Publications

Export 197 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Micromanipulator vision for wafer probing, IEEE Transactions on Semiconductor Manufacturing, vol. 2, pp. 114-117, 1989.
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., A micro-manipulator vision in IC Manufacturing, in Proceedings. 1988 IEEE International Conference on Robotics and Automation, 1988.
S. Phithakkitnukoon and Dantu, R., Mobile Social Closeness and Communication Patterns, in Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2010.PDF icon mobile_social_closeness_communication_patterns.pdf (350.21 KB)
S. Phithakkitnukoon and Dantu, R., Mobile Social Group Sizes and Scaling Ratio, AI Soc., vol. 26, pp. 71–85, 2011.
Y. Hashem, Takabi, H., Dantu, R., and Nielsen, R., A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats, in Proceedings of the 2017 International Workshop on Managing Insider Security Threats, New York, NY, USA, 2017.PDF icon Multimodal_NeuroPhysiological_Study_Malicious_Insider_Threat.pdf (3.77 MB)
N
R. Dantu, Kolan, P., and Cangussu, J., Network risk management using attacker profiling, Security and Communication Networks, vol. 2, pp. 83–96, 2009.PDF icon network_risk_management_using_attacker_profiling.pdf (557.53 KB)
G. Bajwa and Dantu, R., Neurokey: towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms, Computers & Security, p. -, 2016.PDF icon Neurokey_Towards_New_Paradigm_Cancelable_Biometric_KeyGen_EEG.pdf (2.35 MB)
N. Gupta, Dantu, R., Schulzrinne, H., Goulart, A., and Magnussen, W., Next generation 9-1-1: Architecture and challenges in realizing an IP-multimedia-based emergency service, Journal of Homeland Security and Emergency Management, vol. 7, 2010.
J. Vempati, Bajwa, G., and Dantu, R., NFC Based Two-Pass Mobile Authentication, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
S. Thiyagaraja, Dantu, R., Shrestha, P., Chitnis, A., Thompson, M., Anumandla, P., Sarma, T., and Dantu, S., A novel heart-mobile interface for detection and classification of heart sounds, Biomedical Signal Processing and Control, vol. 45, pp. 313 - 324, 2018.PDF icon 1-s2.0-S1746809418301101-main.pdf (2.82 MB)
P. Kolan, Dantu, R., and Cangussu, J., Nuisance Level of a Voice Call, ACM Trans. Multimedia Comput. Commun. Appl., vol. 5, pp. 6:1–6:22, 2008.
P
R. Dantu, Panel: What do you mean security VoIP. IEEE ENTNET conference in conjunction with Supercom’2005, 2005.
K. Upadhyay, Dantu, R., He, Y., Salau, A., and Badruddoja, S., Paradigm Shift from Paper Contracts to Smart Contracts, in 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021.PDF icon Paradigm_Shift_from_Paper_Contracts_to_Smart_Contracts.pdf (455.89 KB)
R. Dantu, Dimopoulos, N., Li, K., Patel, R., and Al-Khalili, A., Parallel algorithms for low-level vision on the homogeneous multiprocessor, Computers & Electrical Engineering, vol. 20, pp. 51 - 60, 1994.
G. Bajwa, Dantu, R., and Aldridge, R., Pass-pic: A mobile user authentication, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon passpic_mobile_user_authentication.pdf (99.71 KB)
Y. Madhavan, Cangussu, J., and Dantu, R., Penetration Testing for Spam Filters, in Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02, Seattle, WA, 2009.PDF icon pentesting_spam_filters.pdf (156.74 KB)
N. Sen, Dantu, R., Vempati, J., and Thompson, M., Performance Analysis of Elliptic Curves for Real-Time Video Encryption, in 2018 National Cyber Summit (NCS), 2018.PDF icon Performance_Analysis_Elliptic_Curves_RealTime_Video_Encryption.pdf (382.64 KB)
Q. Mayo, Bryce, R., and Dantu, R., PhD Forum: A System Identification Approach to Monitoring Network Traffic Security, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015.PDF icon System_Identification_Approach_Monitor_Network_Traffic_Sec.pdf (146.01 KB)
S. Phithakkitnukoon and Dantu, R., Predicting Calls: New Service for an Intelligent Phone, in 10th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2007, San José, USA, 2007.PDF icon PredictingCalls_NewServices_IntelligentPhone.pdf (493.1 KB)
H. Zhang and Dantu, R., Predicting social ties in mobile phone networks, in 2010 IEEE International Conference on Intelligence and Security Informatics (ISI), Vancouver, BC, Canada, 2010.PDF icon predicting_social_ties_in_mobile_phone_networks.pdf (366.29 KB)
H. Takabi, Hashem, Y., and Dantu, R., Prediction of human error using eye movements patterns for unintentional insider threat detection, in 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 2018.PDF icon Predict_Human_Error_Eye_Movement_Unintentional_Insider_Threat.pdf (102.75 KB)

Pages