Publications

Export 197 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
M. Fazeen, Gozick, B., Dantu, R., Bhukhiya, M., and González, M. C., Safe Driving Using Mobile Phones, Trans. Intell. Transport. Sys., 2012.PDF icon Safe Driving Using Mobile Phones.pdf (805.74 KB)
M. Fazeen and Dantu, R., Another free app: Does it have the right intentions?, in Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, 2014.
M. Fazeen, Bajwa, G., and Dantu, R., Context-aware Multimedia Encryption in Mobile Platforms, in Proceedings of the 9th Annual Cyber and Information Security Research Conference, New York, NY, USA, 2014.
M. Fazeen, Dantu, R., and Guturu, P., Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches, Social Network Analysis and Mining, vol. 1, pp. 241–254, 2011.PDF icon leaders_lurkers_associates_spammers.pdf (891.55 KB)
W. Fagen, Cangussu, J., and Dantu, R., A Virtual Environment for Network Testing, J. Netw. Comput. Appl., vol. 32, pp. 184–214, 2009.
W. Fagen, Cangussu, J., and Dantu, R., Goliath: A Configurable Approach for Network Testing, in Testbeds and Research Infrastructure for the Development of Networks and Communities, 2007. TridentCom 2007. 3rd International Conference on, 2007.PDF icon goliath_configurable_approach_network_testing.pdf (127.03 KB)
D
J. Davis, Johnson, S., LeVine, M., Dantu, R., and Rojas-Levi, E., Technologies Shaping Transportation of the Future and Smart Cities, Cyber Future Summit. 2018.
J. Davis, Khalfan, S., Tiene, R., and Dantu, R., The Future is Connected: How Can it be Cyber Secure?, Cyber Future Summit. 2018.
R. Dantu, Palla, S., and Cangussu, J., Classification of phishers, Journal of Homeland Security and Emergency Management, vol. 5, 2008.PDF icon classification_phishers.pdf (410.26 KB)
R. Dantu, Cangussu, J., and Yelimeli, A., Dynamic Control of Worm Propagation, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.PDF icon dynamic_control_of_worm.pdf (142.08 KB)
R. Dantu, Cangussu, J., and Turi, J., Sensitivity Analysis of an Attack Containment Model, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon sensitivity_analysis_attack_containment_model.pdf (359.68 KB)
R. Dantu and Oosterwijk, H., Survey on Hospital Network Security and Privacy. Barco Ltd, 2004.
R. Dantu, To Patch or Not to Patch, Health Imaging and Technology News Magazine, pp. 48-49, 2005.
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., A micro-manipulator vision in IC Manufacturing, in Proceedings. 1988 IEEE International Conference on Robotics and Automation, 1988.
R. Dantu, Schulzrinne, H., and Sroufe, P., Experiences in building a multi-university testbed for research in multimedia communications, in Parallel and Distributed Processing, 2008. IPDPS 2008. IEEE International Symposium on, 2008.PDF icon experiences_building_multi_university_testbed_research_multimedia_comms.pdf (452.67 KB)
R. Dantu, Gupta, N., Dantu, V., and Morgan, Z., Effective CPR Procedure With Real-Time Evaluation and Feedback Using Smartphones , U.S. Patent US20150351647A12015.
R. Dantu, Abbas, K., O'Neill, M., and Mikler, A., Data centric modeling of environmental sensor networks, in Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004. IEEE, 2004.PDF icon data_centric_modeling_environment_sensor_networks.pdf (509.71 KB)
R. Dantu, Ghosal, D., and Schulzrinne, H., Securing voice over IP, IEEE Network, vol. 20, pp. 4-5, 2006.
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system of control signaling for a wireless access network, 2008.
R. Dantu, VoIP Security. Annual DFW Secret Service Agents Meeting, Dallas, Texas, USA, 2004.
R. Dantu and O'Connell, P., System and method for packet level distributed routing in fiber optic rings, 2001.
R. Dantu, Technology and Policy in securing Voice over IP. 2nd Workshop on Voice over IP Security, Washington, DC, 2005.

Pages