Publications

Conference Paper
Y. Madhavan, Cangussu, J., and Dantu, R., Penetration Testing for Spam Filters, in Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02, Seattle, WA, 2009.PDF icon pentesting_spam_filters.pdf (156.74 KB)
G. Bajwa, Dantu, R., and Aldridge, R., Pass-pic: A mobile user authentication, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon passpic_mobile_user_authentication.pdf (99.71 KB)
K. Upadhyay, Dantu, R., He, Y., Salau, A., and Badruddoja, S., Paradigm Shift from Paper Contracts to Smart Contracts, in 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021.PDF icon Paradigm_Shift_from_Paper_Contracts_to_Smart_Contracts.pdf (455.89 KB)
H. Zhang and Dantu, R., Opt-in Detection Based on Call Detail Records, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Las Vegas, NV, USA, 2009.PDF icon optin_detection_call_detail_records.pdf (206.07 KB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Thompson, M., and Smith, C., Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.PDF icon Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf (348.53 KB)
T. Bucuti and Dantu, R., An opportunistic encryption extension for the DNS protocol, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon opportunistic_encryption_extension_dns_protocols.pdf (185.13 KB)
S. Jonnada, Dantu, R., Shrestha, P., Ranasinghe, I., and Widick, L., An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems, in National Cyber Summit, Huntsville, Alabama, USA, 2018.PDF icon NCS18_paper_33.pdf (887.17 KB)
J. Vempati, Bajwa, G., and Dantu, R., NFC Based Two-Pass Mobile Authentication, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
Y. Hashem, Takabi, H., Dantu, R., and Nielsen, R., A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats, in Proceedings of the 2017 International Workshop on Managing Insider Security Threats, New York, NY, USA, 2017.PDF icon Multimodal_NeuroPhysiological_Study_Malicious_Insider_Threat.pdf (3.77 MB)
S. Phithakkitnukoon and Dantu, R., Mobile Social Closeness and Communication Patterns, in Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2010.PDF icon mobile_social_closeness_communication_patterns.pdf (350.21 KB)
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., A micro-manipulator vision in IC Manufacturing, in Proceedings. 1988 IEEE International Conference on Robotics and Automation, 1988.
Z. Zaccagni, Paul, A., and Dantu, R., Micro-Accreditation for Matching Employer E-Hire Needs, in 2019 IEEE International Conference on Blockchain (Blockchain), 2019.PDF icon Micro-Accreditation_for_Matching_Employer_E-Hire_Needs.pdf (614.98 KB)
S. Badruddoja, Dantu, R., He, Y., Upadhayay, K., and Thompson, M., Making Smart Contracts Smarter, in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 2021.PDF icon Making_Smart_Contracts_Smarter.pdf (998.18 KB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Making Smart Contracts Predict and Scale, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Making_Smart_Contracts_Predict_and_Scale.pdf (1.4 MB)
A. Salau, Dantu, R., Morozov, K., Badruddoja, S., and Upadhyay, K., Making Blockchain Validators Honest, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Making_Blockchain_Validators_Honest.pdf (1.13 MB)
K. Upadhyay, Dantu, R., He, Y., Salau, A., and Badruddoja, S., Make Consumers Happy by Defuzzifying the Service Level Agreements, in 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021.PDF icon Make_Consumers_Happy_by_Defuzzifying_the_Service_Level_Agreements.pdf (722.47 KB)
S. Badruddoja, Dantu, R., Widick, L., Zaccagni, Z., and Upadhyay, K., Integrating DOTS With Blockchain Can Secure Massive IoT Sensors, in 2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), New Orleans, LA, USA, 2020.PDF icon Integrating_DOTS_With_Blockchain_Can_Secure_Massive_IoT_Sensors.pdf (1.07 MB)
Y. Hashem, Takabi, H., and Dantu, R., Insider Threat Detection Based on Users’ Mouse Movements and Keystrokes Behavior, in Secure Knowledge Management Workshop, 2017.PDF icon Insider_Threat_.Detection_User_Mouse_Movement_Keystroke_Behavior.pdf (112.09 KB)
S. Phithakkitnukoon and Dantu, R., Inferring Social Groups Using Call Logs, in On the Move to Meaningful Internet Systems: OTM 2008 Workshops, Monterrey, Mexico, 2008, pp. 200–210.PDF icon inferring_social_groups_using_call_logs.pdf (235.6 KB)
K. Subbu, Gozick, B., and Dantu, R., Indoor localization through dynamic time warping, in 2011 IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, 2011.
K. Subbu, Xu, N., and Dantu, R., iKnow Where You Are, in Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04, Washington, DC, USA, 2009.PDF icon iknow_where_you_are.pdf (224.2 KB)
W. Fagen, Cangussu, J., and Dantu, R., Goliath: A Configurable Approach for Network Testing, in Testbeds and Research Infrastructure for the Development of Networks and Communities, 2007. TridentCom 2007. 3rd International Conference on, 2007.PDF icon goliath_configurable_approach_network_testing.pdf (127.03 KB)
L. Widick, Talkington, J., Bajwa, G., and Dantu, R., A framework for secured collaboration in mHealth, in Collaboration Technologies and Systems (CTS), 2015 International Conference on, 2015.PDF icon framework_secured_collaboration_mhealth.pdf (404.08 KB)
S. Thiyagaraja and Dantu, R., Finger Blood Flow Monitoring Using Smart Phones, in Proceedings of the 8th International Conference on Body Area Networks, ICST, Brussels, Belgium, Belgium, 2013.PDF icon finger_blood_flow_monitoring_smartphones.pdf (216.36 KB)
J. Vempati, Thompson, M., and Dantu, R., Feedback Control for Resiliency in Face of an Attack, in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, New York, NY, USA, 2017.PDF icon Feedback_Control_Resiliency_Face_Attack.pdf (1.02 MB)

Pages