Publications

Export 56 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
J. Davis, Khalfan, S., Tiene, R., and Dantu, R., The Future is Connected: How Can it be Cyber Secure?, Cyber Future Summit. 2018.
J. Davis, Johnson, S., LeVine, M., Dantu, R., and Rojas-Levi, E., Technologies Shaping Transportation of the Future and Smart Cities, Cyber Future Summit. 2018.
R. Dantu and Oosterwijk, H., Top Ten Recommendations for PACS Security Implementation, Health Imaging & IT Magazine, 2005.
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Micromanipulator vision for wafer probing, IEEE Transactions on Semiconductor Manufacturing, vol. 2, pp. 114-117, 1989.
R. Dantu, Patel, P., Choksi, O., Patel, A., Ali, M., Miernik, J., and Holur, B., Wireless router and method for processing traffic in a wireless communications network, 2006.
R. Dantu, Top 3 challenges in VoIP Security and Management. 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE), Vancouver, BC, Canada, 2006.
R. Dantu and Kolan, P., Risk Management Using Behavior Based Bayesian Networks, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon risk_mgmt_using_behavior_based_bayesian_networks.pdf (245.51 KB)
R. Dantu, To Patch or Not to Patch, Health Imaging and Technology News Magazine, pp. 48-49, 2005.
R. Dantu, Cangussu, J., and Turi, J., Sensitivity Analysis of an Attack Containment Model, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon sensitivity_analysis_attack_containment_model.pdf (359.68 KB)
R. Dantu, Chandrasekaran, V., and Gupta, N., 911 services and vital sign measurement utilizing mobile phone sensors and applications, 2016.
R. Dantu and Oosterwijk, H., Survey on Hospital Network Security and Privacy. Barco Ltd, 2004.
R. Dantu, Gupta, N., Dantu, V., and Morgan, Z., Effective CPR Procedure With Real-Time Evaluation and Feedback Using Smartphones , U.S. Patent US20150351647A12015.
R. Dantu, Clothier, G., and Atri, A., EAP Methods for Wireless Networks, Comput. Stand. Interfaces, vol. 29, pp. 289–301, 2007.PDF icon eap_methods_for_wireless_networks.pdf (336.97 KB)
R. Dantu, Oosterwijk, H., Kolan, P., and Husna, H., HIPAA: Securing Medical Networks, Network Security, vol. 2007, pp. 13–16, 2007.PDF icon securing_medical_networks.pdf (227.68 KB)
R. Dantu, A Testbed for Research and Development for Securing IP Multimedia Communication Services. NSF CRI PI Meeting, Boston, MA, 2007.
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Depth perception using blurring and its application in VLSI wafer probing, Machine Vision and Applications, vol. 5, pp. 35–45, 1992.
R. Dantu, Ester, G., and O'Connell, P., System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network, 2007.
R. Dantu, Ghosal, D., and Schulzrinne, H., Securing voice over IP, IEEE Network, vol. 20, pp. 4-5, 2006.
R. Dantu, Kolan, P., and Cangussu, J., Network risk management using attacker profiling, Security and Communication Networks, vol. 2, pp. 83–96, 2009.PDF icon network_risk_management_using_attacker_profiling.pdf (557.53 KB)
R. Dantu, Technology and Policy in securing Voice over IP. 2nd Workshop on Voice over IP Security, Washington, DC, 2005.
R. Dantu and Cangussu, J., An Architecture for Network Security Using Feedback Control, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon architecture_network_security_feedback_control.pdf (162.67 KB)
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system for providing wireless-specific services for a wireless access network, 2009.
R. Dantu, VoIP Security. Annual DFW Secret Service Agents Meeting, Dallas, Texas, USA, 2004.
R. Dantu and O'Connell, P., System and method for packet level distributed routing in fiber optic rings, 2001.
R. Dantu, Future Threats. NSF Workshop on Future Topics for Cyber Trust, 2006.

Pages