Publications

Export 42 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
C. Claiborne, Fazeen, M., and Dantu, R., Android Sensor Data Anonymization, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
R. Dantu and Cangussu, J., An Architecture for Automatic and Adaptive Defense, Journal of Information Privacy and Security, vol. 3, pp. 37-58, 2007.PDF icon architecture_automatic_adaptive_defense.pdf (252.72 KB)
R. Dantu and Cangussu, J., An Architecture for Network Security Using Feedback Control, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon architecture_network_security_feedback_control.pdf (162.67 KB)
B
E. - A. Baatarjav, Dantu, R., Tang, Y., and Cangussu, J., BBN-based Privacy Management System for Facebook, in Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics, Piscataway, NJ, USA, 2009.PDF icon privacy_management_system_facebook.pdf (494.49 KB)
S. Phithakkitnukoon, Dantu, R., Claxton, R., and Eagle, N., Behavior-based Adaptive Call Predictor, ACM Trans. Auton. Adapt. Syst., vol. 6, pp. 21:1–21:28, 2011.
D
R. Dantu, Cangussu, J., and Yelimeli, A., Dynamic Control of Worm Propagation, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.PDF icon dynamic_control_of_worm.pdf (142.08 KB)
E
R. Dantu, Clothier, G., and Atri, A., EAP Methods for Wireless Networks, Comput. Stand. Interfaces, vol. 29, pp. 289–301, 2007.PDF icon eap_methods_for_wireless_networks.pdf (336.97 KB)
V. Chandrasekaran, Dantu, R., Gupta, N., Yang, X., and Wijesekera, D., Efficiency of Social Connection-based Routing in P2P VoIP Networks, in Proceedings of the 2Nd International Conference on COMmunication Systems and NETworks, Piscataway, NJ, USA, 2010.PDF icon efficiency_social_connection_routing_p2p_voip_networks.pdf (582.86 KB)
P. Sroufe, Phithakkitnukoon, S., Dantu, R., and Cangussu, J., Email Shape Analysis, in Distributed Computing and Networking: 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010. Proceedings, K. Kant, Pemmaraju, S. V., Sivalingam, K. M., and Wu, J., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 18–29.PDF icon email_shape_analysis.pdf (259.8 KB)
P. Sroufe, Phithakkitnukoon, S., Dantu, R., and Cangussu, J., Email Shape Analysis for Spam Botnet Detection, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2009.PDF icon email_shape_analysis_spam_botnet_detection.pdf (265.88 KB)
S. Haider, Cangussu, J., Cooper, K., and Dantu, R., Estimation of Defects Based on Defect Decay Model: ED^\{3\}M, IEEE Transactions on Software Engineering, vol. 34, pp. 336 - 356, 2008.
S. Haider, Cangussu, J., Cooper, K., and Dantu, R., Estimation of Defects Based on Defect Decay Model: ED^\{3\}M, IEEE Transactions on Software Engineering, vol. 34, pp. 336 - 356, 2008.
H. Zhang and Dantu, R., Event Detection Based on Call Detail Records, in Behavior Computing: Modeling, Analysis, Mining and Decision, L. Cao and Yu, P., Eds. London: Springer London, 2012, pp. 305–316.PDF icon event_detection_call_detail_records.pdf (248.19 KB)
P. Sroufe, Tate, S., Dantu, R., and Cankaya, E., Experiences During a Collegiate Cyber Defense Competition, Journal of Applied Security Research, vol. 5, pp. 382–396, 2010.PDF icon experiences_ccdc.pdf (323.26 KB)
F
R. Dantu, Cangussu, J., and Patwardhan, S., Fast Worm Containment Using Feedback Control, IEEE Transactions on Dependable and Secure Computing, vol. 4, pp. 119 - 136, 2007.
G
W. Fagen, Cangussu, J., and Dantu, R., Goliath: A Configurable Approach for Network Testing, in Testbeds and Research Infrastructure for the Development of Networks and Communities, 2007. TridentCom 2007. 3rd International Conference on, 2007.PDF icon goliath_configurable_approach_network_testing.pdf (127.03 KB)

Pages