Publications

Export 9 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is I  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
M. Fazeen, Dantu, R., and Guturu, P., Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches, Social Network Analysis and Mining, vol. 1, pp. 241–254, 2011.PDF icon leaders_lurkers_associates_spammers.pdf (891.55 KB)
K. Subbu, Xu, N., and Dantu, R., iKnow Where You Are, in Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04, Washington, DC, USA, 2009.PDF icon iknow_where_you_are.pdf (224.2 KB)
P. Guturu and Dantu, R., An Impatient Evolutionary Algorithm With Probabilistic Tabu Search for Unified Solution of Some NP-Hard Problems in Graph and Set Theory via Clique Finding, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 38, pp. 645 - 666, 2008.
K. Subbu, Gozick, B., and Dantu, R., Indoor localization through dynamic time warping, in 2011 IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, 2011.
S. Phithakkitnukoon and Dantu, R., Inferring Social Groups Using Call Logs, in On the Move to Meaningful Internet Systems: OTM 2008 Workshops, Monterrey, Mexico, 2008, pp. 200–210.PDF icon inferring_social_groups_using_call_logs.pdf (235.6 KB)
Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals, Journal of Internet Services and Information Security, vol. 6, pp. 20-36, 2016.PDF icon Inside_Mind_Of_Insider.pdf (1023.25 KB)
Y. Hashem, Takabi, H., and Dantu, R., Insider Threat Detection Based on Users’ Mouse Movements and Keystrokes Behavior, in Secure Knowledge Management Workshop, 2017.PDF icon Insider_Threat_.Detection_User_Mouse_Movement_Keystroke_Behavior.pdf (112.09 KB)
S. Badruddoja, Dantu, R., Widick, L., Zaccagni, Z., and Upadhyay, K., Integrating DOTS With Blockchain Can Secure Massive IoT Sensors, in 2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), New Orleans, LA, USA, 2020.PDF icon Integrating_DOTS_With_Blockchain_Can_Secure_Massive_IoT_Sensors.pdf (1.07 MB)
R. Dantu, Fahmy, S., Schulzrinne, H., and Cangussu, J., Issues and challenges in securing VoIP, Computers & Security, vol. 28, pp. 743-753, 2009.PDF icon Issues_and_challenges_in_securing_VoIP.pdf (527.79 KB)