Publications

Export 35 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is T  [Clear All Filters]
2022
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Making Smart Contracts Predict and Scale, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Making_Smart_Contracts_Predict_and_Scale.pdf (1.4 MB)
J. Germain, Dantu, R., Thompson, M., and Dockendorf, M., Quantum Networks: Reset-and-Reuse can be a Game-changer for Entanglement via Distillation, in 2022 IEEE International Conference on Quantum Computing and Engineering (QCE), 2022.PDF icon Quantum_Networks_Reset-and-Reuse_can_be_a_Game-changer_for_Entanglement_via_Distillation.pdf (1.03 MB)
J. Germain, Dantu, R., and Thompson, M., Qubit Reset and Refresh: A Gamechanger for Random Number Generation, in Twelveth ACM Conference on Data and Application Security and Privacy (CODASPY ), 2022.PDF icon Qubit Reset and Refresh: A Gamechanger for Random Number Generation.pdf (1.08 MB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Smarter Contracts to Predict using Deep-Learning Algorithms, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Smarter_Contracts_to_Predict_using_Deep-Learning_Algorithms.pdf (1.01 MB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Trusted AI with Blockchain to Empower Metaverse, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Trusted_AI_with_Blockchain_to_Empower_Metaverse.pdf (1.04 MB)
2021
S. Badruddoja, Dantu, R., He, Y., Upadhayay, K., and Thompson, M., Making Smart Contracts Smarter, in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 2021.PDF icon Making_Smart_Contracts_Smarter.pdf (998.18 KB)
2018
M. Thompson and Dantu, R., Bridging the Gap: Developing Innovative Minds Early On for Cybersecurity. 2018.
J. Davis, Khalfan, S., Tiene, R., and Dantu, R., The Future is Connected: How Can it be Cyber Secure?, Cyber Future Summit. 2018.
S. Thiyagaraja, Dantu, R., Shrestha, P., Chitnis, A., Thompson, M., Anumandla, P., Sarma, T., and Dantu, S., A novel heart-mobile interface for detection and classification of heart sounds, Biomedical Signal Processing and Control, vol. 45, pp. 313 - 324, 2018.PDF icon 1-s2.0-S1746809418301101-main.pdf (2.82 MB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Chitnis, A., Thompson, M., Anumandla, P., Sarma, T., and Dantu, S., A novel heart-mobile interface for detection and classification of heart sounds, Biomedical Signal Processing and Control, vol. 45, pp. 313 - 324, 2018.PDF icon 1-s2.0-S1746809418301101-main.pdf (2.82 MB)
N. Sen, Dantu, R., Vempati, J., and Thompson, M., Performance Analysis of Elliptic Curves for Real-Time Video Encryption, in 2018 National Cyber Summit (NCS), 2018.PDF icon Performance_Analysis_Elliptic_Curves_RealTime_Video_Encryption.pdf (382.64 KB)
H. Takabi, Hashem, Y., and Dantu, R., Prediction of human error using eye movements patterns for unintentional insider threat detection, in 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 2018.PDF icon Predict_Human_Error_Eye_Movement_Unintentional_Insider_Threat.pdf (102.75 KB)
J. Vempati, Dantu, R., and Thompson, M., Uninterrupted Video Surveillance in the Face of an Attack, in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018.PDF icon Uninterrupted_Video_Surveillance_Attack.pdf (681.67 KB)
2017
J. Vempati, Thompson, M., and Dantu, R., Feedback Control for Resiliency in Face of an Attack, in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, New York, NY, USA, 2017.PDF icon Feedback_Control_Resiliency_Face_Attack.pdf (1.02 MB)
Y. Hashem, Takabi, H., and Dantu, R., Insider Threat Detection Based on Users’ Mouse Movements and Keystrokes Behavior, in Secure Knowledge Management Workshop, 2017.PDF icon Insider_Threat_.Detection_User_Mouse_Movement_Keystroke_Behavior.pdf (112.09 KB)
Y. Hashem, Takabi, H., Dantu, R., and Nielsen, R., A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats, in Proceedings of the 2017 International Workshop on Managing Insider Security Threats, New York, NY, USA, 2017.PDF icon Multimodal_NeuroPhysiological_Study_Malicious_Insider_Threat.pdf (3.77 MB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Thompson, M., and Smith, C., Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.PDF icon Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf (348.53 KB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Thompson, M., and Smith, C., Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.PDF icon Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf (348.53 KB)
2015
L. Widick, Talkington, J., Bajwa, G., and Dantu, R., A framework for secured collaboration in mHealth, in Collaboration Technologies and Systems (CTS), 2015 International Conference on, 2015.PDF icon framework_secured_collaboration_mhealth.pdf (404.08 KB)
Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., Towards Insider Threat Detection Using Psychophysiological Signals, in Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, New York, NY, USA, 2015.PDF icon Towards_Insider_Threat_Detection_Psychophysiological_signals.pdf (705.73 KB)

Pages