Skip to main content
UNT
Network Security Lab (NSL)
Menu
Search form
Search
Search
Call us
Contact Us
UNT Map
Home
News
People
Projects
Publications
Grants
Quicklinks
Back
MyUNT
Blackboard
EagleConnect
University Directory
UNT Map
Jobs at UNT
University of North Texas
Network Security Lab (NSL)
Search form
Search
Search
MyUNT
Blackboard
EagleConnect
UNT Directory
UNT Map
Jobs at UNT
Home
News
People
Projects
Publications
Grants
MyUNT
Blackboard
EagleConnect
UNT Directory
UNT Map
Jobs at UNT
Search form
Search
Search
Home
News
People
Projects
Publications
Grants
Network Security Lab (NSL)
You are here
Home
Publications
Publications
Export 15 results:
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
Author
Title
Type
[
Year
]
Filters:
Keyword
is
Security
[Clear All Filters]
2019
L. Widick
,
Ranasinghe, I.
,
Dantu, R.
, and
Jonnada, S.
,
“
Blockchain Based Authentication and Authorization Framework for Remote Collaboration Systems
”
, in
2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
, 2019.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
Blockchain_Based_Authn_Authz_Framework_Remote_Collab_Sys.pdf
(1.06 MB)
2018
N. Sen
,
Dantu, R.
,
Vempati, J.
, and
Thompson, M.
,
“
Performance Analysis of Elliptic Curves for Real-Time Video Encryption
”
, in
2018 National Cyber Summit (NCS)
, 2018.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
Performance_Analysis_Elliptic_Curves_RealTime_Video_Encryption.pdf
(382.64 KB)
H. Takabi
,
Hashem, Y.
, and
Dantu, R.
,
“
Prediction of human error using eye movements patterns for unintentional insider threat detection
”
, in
2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA)
, 2018.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
Predict_Human_Error_Eye_Movement_Unintentional_Insider_Threat.pdf
(102.75 KB)
2017
S. Thiyagaraja
,
Dantu, R.
,
Shrestha, P.
,
Thompson, M.
, and
Smith, C.
,
“
Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices
”
, in
2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)
, 2017.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf
(348.53 KB)
2016
M. Jaynes
,
Dantu, R.
,
Varriale, R.
, and
Evans, N.
,
“
Automating ECU Identification for Vehicle Security
”
, in
2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA)
, 2016.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
Automating_ECU_Identification_Vehicle_Security.pdf
(306.52 KB)
G. Bajwa
and
Dantu, R.
,
“
Neurokey: towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms
”
,
Computers & Security
, p. -, 2016.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
Neurokey_Towards_New_Paradigm_Cancelable_Biometric_KeyGen_EEG.pdf
(2.35 MB)
2015
G. Bajwa
,
Dantu, R.
, and
Aldridge, R.
,
“
Pass-pic: A mobile user authentication
”
, in
Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on
, 2015.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
passpic_mobile_user_authentication.pdf
(99.71 KB)
Q. Mayo
,
Bryce, R.
, and
Dantu, R.
,
“
PhD Forum: A System Identification Approach to Monitoring Network Traffic Security
”
, in
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
, 2015.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
System_Identification_Approach_Monitor_Network_Traffic_Sec.pdf
(146.01 KB)
G. Bajwa
,
Fazeen, M.
,
Dantu, R.
, and
Tanpure, S.
,
“
Unintentional bugs to vulnerability mapping in Android applications
”
, in
Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on
, 2015.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
unintentional_bugs_vulnerability_mapping_android_apps.pdf
(182.24 KB)
2012
X. Yang
,
Dantu, R.
, and
Wijesekera, D.
,
“
Security Issues in VoIP Telecommunication Networks
”
,
Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges
, pp. 763–789, 2012.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
security_issues_voip_telecom_networks.pdf
(469.17 KB)
2010
A. Alazzawe
,
Alazzawe, A.
,
Wijesekera, D.
, and
Dantu, R.
,
“
A Testbed for Large Mobile Social Computing Experiments
”
,
Int. J. Sen. Netw.
, vol. 8, pp. 89–97, 2010.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
2008
P. Kolan
,
Dantu, R.
, and
Cangussu, J.
,
“
Nuisance Level of a Voice Call
”
,
ACM Trans. Multimedia Comput. Commun. Appl.
, vol. 5, pp. 6:1–6:22, 2008.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
S. Phithakkitnukoon
,
Dantu, R.
, and
Baatarjav, E. - A.
,
“
VoIP Security: Attacks and Solutions
”
,
Information Security Journal: A Global Perspective
, vol. 17, pp. 114–123, 2008.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
voip_security_attacks_solutions.pdf
(301 KB)
2007
R. Dantu
,
Kolan, P.
,
Akl, R.
, and
Loper, K.
,
“
Classification of Attributes and Behavior in Risk Management Using Bayesian Networks
”
, in
2007 IEEE International Conference on Intelligence and Security Informatics (ISI)
, New Brunswick, NJ, 2007.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
R. Dantu
,
Clothier, G.
, and
Atri, A.
,
“
EAP Methods for Wireless Networks
”
,
Comput. Stand. Interfaces
, vol. 29, pp. 289–301, 2007.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
eap_methods_for_wireless_networks.pdf
(336.97 KB)
Top