Publications

Export 35 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
Journal Article
S. Thiyagaraja, Dantu, R., Shrestha, P., Chitnis, A., Thompson, M., Anumandla, P., Sarma, T., and Dantu, S., A novel heart-mobile interface for detection and classification of heart sounds, Biomedical Signal Processing and Control, vol. 45, pp. 313 - 324, 2018.PDF icon 1-s2.0-S1746809418301101-main.pdf (2.82 MB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Chitnis, A., Thompson, M., Anumandla, P., Sarma, T., and Dantu, S., A novel heart-mobile interface for detection and classification of heart sounds, Biomedical Signal Processing and Control, vol. 45, pp. 313 - 324, 2018.PDF icon 1-s2.0-S1746809418301101-main.pdf (2.82 MB)
Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals, Journal of Internet Services and Information Security, vol. 6, pp. 20-36, 2016.PDF icon Inside_Mind_Of_Insider.pdf (1023.25 KB)
P. Sroufe, Tate, S., Dantu, R., and Cankaya, E., Experiences During a Collegiate Cyber Defense Competition, Journal of Applied Security Research, vol. 5, pp. 382–396, 2010.PDF icon experiences_ccdc.pdf (323.26 KB)
V. Chandrasekaran, Dantu, R., Jonnada, S., Thiyagaraja, S., and Subbu, K., Cuffless Differential Blood Pressure Estimation Using Smart Phones, IEEE Transactions on Biomedical Engineering, vol. 60, pp. 1080 - 1089, 2013.
Conference Paper
J. Talkington, Dantu, R., and Morozov, K., Verifying OAuth Implementations Through Encrypted Network Analysis, in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, 2019.PDF icon Verifying OAuth Implementations Through Encrypted Network.pdf (1.13 MB)
J. Vempati, Dantu, R., and Thompson, M., Uninterrupted Video Surveillance in the Face of an Attack, in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018.PDF icon Uninterrupted_Video_Surveillance_Attack.pdf (681.67 KB)
G. Bajwa, Fazeen, M., Dantu, R., and Tanpure, S., Unintentional bugs to vulnerability mapping in Android applications, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon unintentional_bugs_vulnerability_mapping_android_apps.pdf (182.24 KB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Trusted AI with Blockchain to Empower Metaverse, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Trusted_AI_with_Blockchain_to_Empower_Metaverse.pdf (1.04 MB)
Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., Towards Insider Threat Detection Using Psychophysiological Signals, in Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, New York, NY, USA, 2015.PDF icon Towards_Insider_Threat_Detection_Psychophysiological_signals.pdf (705.73 KB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Smarter Contracts to Predict using Deep-Learning Algorithms, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Smarter_Contracts_to_Predict_using_Deep-Learning_Algorithms.pdf (1.01 MB)
S. Thiyagaraja, Vempati, J., Dantu, R., Sarma, T., and Dantu, S., Smart phone monitoring of second heart sound split, in 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014.PDF icon smartphone_monitoring_second_heart_sound_split.pdf (663.54 KB)
R. Dantu, Cangussu, J., and Turi, J., Sensitivity Analysis of an Attack Containment Model, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon sensitivity_analysis_attack_containment_model.pdf (359.68 KB)
J. Talkington and Dantu, R., Realizing Optimal Chest Compression Fraction During Cardiopulmonary Resuscitation, in 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2016.PDF icon Realizing_Optimal_Chest_Compression_Fraction_CPR.pdf (222.05 KB)
J. Germain, Dantu, R., and Thompson, M., Qubit Reset and Refresh: A Gamechanger for Random Number Generation, in Twelveth ACM Conference on Data and Application Security and Privacy (CODASPY ), 2022.PDF icon Qubit Reset and Refresh: A Gamechanger for Random Number Generation.pdf (1.08 MB)
J. Germain, Dantu, R., Thompson, M., and Dockendorf, M., Quantum Networks: Reset-and-Reuse can be a Game-changer for Entanglement via Distillation, in 2022 IEEE International Conference on Quantum Computing and Engineering (QCE), 2022.PDF icon Quantum_Networks_Reset-and-Reuse_can_be_a_Game-changer_for_Entanglement_via_Distillation.pdf (1.03 MB)
H. Takabi, Hashem, Y., and Dantu, R., Prediction of human error using eye movements patterns for unintentional insider threat detection, in 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 2018.PDF icon Predict_Human_Error_Eye_Movement_Unintentional_Insider_Threat.pdf (102.75 KB)
N. Sen, Dantu, R., Vempati, J., and Thompson, M., Performance Analysis of Elliptic Curves for Real-Time Video Encryption, in 2018 National Cyber Summit (NCS), 2018.PDF icon Performance_Analysis_Elliptic_Curves_RealTime_Video_Encryption.pdf (382.64 KB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Thompson, M., and Smith, C., Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.PDF icon Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf (348.53 KB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Thompson, M., and Smith, C., Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.PDF icon Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf (348.53 KB)
Y. Hashem, Takabi, H., Dantu, R., and Nielsen, R., A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats, in Proceedings of the 2017 International Workshop on Managing Insider Security Threats, New York, NY, USA, 2017.PDF icon Multimodal_NeuroPhysiological_Study_Malicious_Insider_Threat.pdf (3.77 MB)
S. Badruddoja, Dantu, R., He, Y., Upadhayay, K., and Thompson, M., Making Smart Contracts Smarter, in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 2021.PDF icon Making_Smart_Contracts_Smarter.pdf (998.18 KB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Making Smart Contracts Predict and Scale, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Making_Smart_Contracts_Predict_and_Scale.pdf (1.4 MB)

Pages