Skip to main content
UNT
Network Security Lab (NSL)
Menu
Search form
Search
Search
Call us
Contact Us
UNT Map
Home
News
People
Projects
Publications
Grants
Quicklinks
Back
MyUNT
Blackboard
EagleConnect
University Directory
UNT Map
Jobs at UNT
University of North Texas
Network Security Lab (NSL)
Search form
Search
Search
MyUNT
Blackboard
EagleConnect
UNT Directory
UNT Map
Jobs at UNT
Home
News
People
Projects
Publications
Grants
MyUNT
Blackboard
EagleConnect
UNT Directory
UNT Map
Jobs at UNT
Search form
Search
Search
Home
News
People
Projects
Publications
Grants
Network Security Lab (NSL)
You are here
Home
Publications
Publications
Export 10 results:
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
Author
[
Title
]
Type
Year
Filters:
Author
is
Kolan, Prakash
[Clear All Filters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
S
P. Kolan
and
Dantu, R.
,
“
Socio-technical Defense Against Voice Spamming
”
,
ACM Trans. Auton. Adapt. Syst.
, vol. 2, 2007.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
sociotechnical_defense_against_voip_spamming.pdf
(971.7 KB)
R
R. Dantu
and
Kolan, P.
,
“
Risk Management Using Behavior Based Bayesian Networks
”
, in
Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics
, Atlanta, GA, 2005.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
risk_mgmt_using_behavior_based_bayesian_networks.pdf
(245.51 KB)
R. Dantu
,
Loper, K.
, and
Kolan, P.
,
“
Risk Management Using Behavior Based Attack Graphs
”
, in
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
, Washington, DC, USA, 2004.
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
N
P. Kolan
,
Dantu, R.
, and
Cangussu, J.
,
“
Nuisance Level of a Voice Call
”
,
ACM Trans. Multimedia Comput. Commun. Appl.
, vol. 5, pp. 6:1–6:22, 2008.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
R. Dantu
,
Kolan, P.
, and
Cangussu, J.
,
“
Network risk management using attacker profiling
”
,
Security and Communication Networks
, vol. 2, pp. 83–96, 2009.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
network_risk_management_using_attacker_profiling.pdf
(557.53 KB)
H
R. Dantu
,
Oosterwijk, H.
,
Kolan, P.
, and
Husna, H.
,
“
HIPAA: Securing Medical Networks
”
,
Network Security
, vol. 2007, pp. 13–16, 2007.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
securing_medical_networks.pdf
(227.68 KB)
D
R. Dantu
and
Kolan, P.
,
“
Detecting Spam in VoIP Networks
”
, in
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop
, Berkeley, CA, USA, 2005.
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
spam_in_voip_networks.pdf
(269.37 KB)
C
R. Dantu
,
Kolan, P.
,
Akl, R.
, and
Loper, K.
,
“
Classification of Attributes and Behavior in Risk Management Using Bayesian Networks
”
, in
2007 IEEE International Conference on Intelligence and Security Informatics (ISI)
, New Brunswick, NJ, 2007.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
P. Kolan
and
Dantu, R.
,
“
Call Algebra
”
, in
2008 5th IEEE Consumer Communications and Networking Conference
, 2008.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
call_algebra.pdf
(294.13 KB)
A
P. Kolan
,
Vaithilingam, R.
, and
Dantu, R.
,
“
Automatic Calibration Using Receiver Operating Characteristics Curves
”
, in
2007 2nd International Conference on Communication Systems Software and Middleware
, 2007.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
Top