Publications

Export 173 results:
Author Title [ Type(Asc)] Year
Filters: Author is Ram Dantu  [Clear All Filters]
Conference Paper
R. Dantu, Cangussu, J., and Turi, J., Sensitivity Analysis of an Attack Containment Model, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon sensitivity_analysis_attack_containment_model.pdf (359.68 KB)
H. Sengar, Dantu, R., and Wijesekera, D., Securing VoIP and PSTN from integrated signaling network vulnerabilities, in 1st IEEE Workshop on VoIP Management and Security, 2006., 2006.PDF icon securing_voip_pstn_integrated_signaling_network.pdf (157.95 KB)
R. Dantu and Kolan, P., Risk Management Using Behavior Based Bayesian Networks, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon risk_mgmt_using_behavior_based_bayesian_networks.pdf (245.51 KB)
R. Dantu, Loper, K., and Kolan, P., Risk Management Using Behavior Based Attack Graphs, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
J. Talkington and Dantu, R., Realizing Optimal Chest Compression Fraction During Cardiopulmonary Resuscitation, in 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2016.PDF icon Realizing_Optimal_Chest_Compression_Fraction_CPR.pdf (222.05 KB)
C. Claiborne, Ncube, C., and Dantu, R., Random anonymization of mobile sensor data: Modified Android framework, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon random_anonymization_mobile_sensor_data.pdf (371.83 KB)
H. Zhang and Dantu, R., Quantifying the Presence of Phone Users, in 2008 5th IEEE Consumer Communications and Networking Conference, 2008.PDF icon quantifying_presence_phone_users.pdf (278.32 KB)
H. Zhang, Dantu, R., and Cangussu, J., Quantifying Reciprocity in Social Networks, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.PDF icon quantifying_reciprocity_social_networks.pdf (250.6 KB)
H. Husna, Phithakkitnukoon, S., Baatarjav, E. - A., and Dantu, R., Quantifying presence using calling patterns, in Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on, 2008.PDF icon quantifying_presence_call_patterns.pdf (126.24 KB)
N. Gupta and Dantu, R., Quantifying Cognitive Impairment Due to Physical or Mental Stress, in Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, New York, NY, USA, 2013.PDF icon quantify_cognitive_impairment_physical_mental_stress.pdf (403.58 KB)
E. - A. Baatarjav, Dantu, R., and Phithakkitnukoon, S., Privacy Management for Facebook, in 4th International Conference on Information Systems Security (ICISS 2008), Hyderabad, India, 2008.PDF icon privacy_mgmt_facebook.pdf (661.91 KB)
H. Takabi, Hashem, Y., and Dantu, R., Prediction of human error using eye movements patterns for unintentional insider threat detection, in 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 2018.PDF icon Predict_Human_Error_Eye_Movement_Unintentional_Insider_Threat.pdf (102.75 KB)
H. Zhang and Dantu, R., Predicting social ties in mobile phone networks, in 2010 IEEE International Conference on Intelligence and Security Informatics (ISI), Vancouver, BC, Canada, 2010.PDF icon predicting_social_ties_in_mobile_phone_networks.pdf (366.29 KB)
S. Phithakkitnukoon and Dantu, R., Predicting Calls: New Service for an Intelligent Phone, in 10th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2007, San José, USA, 2007.PDF icon PredictingCalls_NewServices_IntelligentPhone.pdf (493.1 KB)
Q. Mayo, Bryce, R., and Dantu, R., PhD Forum: A System Identification Approach to Monitoring Network Traffic Security, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015.PDF icon System_Identification_Approach_Monitor_Network_Traffic_Sec.pdf (146.01 KB)
N. Sen, Dantu, R., Vempati, J., and Thompson, M., Performance Analysis of Elliptic Curves for Real-Time Video Encryption, in 2018 National Cyber Summit (NCS), 2018.PDF icon Performance_Analysis_Elliptic_Curves_RealTime_Video_Encryption.pdf (382.64 KB)
Y. Madhavan, Cangussu, J., and Dantu, R., Penetration Testing for Spam Filters, in Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02, Seattle, WA, 2009.PDF icon pentesting_spam_filters.pdf (156.74 KB)
G. Bajwa, Dantu, R., and Aldridge, R., Pass-pic: A mobile user authentication, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon passpic_mobile_user_authentication.pdf (99.71 KB)
H. Zhang and Dantu, R., Opt-in Detection Based on Call Detail Records, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Las Vegas, NV, USA, 2009.PDF icon optin_detection_call_detail_records.pdf (206.07 KB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Thompson, M., and Smith, C., Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.PDF icon Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf (348.53 KB)
T. Bucuti and Dantu, R., An opportunistic encryption extension for the DNS protocol, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon opportunistic_encryption_extension_dns_protocols.pdf (185.13 KB)
S. Jonnada, Dantu, R., Shrestha, P., Ranasinghe, I., and Widick, L., An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems, in National Cyber Summit, Huntsville, Alabama, USA, 2018.PDF icon NCS18_paper_33.pdf (887.17 KB)
J. Vempati, Bajwa, G., and Dantu, R., NFC Based Two-Pass Mobile Authentication, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
Y. Hashem, Takabi, H., Dantu, R., and Nielsen, R., A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats, in Proceedings of the 2017 International Workshop on Managing Insider Security Threats, New York, NY, USA, 2017.PDF icon Multimodal_NeuroPhysiological_Study_Malicious_Insider_Threat.pdf (3.77 MB)
S. Phithakkitnukoon and Dantu, R., Mobile Social Closeness and Communication Patterns, in Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2010.PDF icon mobile_social_closeness_communication_patterns.pdf (350.21 KB)

Pages