Publications

Export 197 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
R. Dantu, VoIP: Are We Secured. VoIP: Are We Secured, Plano, TX, USA, 2004.
R. Dantu, CISE and Global Implications. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
R. Dantu, Kolan, P., and Cangussu, J., Network risk management using attacker profiling, Security and Communication Networks, vol. 2, pp. 83–96, 2009.PDF icon network_risk_management_using_attacker_profiling.pdf (557.53 KB)
R. Dantu and Cangussu, J., An Architecture for Automatic and Adaptive Defense, Journal of Information Privacy and Security, vol. 3, pp. 37-58, 2007.PDF icon architecture_automatic_adaptive_defense.pdf (252.72 KB)
R. Dantu, Patel, P., Patel, P., Garbuz, A., Miernik, J., Patel, A., and Holur, B., Method and system for providing services for wireless data calls, 2007.
R. Dantu, Panel: What do you mean security VoIP. IEEE ENTNET conference in conjunction with Supercom’2005, 2005.
R. Dantu, Securing IMS and VoIP. 3rd Workshop on Voice over IP Security, Berlin, Germany, 2006.
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Depth perception using blurring and its application in VLSI wafer probing, Machine Vision and Applications, vol. 5, pp. 35–45, 1992.
R. Dantu, Clothier, G., and Atri, A., EAP Methods for Wireless Networks, Comput. Stand. Interfaces, vol. 29, pp. 289–301, 2007.PDF icon eap_methods_for_wireless_networks.pdf (336.97 KB)
R. Dantu, Chandrasekaran, V., and Gupta, N., 911 services and vital sign measurement utilizing mobile phone sensors and applications, 2016.
R. Dantu and Kolan, P., Detecting Spam in VoIP Networks, in Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, Berkeley, CA, USA, 2005.PDF icon spam_in_voip_networks.pdf (269.37 KB)
R. Dantu, VoIP Security. 3rd Annual Dallas Wireless Security Conference, Dallas, Texas, USA, 2004.
R. Dantu, Davis, R., and George, T., System and method for transporting in/ain signaling over an internet protocol (IP) network, 2006.
R. Dantu, A Testbed for Research and Development For Securing Multimedia Communication Services. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
R. Dantu and Cangussu, J., An Architecture for Network Security Using Feedback Control, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon architecture_network_security_feedback_control.pdf (162.67 KB)
R. Dantu, Cangussu, J., and Patwardhan, S., Fast Worm Containment Using Feedback Control, IEEE Transactions on Dependable and Secure Computing, vol. 4, pp. 119 - 136, 2007.
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system for providing supplementary services for a wireless access network, 2008.
R. Dantu, Kolan, P., Akl, R., and Loper, K., Classification of Attributes and Behavior in Risk Management Using Bayesian Networks, in 2007 IEEE International Conference on Intelligence and Security Informatics (ISI) , New Brunswick, NJ, 2007.
R. Dantu, Hospital Network Security: A Blueprint for Implementing Security in Radiology. First Annual Internet Security Conference, Plano, Texas, USA, 2005.
R. Dantu and Guturu, P., An Architecture for IP-based Next Generation Radio Access Network, Fourth-Generation Wireless Networks: Applications and Innovations: Applications and Innovations, p. 61, 2009.
R. Dantu, A Blueprint for Implementing Security in Radiology. AHRA Electronic Imaging Conference, 2005.
R. Dantu, Dimopoulos, N., Li, K., Patel, R., and Al-Khalili, A., Parallel algorithms for low-level vision on the homogeneous multiprocessor, Computers & Electrical Engineering, vol. 20, pp. 51 - 60, 1994.
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system for providing wireless-specific services for a wireless access network, 2009.
R. Dantu, Loper, K., and Kolan, P., Risk Management Using Behavior Based Attack Graphs, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
R. Dantu and Oosterwijk, H., Top Ten Recommendations for PACS Security Implementation, Health Imaging & IT Magazine, 2005.

Pages