UNT | University of North Texas

Search form

Publications

2004
R. Dantu and Joglekar, S., Collaborative Vision Using Networked Sensors, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
R. Dantu, Abbas, K., O'Neill, M., and Mikler, A., Data centric modeling of environmental sensor networks, in Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004. IEEE, 2004.PDF icon data_centric_modeling_environment_sensor_networks.pdf (509.71 KB)
R. Dantu, Differences between VoIP and Data Security. Internet2 workshop on VoIP, Austin, Texas, USA, 2004.
R. Dantu, Cangussu, J., and Yelimeli, A., Dynamic Control of Worm Propagation, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.PDF icon dynamic_control_of_worm.pdf (142.08 KB)
L. Yang, Dantu, R., Anderson, T., and Gopal, R., Forwarding and Control Element Separation (ForCES) Framework. RFC Editor, 2004.PDF icon rfc3746.pdf (123.54 KB)
R. Dantu, Loper, K., and Kolan, P., Risk Management Using Behavior Based Attack Graphs, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
R. Dantu and Oosterwijk, H., Survey on Hospital Network Security and Privacy. Barco Ltd, 2004.
R. Dantu, VoIP: Are We Secured. VoIP: Are We Secured, Plano, TX, USA, 2004.
R. Dantu, VoIP Security. 3rd Annual Dallas Wireless Security Conference, Dallas, Texas, USA, 2004.
R. Dantu, VoIP Security. Annual DFW Secret Service Agents Meeting, Dallas, Texas, USA, 2004.
2005
R. Dantu and Cangussu, J., An Architecture for Network Security Using Feedback Control, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon architecture_network_security_feedback_control.pdf (162.67 KB)
R. Dantu, A Blueprint for Implementing Security in Radiology. AHRA Electronic Imaging Conference, 2005.
R. Dantu and Kolan, P., Detecting Spam in VoIP Networks, in Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, Berkeley, CA, USA, 2005.PDF icon spam_in_voip_networks.pdf (269.37 KB)
R. Dantu, Hospital Network Security: A Blueprint for Implementing Security in Radiology. First Annual Internet Security Conference, Plano, Texas, USA, 2005.
R. Dantu, Panel: What do you mean security VoIP. IEEE ENTNET conference in conjunction with Supercom’2005, 2005.
R. Dantu and Kolan, P., Risk Management Using Behavior Based Bayesian Networks, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon risk_mgmt_using_behavior_based_bayesian_networks.pdf (245.51 KB)
R. Dantu, Security and Privacy issues in Radiology. NSF Cyber Trust PI meeting, 2005.
R. Dantu, Cangussu, J., and Turi, J., Sensitivity Analysis of an Attack Containment Model, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon sensitivity_analysis_attack_containment_model.pdf (359.68 KB)
T. George, Bidulock, B., Dantu, R., Schwarzbauer, H., and Morneault, K., Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Peer-to-Peer Adaptation Layer (M2PA). 2005.
R. Dantu, Technology and Policy in securing Voice over IP. 2nd Workshop on Voice over IP Security, Washington, DC, 2005.
R. Dantu, To Patch or Not to Patch, Health Imaging and Technology News Magazine, pp. 48-49, 2005.
R. Dantu and Oosterwijk, H., Top Ten Recommendations for PACS Security Implementation, Health Imaging & IT Magazine, 2005.
2006
R. Dantu, CISE and Global Implications. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
S. Palla and Dantu, R., Detecting phishing in emails, in Proceedings of MIT Spam Conference, 2006.PDF icon detect_phishing_email.pdf (202.25 KB)

Pages