. Kreinovich, B. Wu, *G. Xiang, Computing Statistics under Interval and Fuzzy Uncertainty, Springer Verlag, Berlin, Heidelberg, 2012.

    • V. Kreinovich, *C. Jacob, D. Dubois, J. Cardoso, M. Ceberio, I. Batyrshin, "Estimating Probability of Failure of a Complex System Based on Inexact Information about Subsystems and Components, with Potential Applications to Aircraft Maintenance", In: I. Batyrshin, G. Sidorov (eds.), Springer Lecture Notes in Artificial Intelligence, Vol. 7905, pp. 70-81. pdf file

    Relevant Grants Within the Past 3 Years

    • 9/1/12-8/31/17, "CREST Phase II -- Cyber-ShARE Center of Excellence: A center for sharing cyberresources to advance science and education", Grant No. HRD-1242122 from the National Science Foundation, Ann Gates (PI), Deana Pennington, Craig E. Tweedie, Aaron Velasco, Natalia Villanueva-Rosales (co-PIs). Award amount: $4,999,439.

    Relevant Students' Thesis and Dissertation

    • Nicholas Sun, Sheikh Motahar Naim, Mahmud Shahriar Hossain, Vladik Kreinovich. Finding More Effective Algorithms for Connecting the Dots Between Entities in Intelligence Analysis. Homeland Security Summer Scholars Academy Research Poster Presentation. Summer 2014. (received best presentation award.)

    • Sheikh Motahar Naim is a Computer Science PhD student at UTEP. Nicholas Sun is an undergraduate student from Rutgers University who participated in UTEP's National Center for Border Security & Immigration Summer Program. Their poster received the best presentation award in Summer 2014.

    • Md Towhidul Islam, "Security Games with Interval Uncertainty." Master's Thesis, June 2013.

    • Eric Gutierrez, "A Visualization and Simulation Tool That Will Generate Effective Patrolling Strategies to Protect the U.S. Borders from Illegal Intrusion Using Game Theoretic Methods and Models." Master's Thesis, May 2014.

    • Jorge Cabrera, "Password Protection based on Flicker", Master's project.