Publications

Export 41 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is S  [Clear All Filters]
2010
P. Sroufe, Phithakkitnukoon, S., Dantu, R., and Cangussu, J., Email Shape Analysis, in Distributed Computing and Networking: 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010. Proceedings, K. Kant, Pemmaraju, S. V., Sivalingam, K. M., and Wu, J., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 18–29.PDF icon email_shape_analysis.pdf (259.8 KB)
P. Sroufe, Tate, S., Dantu, R., and Cankaya, E., Experiences During a Collegiate Cyber Defense Competition, Journal of Applied Security Research, vol. 5, pp. 382–396, 2010.PDF icon experiences_ccdc.pdf (323.26 KB)
N. Gupta, Dantu, R., Schulzrinne, H., Goulart, A., and Magnussen, W., Next generation 9-1-1: Architecture and challenges in realizing an IP-multimedia-based emergency service, Journal of Homeland Security and Emergency Management, vol. 7, 2010.
X. Yang, Stavrou, A., Dantu, R., and Wijesekera, D., Small World VoIP, in Mobile Computing, Applications, and Services: Second International ICST Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28, 2010, Revised Selected Papers, M. Gris and Yang, G., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 137–155.PDF icon small_world_voip.pdf (540.6 KB)
2009
P. Sroufe, Phithakkitnukoon, S., Dantu, R., and Cangussu, J., Email Shape Analysis for Spam Botnet Detection, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2009.PDF icon email_shape_analysis_spam_botnet_detection.pdf (265.88 KB)
K. Subbu, Xu, N., and Dantu, R., iKnow Where You Are, in Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04, Washington, DC, USA, 2009.PDF icon iknow_where_you_are.pdf (224.2 KB)
R. Dantu, Fahmy, S., Schulzrinne, H., and Cangussu, J., Issues and challenges in securing VoIP, Computers & Security, vol. 28, pp. 743-753, 2009.PDF icon Issues_and_challenges_in_securing_VoIP.pdf (527.79 KB)

Pages