Publications

Export 173 results:
Author [ Title(Desc)] Type Year
Filters: Author is Ram Dantu  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
X. Yang, Dantu, R., and Wijesekera, D., Achieving Peer-to-peer Telecommunication Services Through Social Hashing, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2009.PDF icon achieving_p2p_telecom_svcs_social_hashing.pdf (338.92 KB)
S. Phithakkitnukoon and Dantu, R., Adequacy of data for characterizing caller behavior, in Proceedings of KDD Inter. Workshop on Social Network Mining and Analysis (SNAKDD, 2008.PDF icon adequacy_data_characterize_caller_behavior.pdf (223.05 KB)
C. Claiborne, Fazeen, M., and Dantu, R., Android Sensor Data Anonymization, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
M. Fazeen and Dantu, R., Another free app: Does it have the right intentions?, in Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, 2014.
R. Dantu and Cangussu, J., An Architecture for Automatic and Adaptive Defense, Journal of Information Privacy and Security, vol. 3, pp. 37-58, 2007.PDF icon architecture_automatic_adaptive_defense.pdf (252.72 KB)
R. Dantu and Guturu, P., An Architecture for IP-based Next Generation Radio Access Network, Fourth-Generation Wireless Networks: Applications and Innovations: Applications and Innovations, p. 61, 2009.
R. Dantu and Cangussu, J., An Architecture for Network Security Using Feedback Control, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon architecture_network_security_feedback_control.pdf (162.67 KB)
L. Langle and Dantu, R., Are You a Safe Driver?, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.PDF icon are_you_safe_driver.pdf (388.67 KB)
E. - A. Baatarjav, Amin, A., Dantu, R., and Gupta, N. Kant, Are You My Friend?, in Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2010.PDF icon are_you_my_friend.pdf (150.79 KB)
P. Kolan, Vaithilingam, R., and Dantu, R., Automatic Calibration Using Receiver Operating Characteristics Curves, in 2007 2nd International Conference on Communication Systems Software and Middleware, 2007.
J. Vempati and Dantu, R., Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an Attack, in 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), 2018.PDF icon Auto_Feedback_Ctrl_Graceful_Degradation_RealTime_Svcs_Attack.pdf (1.29 MB)
M. Jaynes, Dantu, R., Varriale, R., and Evans, N., Automating ECU Identification for Vehicle Security, in 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), 2016.PDF icon Automating_ECU_Identification_Vehicle_Security.pdf (306.52 KB)
B
E. - A. Baatarjav, Dantu, R., Tang, Y., and Cangussu, J., BBN-based Privacy Management System for Facebook, in Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics, Piscataway, NJ, USA, 2009.PDF icon privacy_management_system_facebook.pdf (494.49 KB)
H. Husna, Phithakkitnukoon, S., Palla, S., and Dantu, R., Behavior analysis of spam botnets, in 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08), 2008.PDF icon behavior_analysis_spam_botnets.pdf (560.82 KB)
S. Phithakkitnukoon, Husna, H., and Dantu, R., Behavioral Entropy of a Cellular Phone User, in Social Computing, Behavioral Modeling, and Prediction, H. Liu, Salerno, J. J., and Young, M. J., Eds. Boston, MA: Springer US, 2008, pp. 160–167.PDF icon behavioral_entropy_cellphone_user.pdf (665.52 KB)
S. Phithakkitnukoon, Dantu, R., Claxton, R., and Eagle, N., Behavior-based Adaptive Call Predictor, ACM Trans. Auton. Adapt. Syst., vol. 6, pp. 21:1–21:28, 2011.
R. Dantu, A Blueprint for Implementing Security in Radiology. AHRA Electronic Imaging Conference, 2005.
M. Thompson and Dantu, R., Bridging the Gap: Developing Innovative Minds Early On for Cybersecurity. 2018.
C
P. Kolan and Dantu, R., Call Algebra, in 2008 5th IEEE Consumer Communications and Networking Conference, 2008.PDF icon call_algebra.pdf (294.13 KB)
G. Bajwa and Dantu, R., Cerebral Autoregulation Assessment Using Electroencephalograms, in Proceedings of the 8th International Conference on Body Area Networks, ICST, Brussels, Belgium, Belgium, 2013.PDF icon cerebral_autoregulation_assessment_using_electroencephalogram.pdf (659.57 KB)
H. Zhang, Dantu, R., and Cangussu, J., Change Point Detection Based on Call Detail Records, in Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics, Piscataway, NJ, USA, 2009.PDF icon change_point_detection_call_detail_records.pdf (122.69 KB)
R. Dantu, CISE and Global Implications. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
R. Dantu, Kolan, P., Akl, R., and Loper, K., Classification of Attributes and Behavior in Risk Management Using Bayesian Networks, in 2007 IEEE International Conference on Intelligence and Security Informatics (ISI) , New Brunswick, NJ, 2007.
R. Dantu, Palla, S., and Cangussu, J., Classification of phishers, Journal of Homeland Security and Emergency Management, vol. 5, 2008.PDF icon classification_phishers.pdf (410.26 KB)

Pages