Publications

Export 54 results:
[ Author(Desc)] Title Type Year
Filters: Author is Ram Dantu  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
R. Dantu, Schulzrinne, H., and Sroufe, P., Experiences in building a multi-university testbed for research in multimedia communications, in Parallel and Distributed Processing, 2008. IPDPS 2008. IEEE International Symposium on, 2008.PDF icon experiences_building_multi_university_testbed_research_multimedia_comms.pdf (452.67 KB)
R. Dantu, Securing IMS and VoIP. 3rd Workshop on Voice over IP Security, Berlin, Germany, 2006.
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system for providing supplementary services for a wireless access network, 2008.
R. Dantu, Panel: What do you mean security VoIP. IEEE ENTNET conference in conjunction with Supercom’2005, 2005.
R. Dantu, Cangussu, J., and Yelimeli, A., Dynamic Control of Worm Propagation, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.PDF icon dynamic_control_of_worm.pdf (142.08 KB)
R. Dantu and Joglekar, S., Collaborative Vision Using Networked Sensors, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
R. Dantu, Patel, R., Dimopoulos, N., and Al-Khalili, A., Vision Algorithms For VLSI Wafer Probing. 1990.
R. Dantu, VoIP Security. 3rd Annual Dallas Wireless Security Conference, Dallas, Texas, USA, 2004.
R. Dantu, Davis, R., and George, T., System and method for transporting in/ain signaling over an internet protocol (IP) network, 2006.
R. Dantu, A Testbed for Research and Development For Securing Multimedia Communication Services. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
R. Dantu, Loper, K., and Kolan, P., Risk Management Using Behavior Based Attack Graphs, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
R. Dantu and Cangussu, J., An Architecture for Automatic and Adaptive Defense, Journal of Information Privacy and Security, vol. 3, pp. 37-58, 2007.PDF icon architecture_automatic_adaptive_defense.pdf (252.72 KB)
R. Dantu, A Blueprint for Implementing Security in Radiology. AHRA Electronic Imaging Conference, 2005.
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system of control signaling for a wireless access network, 2008.
R. Dantu, Hospital Network Security: A Blueprint for Implementing Security in Radiology. First Annual Internet Security Conference, Plano, Texas, USA, 2005.
R. Dantu and Paul, A., True Matching of Employers' Needs, NICE Conference. Miami, Florida, 2018.
R. Dantu, Fahmy, S., Schulzrinne, H., and Cangussu, J., Issues and challenges in securing VoIP, Computers & Security, vol. 28, pp. 743-753, 2009.PDF icon Issues_and_challenges_in_securing_VoIP.pdf (527.79 KB)
R. Dantu, Abbas, K., O'Neill, M., and Mikler, A., Data centric modeling of environmental sensor networks, in Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004. IEEE, 2004.PDF icon data_centric_modeling_environment_sensor_networks.pdf (509.71 KB)
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Micromanipulator vision for wafer probing, IEEE Transactions on Semiconductor Manufacturing, vol. 2, pp. 114-117, 1989.
R. Dantu and Oosterwijk, H., Top Ten Recommendations for PACS Security Implementation, Health Imaging & IT Magazine, 2005.
R. Dantu, Patel, P., Choksi, O., Patel, A., Ali, M., Miernik, J., and Holur, B., Wireless router and method for processing traffic in a wireless communications network, 2006.
R. Dantu, Top 3 challenges in VoIP Security and Management. 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE), Vancouver, BC, Canada, 2006.
R. Dantu and Kolan, P., Risk Management Using Behavior Based Bayesian Networks, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon risk_mgmt_using_behavior_based_bayesian_networks.pdf (245.51 KB)
R. Dantu, Cangussu, J., and Turi, J., Sensitivity Analysis of an Attack Containment Model, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon sensitivity_analysis_attack_containment_model.pdf (359.68 KB)
R. Dantu, To Patch or Not to Patch, Health Imaging and Technology News Magazine, pp. 48-49, 2005.

Pages