· Y. Xie, J. Fisher, V.V. Raghavan, T. Johnsten, and C. Akkoc. “Granular Approach for Protein Sequence Analysis”. 2012 Joint Rough Set Symposium, Chengdu, China, 2012.
· D.E. Difallah, R. Benton, V.V. Raghavan, and T. Johnsten. “FAARM: Frequent association action rules mining using FP-Tree”. Workshop on Domain Driven Data Mining in conjunction with ICDM 2011, Vancouver, Canada, 2011.
· R. Singh, T. Johnsten, Y. Xie, and V.V. Raghavan. “Algorithms for Discovering Potentially Interesting Patterns”. International Journal of Granular Computing, Rough Sets and Intelligent Systems, (To appear).
· Pardue, H., Patidar, P., Landry, J., Johnsten, T., and Campbell, M., “A Threat Tree for Health Information Security and Privacy,” Americas Conference on Information Systems (AMCIS 2011), Detroit, MI (Accepted).
· C. Akkoc, T. Johnsten, and R. Benton. “Multi-layered Vector Spaces Model for Classifying and Analyzing Biological Sequences”. 3rd International Conference on Bio-informatics and Computational Biology, New Orleans, LA, 2011.
· R. Singh, T. Johnsten, Y. Xie, and V.V. Raghavan. “Efficient Algorithm for Discovering Potential Interesting Patterns with Closed Itemsets”. IEEE International Conference on Granular Computing, San Jose, CA, 2010.
· R. Singh, T. Johnsten, Y. Xie, and V.V. Raghavan. “An efficient algorithm for discovering positive and negative Patterns”. IEEE International Conference on Granular Computing, Nanchang, China, 2009.
· Y. Zhou, T. Johnsten, and D. Snow. “Combating spam over internet telephony through content filtering”. Int. Workshop on Defense against Spam in Electronic Communication, Linz, Austria, 2009.
· Y. Zhou, T. Johnsten, and D. Snow. “Combating Voice Spam Through Content Filtering”. A white paper submitted for AFRL BAA-08-08-RIKA, 2009
· Y. Xie, T. Johnsten, V.V. Raghavan, and Jayasimha Katukuri. “Examining Granular Computing from a Modeling Perspective”. NAFIPS, New York, New York, 2008.
· Y. Xie, T. Johnsten, M. Nagarajan, K. Ramachandran, V.V. Raghavan, “On Discovering “Novel, Potentially Useful” Patterns from Databases,” IEEE International Conference on Granular Computing, Atlanta, Georgia, 2006.
· Y. Zhou and T. Johnsten, “Protecting Privacy in Person-Specific Data Using Decision Trees,” International Workshop on Privacy and Security Issues in Data Mining in conjunction with the 8th PKDD Conference, Pisa, Italy, September 20, 2004.
·
Y. Xie, T. Johnsten and V.V. Raghavan, “Knowledge
Hiding in Databases for Concept-based Data Mining Algorithms,” Proceedings
of WISICT-2004 Workshop on Security Procedures Effects on Network Communication,
· T. Johnsten and V. Raghavan, “A Methodology for Hiding Knowledge in Databases,” IEEE International Conference on Data Mining (Workshop on Privacy, Security and Data Mining), Maebashi City, Japan, December 2002.
· T. Johnsten and V. Raghavan, “Knowledge Hiding in Databases and Its Relationship to KDD,” SCI-2002, Orlando, FL, July 2002.
· T. Johnsten, V. Raghavan and K. Hill, “The Security Assessment of Association Mining Algorithms,” Sixteenth Annual IFIP WG 11.3 Conference on Data and Application Security, King’s College, University of Cambridge, July 2002.
·
T. Johnsten and V. Raghavan, “Security Procedures
for Classification Mining Algorithms,” Fifteenth Annual IFIP WG 11.3 Conference on Data and Application
Security,
·
T. Johnsten and V. Raghavan, "Impact of
Decision-Region Based Classification Mining Algorithms on Database Security,"
Thirteenth Annual IFIP WG 11.3 Conference
on Data and Application Security,
·
F. Lu, T. Johnsten, V. Raghavan, D. Traylor,
"Enhancing Internet Search Engines to Achieve Concept-Based Retrieval,"
InForum 99,
·
H. Sever, V. Raghavan and T. Johnsten. "The
Status of Research on Rough Sets for Knowledge Discovery in Databases," In
Proc. of ICNPAA98- Second Int’l Conf. On
Nonlinear Problems in Aviation and Aerospace,