Publications

Export 13 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is A  [Clear All Filters]
2016
M. Jaynes, Dantu, R., Varriale, R., and Evans, N., Automating ECU Identification for Vehicle Security, in 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), 2016.PDF icon Automating_ECU_Identification_Vehicle_Security.pdf (306.52 KB)
2014
M. Fazeen and Dantu, R., Another free app: Does it have the right intentions?, in Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, 2014.
2013
C. Claiborne, Fazeen, M., and Dantu, R., Android Sensor Data Anonymization, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
2010
E. - A. Baatarjav, Amin, A., Dantu, R., and Gupta, N. Kant, Are You My Friend?, in Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2010.PDF icon are_you_my_friend.pdf (150.79 KB)
2009
X. Yang, Dantu, R., and Wijesekera, D., Achieving Peer-to-peer Telecommunication Services Through Social Hashing, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2009.PDF icon achieving_p2p_telecom_svcs_social_hashing.pdf (338.92 KB)
R. Dantu and Guturu, P., An Architecture for IP-based Next Generation Radio Access Network, Fourth-Generation Wireless Networks: Applications and Innovations: Applications and Innovations, p. 61, 2009.
L. Langle and Dantu, R., Are You a Safe Driver?, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.PDF icon are_you_safe_driver.pdf (388.67 KB)
2008
S. Phithakkitnukoon and Dantu, R., Adequacy of data for characterizing caller behavior, in Proceedings of KDD Inter. Workshop on Social Network Mining and Analysis (SNAKDD, 2008.PDF icon adequacy_data_characterize_caller_behavior.pdf (223.05 KB)
2005
R. Dantu and Cangussu, J., An Architecture for Network Security Using Feedback Control, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon architecture_network_security_feedback_control.pdf (162.67 KB)