Publications

Export 8 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
M. Thompson and Dantu, R., Bridging the Gap: Developing Innovative Minds Early On for Cybersecurity. 2018.
S. Thiyagaraja, Vempati, J., Dantu, R., Sarma, T., and Dantu, S., Smart phone monitoring of second heart sound split, in 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014.PDF icon smartphone_monitoring_second_heart_sound_split.pdf (663.54 KB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Chitnis, A., Thompson, M., Anumandla, P., Sarma, T., and Dantu, S., A novel heart-mobile interface for detection and classification of heart sounds, Biomedical Signal Processing and Control, vol. 45, pp. 313 - 324, 2018.PDF icon 1-s2.0-S1746809418301101-main.pdf (2.82 MB)
S. Thiyagaraja and Dantu, R., Finger Blood Flow Monitoring Using Smart Phones, in Proceedings of the 8th International Conference on Body Area Networks, ICST, Brussels, Belgium, Belgium, 2013.PDF icon finger_blood_flow_monitoring_smartphones.pdf (216.36 KB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Thompson, M., and Smith, C., Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.PDF icon Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf (348.53 KB)
J. Talkington and Dantu, R., Realizing Optimal Chest Compression Fraction During Cardiopulmonary Resuscitation, in 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2016.PDF icon Realizing_Optimal_Chest_Compression_Fraction_CPR.pdf (222.05 KB)
J. Talkington, Dantu, R., and Morozov, K., Verifying OAuth Implementations Through Encrypted Network Analysis, in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, 2019.PDF icon Verifying OAuth Implementations Through Encrypted Network.pdf (1.13 MB)
H. Takabi, Hashem, Y., and Dantu, R., Prediction of human error using eye movements patterns for unintentional insider threat detection, in 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 2018.PDF icon Predict_Human_Error_Eye_Movement_Unintentional_Insider_Threat.pdf (102.75 KB)