Publications

Export 15 results:
Author Title [ Type(Desc)] Year
Filters: Keyword is Security  [Clear All Filters]
Conference Paper
M. Jaynes, Dantu, R., Varriale, R., and Evans, N., Automating ECU Identification for Vehicle Security, in 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), 2016.PDF icon Automating_ECU_Identification_Vehicle_Security.pdf (306.52 KB)
L. Widick, Ranasinghe, I., Dantu, R., and Jonnada, S., Blockchain Based Authentication and Authorization Framework for Remote Collaboration Systems, in 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), 2019.PDF icon Blockchain_Based_Authn_Authz_Framework_Remote_Collab_Sys.pdf (1.06 MB)
R. Dantu, Kolan, P., Akl, R., and Loper, K., Classification of Attributes and Behavior in Risk Management Using Bayesian Networks, in 2007 IEEE International Conference on Intelligence and Security Informatics (ISI) , New Brunswick, NJ, 2007.
S. Thiyagaraja, Dantu, R., Shrestha, P., Thompson, M., and Smith, C., Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.PDF icon Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf (348.53 KB)
G. Bajwa, Dantu, R., and Aldridge, R., Pass-pic: A mobile user authentication, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon passpic_mobile_user_authentication.pdf (99.71 KB)
N. Sen, Dantu, R., Vempati, J., and Thompson, M., Performance Analysis of Elliptic Curves for Real-Time Video Encryption, in 2018 National Cyber Summit (NCS), 2018.PDF icon Performance_Analysis_Elliptic_Curves_RealTime_Video_Encryption.pdf (382.64 KB)
Q. Mayo, Bryce, R., and Dantu, R., PhD Forum: A System Identification Approach to Monitoring Network Traffic Security, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015.PDF icon System_Identification_Approach_Monitor_Network_Traffic_Sec.pdf (146.01 KB)
H. Takabi, Hashem, Y., and Dantu, R., Prediction of human error using eye movements patterns for unintentional insider threat detection, in 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 2018.PDF icon Predict_Human_Error_Eye_Movement_Unintentional_Insider_Threat.pdf (102.75 KB)
G. Bajwa, Fazeen, M., Dantu, R., and Tanpure, S., Unintentional bugs to vulnerability mapping in Android applications, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon unintentional_bugs_vulnerability_mapping_android_apps.pdf (182.24 KB)
Journal Article
R. Dantu, Clothier, G., and Atri, A., EAP Methods for Wireless Networks, Comput. Stand. Interfaces, vol. 29, pp. 289–301, 2007.PDF icon eap_methods_for_wireless_networks.pdf (336.97 KB)
G. Bajwa and Dantu, R., Neurokey: towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms, Computers & Security, p. -, 2016.PDF icon Neurokey_Towards_New_Paradigm_Cancelable_Biometric_KeyGen_EEG.pdf (2.35 MB)
P. Kolan, Dantu, R., and Cangussu, J., Nuisance Level of a Voice Call, ACM Trans. Multimedia Comput. Commun. Appl., vol. 5, pp. 6:1–6:22, 2008.
X. Yang, Dantu, R., and Wijesekera, D., Security Issues in VoIP Telecommunication Networks, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, pp. 763–789, 2012.PDF icon security_issues_voip_telecom_networks.pdf (469.17 KB)
A. Alazzawe, Alazzawe, A., Wijesekera, D., and Dantu, R., A Testbed for Large Mobile Social Computing Experiments, Int. J. Sen. Netw., vol. 8, pp. 89–97, 2010.
S. Phithakkitnukoon, Dantu, R., and Baatarjav, E. - A., VoIP Security: Attacks and Solutions, Information Security Journal: A Global Perspective, vol. 17, pp. 114–123, 2008.PDF icon voip_security_attacks_solutions.pdf (301 KB)