Publications

Export 173 results:
Author [ Title(Asc)] Type Year
Filters: Author is Ram Dantu  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
R. Dantu and Kolan, P., Risk Management Using Behavior Based Bayesian Networks, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon risk_mgmt_using_behavior_based_bayesian_networks.pdf (245.51 KB)
R. Dantu, Loper, K., and Kolan, P., Risk Management Using Behavior Based Attack Graphs, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
T. Anderson, Bowen, E., Dantu, R., Doria, A., Gopal, R., Salim, J., Khosravi, H., Minhazuddin, M., and Wasserman, M., Requirements for Separation of IP Control and Forwarding. RFC Editor, 2003.PDF icon rfc3654.pdf (53.22 KB)
S. Sarma, Bucuti, H., Chitnis, A., Klacman, A., and Dantu, R., Real-Time Mobile Device-Assisted Chest Compression During Cardiopulmonary Resuscitation, American Journal of Cardiology, vol. 120, no. 2, pp. 196 - 200, 2017.PDF icon RealTime_Mobile_Device_Assisted_Chest_Compression_CPR.pdf (729.79 KB)
J. Talkington and Dantu, R., Realizing Optimal Chest Compression Fraction During Cardiopulmonary Resuscitation, in 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2016.PDF icon Realizing_Optimal_Chest_Compression_Fraction_CPR.pdf (222.05 KB)
C. Claiborne, Ncube, C., and Dantu, R., Random anonymization of mobile sensor data: Modified Android framework, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon random_anonymization_mobile_sensor_data.pdf (371.83 KB)
Q
H. Zhang and Dantu, R., Quantifying the Presence of Phone Users, in 2008 5th IEEE Consumer Communications and Networking Conference, 2008.PDF icon quantifying_presence_phone_users.pdf (278.32 KB)
H. Zhang, Dantu, R., and Cangussu, J., Quantifying Reciprocity in Social Networks, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.PDF icon quantifying_reciprocity_social_networks.pdf (250.6 KB)
H. Husna, Phithakkitnukoon, S., Baatarjav, E. - A., and Dantu, R., Quantifying presence using calling patterns, in Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on, 2008.PDF icon quantifying_presence_call_patterns.pdf (126.24 KB)
G. Bajwa, Dantu, R., and Nana, A., Quantifying Dynamic Cerebral Autoregulation using Electroencephalograms, Archives of Physical Medicine and Rehabilitation, vol. 96. p. e69, 2015.
N. Gupta and Dantu, R., Quantifying Cognitive Impairment Due to Physical or Mental Stress, in Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, New York, NY, USA, 2013.PDF icon quantify_cognitive_impairment_physical_mental_stress.pdf (403.58 KB)
M. Alam, Dantu, R., Holur, B., and Eyceoz, T., Quality indicator and method for frame selection in wireless network, 2006.
P
E. - A. Baatarjav, Dantu, R., and Phithakkitnukoon, S., Privacy Management for Facebook, in 4th International Conference on Information Systems Security (ICISS 2008), Hyderabad, India, 2008.PDF icon privacy_mgmt_facebook.pdf (661.91 KB)
H. Takabi, Hashem, Y., and Dantu, R., Prediction of human error using eye movements patterns for unintentional insider threat detection, in 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 2018.PDF icon Predict_Human_Error_Eye_Movement_Unintentional_Insider_Threat.pdf (102.75 KB)
H. Zhang and Dantu, R., Predicting social ties in mobile phone networks, in 2010 IEEE International Conference on Intelligence and Security Informatics (ISI), Vancouver, BC, Canada, 2010.PDF icon predicting_social_ties_in_mobile_phone_networks.pdf (366.29 KB)
S. Phithakkitnukoon and Dantu, R., Predicting Calls: New Service for an Intelligent Phone, in 10th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2007, San José, USA, 2007.PDF icon PredictingCalls_NewServices_IntelligentPhone.pdf (493.1 KB)
Q. Mayo, Bryce, R., and Dantu, R., PhD Forum: A System Identification Approach to Monitoring Network Traffic Security, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015.PDF icon System_Identification_Approach_Monitor_Network_Traffic_Sec.pdf (146.01 KB)
N. Sen, Dantu, R., Vempati, J., and Thompson, M., Performance Analysis of Elliptic Curves for Real-Time Video Encryption, in 2018 National Cyber Summit (NCS), 2018.PDF icon Performance_Analysis_Elliptic_Curves_RealTime_Video_Encryption.pdf (382.64 KB)
Y. Madhavan, Cangussu, J., and Dantu, R., Penetration Testing for Spam Filters, in Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02, Seattle, WA, 2009.PDF icon pentesting_spam_filters.pdf (156.74 KB)
G. Bajwa, Dantu, R., and Aldridge, R., Pass-pic: A mobile user authentication, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon passpic_mobile_user_authentication.pdf (99.71 KB)
R. Dantu, Dimopoulos, N., Li, K., Patel, R., and Al-Khalili, A., Parallel algorithms for low-level vision on the homogeneous multiprocessor, Computers & Electrical Engineering, vol. 20, pp. 51 - 60, 1994.
R. Dantu, Panel: What do you mean security VoIP. IEEE ENTNET conference in conjunction with Supercom’2005, 2005.
O
H. Zhang and Dantu, R., Opt-in Detection Based on Call Detail Records, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Las Vegas, NV, USA, 2009.PDF icon optin_detection_call_detail_records.pdf (206.07 KB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Thompson, M., and Smith, C., Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.PDF icon Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf (348.53 KB)

Pages