Publications

Export 197 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
R. Dantu, To Patch or Not to Patch, Health Imaging and Technology News Magazine, pp. 48-49, 2005.
R. Dantu, Top 3 challenges in VoIP Security and Management. 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE), Vancouver, BC, Canada, 2006.
R. Dantu and Oosterwijk, H., Top Ten Recommendations for PACS Security Implementation, Health Imaging & IT Magazine, 2005.
A. Salau, Dantu, R., Morozov, K., Upadhyay, K., and Badruddoja, S., Towards a Threat Model and Security Analysis for Data Cooperatives, in 19th International Conference on Security and Cryptography (SECRYPT 2022), 2022.PDF icon Towards a Threat Model and Security Analysis for Data Cooperatives.pdf (511.21 KB)
Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., Towards Insider Threat Detection Using Psychophysiological Signals, in Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, New York, NY, USA, 2015.PDF icon Towards_Insider_Threat_Detection_Psychophysiological_signals.pdf (705.73 KB)
S. Phithakkitnukoon and Dantu, R., Towards Ubiquitous Computing with Call Prediction, SIGMOBILE Mob. Comput. Commun. Rev., vol. 15, pp. 52–64, 2011.PDF icon ubiquitous_computing_call_prediction.pdf (671.79 KB)
H. Husna, Phithakkitnukoon, S., and Dantu, R., Traffic Shaping of Spam Botnets, in 2008 5th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, 2008.PDF icon traffic_shaping_spam_botnet.pdf (145.58 KB)
R. Dantu and Paul, A., True Matching of Employers' Needs, NICE Conference. Miami, Florida, 2018.
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Trusted AI with Blockchain to Empower Metaverse, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Trusted_AI_with_Blockchain_to_Empower_Metaverse.pdf (1.04 MB)
U
G. Bajwa, Fazeen, M., Dantu, R., and Tanpure, S., Unintentional bugs to vulnerability mapping in Android applications, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon unintentional_bugs_vulnerability_mapping_android_apps.pdf (182.24 KB)
J. Vempati, Dantu, R., and Thompson, M., Uninterrupted Video Surveillance in the Face of an Attack, in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018.PDF icon Uninterrupted_Video_Surveillance_Attack.pdf (681.67 KB)
E. - A. Baatarjav and Dantu, R., Unveiling Hidden Patterns to Find Social Relevance, in Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on, 2011.PDF icon unveil_hidden_patterns_find_social_relevance.pdf (913.21 KB)
S. Palla and Dantu, R., Unwanted SMTP Paths and Relays, in 2007 2nd International Conference on Communication Systems Software and Middleware, 2007.

Pages