Publications

Export 42 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Book Chapter
P. Sroufe, Phithakkitnukoon, S., Dantu, R., and Cangussu, J., Email Shape Analysis, in Distributed Computing and Networking: 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010. Proceedings, K. Kant, Pemmaraju, S. V., Sivalingam, K. M., and Wu, J., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 18–29.PDF icon email_shape_analysis.pdf (259.8 KB)
H. Zhang and Dantu, R., Event Detection Based on Call Detail Records, in Behavior Computing: Modeling, Analysis, Mining and Decision, L. Cao and Yu, P., Eds. London: Springer London, 2012, pp. 305–316.PDF icon event_detection_call_detail_records.pdf (248.19 KB)
H. Zhang and Dantu, R., Smart Phone: Predicting the Next Call, in Behavior Computing: Modeling, Analysis, Mining and Decision, L. Cao and Yu, P., Eds. London: Springer London, 2012, pp. 317–325.PDF icon smartphone_predicting_next_call.pdf (232.12 KB)
Conference Paper
C. Claiborne, Fazeen, M., and Dantu, R., Android Sensor Data Anonymization, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
R. Dantu and Cangussu, J., An Architecture for Network Security Using Feedback Control, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon architecture_network_security_feedback_control.pdf (162.67 KB)
E. - A. Baatarjav, Dantu, R., Tang, Y., and Cangussu, J., BBN-based Privacy Management System for Facebook, in Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics, Piscataway, NJ, USA, 2009.PDF icon privacy_management_system_facebook.pdf (494.49 KB)
H. Zhang, Dantu, R., and Cangussu, J., Change Point Detection Based on Call Detail Records, in Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics, Piscataway, NJ, USA, 2009.PDF icon change_point_detection_call_detail_records.pdf (122.69 KB)
R. Dantu, Cangussu, J., and Yelimeli, A., Dynamic Control of Worm Propagation, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.PDF icon dynamic_control_of_worm.pdf (142.08 KB)
V. Chandrasekaran, Dantu, R., Gupta, N., Yang, X., and Wijesekera, D., Efficiency of Social Connection-based Routing in P2P VoIP Networks, in Proceedings of the 2Nd International Conference on COMmunication Systems and NETworks, Piscataway, NJ, USA, 2010.PDF icon efficiency_social_connection_routing_p2p_voip_networks.pdf (582.86 KB)
P. Sroufe, Phithakkitnukoon, S., Dantu, R., and Cangussu, J., Email Shape Analysis for Spam Botnet Detection, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2009.PDF icon email_shape_analysis_spam_botnet_detection.pdf (265.88 KB)
W. Fagen, Cangussu, J., and Dantu, R., Goliath: A Configurable Approach for Network Testing, in Testbeds and Research Infrastructure for the Development of Networks and Communities, 2007. TridentCom 2007. 3rd International Conference on, 2007.PDF icon goliath_configurable_approach_network_testing.pdf (127.03 KB)
Y. Madhavan, Cangussu, J., and Dantu, R., Penetration Testing for Spam Filters, in Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02, Seattle, WA, 2009.PDF icon pentesting_spam_filters.pdf (156.74 KB)
H. Zhang, Dantu, R., and Cangussu, J., Quantifying Reciprocity in Social Networks, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.PDF icon quantifying_reciprocity_social_networks.pdf (250.6 KB)
C. Claiborne, Ncube, C., and Dantu, R., Random anonymization of mobile sensor data: Modified Android framework, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon random_anonymization_mobile_sensor_data.pdf (371.83 KB)
R. Dantu, Cangussu, J., and Turi, J., Sensitivity Analysis of an Attack Containment Model, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon sensitivity_analysis_attack_containment_model.pdf (359.68 KB)
V. Chandrasekaran, Dantu, S., Kadiyala, P., Dantu, R., and Phithakkitnukoon, S., Socio-technical aspects of video phones, in 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010), 2010.PDF icon socio_technical_aspects_video_phones.pdf (635.82 KB)
Journal Article
R. Dantu and Cangussu, J., An Architecture for Automatic and Adaptive Defense, Journal of Information Privacy and Security, vol. 3, pp. 37-58, 2007.PDF icon architecture_automatic_adaptive_defense.pdf (252.72 KB)
S. Phithakkitnukoon, Dantu, R., Claxton, R., and Eagle, N., Behavior-based Adaptive Call Predictor, ACM Trans. Auton. Adapt. Syst., vol. 6, pp. 21:1–21:28, 2011.
R. Dantu, Palla, S., and Cangussu, J., Classification of phishers, Journal of Homeland Security and Emergency Management, vol. 5, 2008.PDF icon classification_phishers.pdf (410.26 KB)
V. Chandrasekaran, Dantu, R., Jonnada, S., Thiyagaraja, S., and Subbu, K., Cuffless Differential Blood Pressure Estimation Using Smart Phones, IEEE Transactions on Biomedical Engineering, vol. 60, pp. 1080 - 1089, 2013.
R. Dantu, Clothier, G., and Atri, A., EAP Methods for Wireless Networks, Comput. Stand. Interfaces, vol. 29, pp. 289–301, 2007.PDF icon eap_methods_for_wireless_networks.pdf (336.97 KB)
S. Haider, Cangussu, J., Cooper, K., and Dantu, R., Estimation of Defects Based on Defect Decay Model: ED^\{3\}M, IEEE Transactions on Software Engineering, vol. 34, pp. 336 - 356, 2008.
S. Haider, Cangussu, J., Cooper, K., and Dantu, R., Estimation of Defects Based on Defect Decay Model: ED^\{3\}M, IEEE Transactions on Software Engineering, vol. 34, pp. 336 - 356, 2008.
P. Sroufe, Tate, S., Dantu, R., and Cankaya, E., Experiences During a Collegiate Cyber Defense Competition, Journal of Applied Security Research, vol. 5, pp. 382–396, 2010.PDF icon experiences_ccdc.pdf (323.26 KB)

Pages