UNT | University of North Texas

Search form

Publications

2009
X. Yang, Dantu, R., and Wijesekera, D., Achieving Peer-to-peer Telecommunication Services Through Social Hashing, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2009.PDF icon achieving_p2p_telecom_svcs_social_hashing.pdf (338.92 KB)
R. Dantu and Guturu, P., An Architecture for IP-based Next Generation Radio Access Network, Fourth-Generation Wireless Networks: Applications and Innovations: Applications and Innovations, p. 61, 2009.
L. Langle and Dantu, R., Are You a Safe Driver?, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.PDF icon are_you_safe_driver.pdf (388.67 KB)
E. - A. Baatarjav, Dantu, R., Tang, Y., and Cangussu, J., BBN-based Privacy Management System for Facebook, in Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics, Piscataway, NJ, USA, 2009.PDF icon privacy_management_system_facebook.pdf (494.49 KB)
H. Zhang, Dantu, R., and Cangussu, J., Change Point Detection Based on Call Detail Records, in Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics, Piscataway, NJ, USA, 2009.PDF icon change_point_detection_call_detail_records.pdf (122.69 KB)
S. Phithakkitnukoon and Dantu, R., Defense Against SPIT Using Community Signals, in Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics, Piscataway, NJ, USA, 2009.
P. Sroufe, Phithakkitnukoon, S., Dantu, R., and Cangussu, J., Email Shape Analysis for Spam Botnet Detection, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2009.PDF icon email_shape_analysis_spam_botnet_detection.pdf (265.88 KB)
K. Subbu, Xu, N., and Dantu, R., iKnow Where You Are, in Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04, Washington, DC, USA, 2009.PDF icon iknow_where_you_are.pdf (224.2 KB)
R. Dantu, Fahmy, S., Schulzrinne, H., and Cangussu, J., Issues and challenges in securing VoIP, Computers & Security, vol. 28, pp. 743-753, 2009.PDF icon Issues_and_challenges_in_securing_VoIP.pdf (527.79 KB)
R. Dantu, Kolan, P., and Cangussu, J., Network risk management using attacker profiling, Security and Communication Networks, vol. 2, pp. 83–96, 2009.PDF icon network_risk_management_using_attacker_profiling.pdf (557.53 KB)
H. Zhang and Dantu, R., Opt-in Detection Based on Call Detail Records, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Las Vegas, NV, USA, 2009.PDF icon optin_detection_call_detail_records.pdf (206.07 KB)
Y. Madhavan, Cangussu, J., and Dantu, R., Penetration Testing for Spam Filters, in Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02, Seattle, WA, 2009.PDF icon pentesting_spam_filters.pdf (156.74 KB)
H. Zhang, Dantu, R., and Cangussu, J., Quantifying Reciprocity in Social Networks, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.PDF icon quantifying_reciprocity_social_networks.pdf (250.6 KB)
X. Yang, Dantu, R., and Wijesekera, D., A society-integrated testbed architecture for peer-to-peer telecommunications, in Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009. TridentCom 2009. 5th International Conference on, 2009.
A. Alazzawe, Alazzawe, A., Wijesekera, D., and Dantu, R., A testbed for mobile social computing, in Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009. TridentCom 2009. 5th International Conference on, 2009.PDF icon testbed_mobile_social_computing.pdf (292.66 KB)
W. Fagen, Cangussu, J., and Dantu, R., A Virtual Environment for Network Testing, J. Netw. Comput. Appl., vol. 32, pp. 184–214, 2009.
2008
S. Phithakkitnukoon and Dantu, R., Adequacy of data for characterizing caller behavior, in Proceedings of KDD Inter. Workshop on Social Network Mining and Analysis (SNAKDD, 2008.PDF icon adequacy_data_characterize_caller_behavior.pdf (223.05 KB)
H. Husna, Phithakkitnukoon, S., Palla, S., and Dantu, R., Behavior analysis of spam botnets, in 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08), 2008.PDF icon behavior_analysis_spam_botnets.pdf (560.82 KB)
S. Phithakkitnukoon, Husna, H., and Dantu, R., Behavioral Entropy of a Cellular Phone User, in Social Computing, Behavioral Modeling, and Prediction, H. Liu, Salerno, J. J., and Young, M. J. Boston, MA: Springer US, 2008, pp. 160–167.PDF icon behavioral_entropy_cellphone_user.pdf (665.52 KB)
P. Kolan and Dantu, R., Call Algebra, in 2008 5th IEEE Consumer Communications and Networking Conference, 2008.PDF icon call_algebra.pdf (294.13 KB)
R. Dantu, Palla, S., and Cangussu, J., Classification of phishers, Journal of Homeland Security and Emergency Management, vol. 5, 2008.PDF icon classification_phishers.pdf (410.26 KB)
S. Phithakkitnukoon and Dantu, R., CPL: Enhancing Mobile Phone Functionality by Call Predicted List, in Proceedings of the OTM Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: 2008 Workshops: ADI, AWeSoMe, COMBEK, EI2N, IWSSA, MONET, OnToContent + QSI, ORM, PerSys, RDDS, SEMELS, and SWWS, Berlin, Heidelberg, 2008.PDF icon cpl_enhancing_mobile_phone_functionality_call_predict_list.pdf (214.86 KB)
H. Zhang and Dantu, R., Discovery of Social Groups Using Call Detail Records, in On the Move to Meaningful Internet Systems: OTM 2008 Workshops, Monterrey, Mexico, 2008.PDF icon discovery_social_groups_call_detail_records.pdf (891.31 KB)
S. Haider, Cangussu, J., Cooper, K., and Dantu, R., Estimation of Defects Based on Defect Decay Model: ED^\{3\}M, IEEE Transactions on Software Engineering, vol. 34, pp. 336 - 356, 2008.

Pages