Skip to main content
UNT
Network Security Lab (NSL)
Menu
Search form
Search
Search
Call us
Contact Us
UNT Map
Home
News
People
Projects
Publications
Grants
Quicklinks
Back
MyUNT
Blackboard
EagleConnect
University Directory
UNT Map
Jobs at UNT
University of North Texas
Network Security Lab (NSL)
Search form
Search
Search
MyUNT
Blackboard
EagleConnect
UNT Directory
UNT Map
Jobs at UNT
Home
News
People
Projects
Publications
Grants
MyUNT
Blackboard
EagleConnect
UNT Directory
UNT Map
Jobs at UNT
Search form
Search
Search
Home
News
People
Projects
Publications
Grants
Network Security Lab (NSL)
You are here
Home
Publications
Publications
Export 4 results:
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
Author
Title
Type
[
Year
]
Filters:
Keyword
is
computer network security
[Clear All Filters]
2018
J. Vempati
and
Dantu, R.
,
“
Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an Attack
”
, in
2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC)
, 2018.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
Auto_Feedback_Ctrl_Graceful_Degradation_RealTime_Svcs_Attack.pdf
(1.29 MB)
J. Vempati
,
Dantu, R.
, and
Thompson, M.
,
“
Uninterrupted Video Surveillance in the Face of an Attack
”
, in
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
, 2018.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
Uninterrupted_Video_Surveillance_Attack.pdf
(681.67 KB)
2015
T. Bucuti
and
Dantu, R.
,
“
An opportunistic encryption extension for the DNS protocol
”
, in
Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on
, 2015.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
opportunistic_encryption_extension_dns_protocols.pdf
(185.13 KB)
Q. Mayo
,
Bryce, R.
, and
Dantu, R.
,
“
PhD Forum: A System Identification Approach to Monitoring Network Traffic Security
”
, in
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
, 2015.
DOI
Google Scholar
BibTeX
RTF
Tagged
MARC
EndNote XML
RIS
System_Identification_Approach_Monitor_Network_Traffic_Sec.pdf
(146.01 KB)
Top