Publications

Export 197 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
R. Dantu, Ester, G., and O'Connell, P., System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network, 2007.
R. Dantu, Security and Privacy issues in Radiology. NSF Cyber Trust PI meeting, 2005.
R. Dantu, Oosterwijk, H., Kolan, P., and Husna, H., HIPAA: Securing Medical Networks, Network Security, vol. 2007, pp. 13–16, 2007.PDF icon securing_medical_networks.pdf (227.68 KB)
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Micromanipulator vision for wafer probing, IEEE Transactions on Semiconductor Manufacturing, vol. 2, pp. 114-117, 1989.
R. Dantu, Fahmy, S., Schulzrinne, H., and Cangussu, J., Issues and challenges in securing VoIP, Computers & Security, vol. 28, pp. 743-753, 2009.PDF icon Issues_and_challenges_in_securing_VoIP.pdf (527.79 KB)
R. Dantu and Paul, A., True Matching of Employers' Needs, NICE Conference. Miami, Florida, 2018.
R. Dantu and Joglekar, S., Collaborative Vision Using Networked Sensors, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
R. Dantu, Differences between VoIP and Data Security. Internet2 workshop on VoIP, Austin, Texas, USA, 2004.
R. Dantu, VoIP: Are We Secured. VoIP: Are We Secured, Plano, TX, USA, 2004.
R. Dantu, Method and system of integrated rate control for a traffic flow across wireline and wireless networks, 2005.
R. Dantu, CISE and Global Implications. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
R. Dantu, Kolan, P., and Cangussu, J., Network risk management using attacker profiling, Security and Communication Networks, vol. 2, pp. 83–96, 2009.PDF icon network_risk_management_using_attacker_profiling.pdf (557.53 KB)
R. Dantu, Patel, P., Patel, P., Garbuz, A., Miernik, J., Patel, A., and Holur, B., Method and system for providing services for wireless data calls, 2007.
R. Dantu and Cangussu, J., An Architecture for Automatic and Adaptive Defense, Journal of Information Privacy and Security, vol. 3, pp. 37-58, 2007.PDF icon architecture_automatic_adaptive_defense.pdf (252.72 KB)
R. Dantu, Panel: What do you mean security VoIP. IEEE ENTNET conference in conjunction with Supercom’2005, 2005.
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Depth perception using blurring and its application in VLSI wafer probing, Machine Vision and Applications, vol. 5, pp. 35–45, 1992.
R. Dantu, Clothier, G., and Atri, A., EAP Methods for Wireless Networks, Comput. Stand. Interfaces, vol. 29, pp. 289–301, 2007.PDF icon eap_methods_for_wireless_networks.pdf (336.97 KB)
R. Dantu, Securing IMS and VoIP. 3rd Workshop on Voice over IP Security, Berlin, Germany, 2006.
R. Dantu, Chandrasekaran, V., and Gupta, N., 911 services and vital sign measurement utilizing mobile phone sensors and applications, 2016.
R. Dantu and Kolan, P., Detecting Spam in VoIP Networks, in Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, Berkeley, CA, USA, 2005.PDF icon spam_in_voip_networks.pdf (269.37 KB)
R. Dantu, VoIP Security. 3rd Annual Dallas Wireless Security Conference, Dallas, Texas, USA, 2004.
R. Dantu, Davis, R., and George, T., System and method for transporting in/ain signaling over an internet protocol (IP) network, 2006.
R. Dantu, A Testbed for Research and Development For Securing Multimedia Communication Services. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
R. Dantu, Cangussu, J., and Patwardhan, S., Fast Worm Containment Using Feedback Control, IEEE Transactions on Dependable and Secure Computing, vol. 4, pp. 119 - 136, 2007.
R. Dantu and Cangussu, J., An Architecture for Network Security Using Feedback Control, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon architecture_network_security_feedback_control.pdf (162.67 KB)

Pages