Publications

Export 197 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
T. Bucuti and Dantu, R., An opportunistic encryption extension for the DNS protocol, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon opportunistic_encryption_extension_dns_protocols.pdf (185.13 KB)
C
V. Chandrasekaran, Dantu, R., and Subbu, K., Socio-technical Aspects of Remote Media Control for a NG9-1-1 System, Multimedia Tools Appl., vol. 62, pp. 733–759, 2013.PDF icon sociotechnical_aspects_rmc_ng911_system.pdf (916.49 KB)
V. Chandrasekaran, Dantu, S., Kadiyala, P., Dantu, R., and Phithakkitnukoon, S., Socio-technical aspects of video phones, in 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010), 2010.PDF icon socio_technical_aspects_video_phones.pdf (635.82 KB)
V. Chandrasekaran, Dantu, R., Gupta, N., Yang, X., and Wijesekera, D., Efficiency of Social Connection-based Routing in P2P VoIP Networks, in Proceedings of the 2Nd International Conference on COMmunication Systems and NETworks, Piscataway, NJ, USA, 2010.PDF icon efficiency_social_connection_routing_p2p_voip_networks.pdf (582.86 KB)
V. Chandrasekaran, Dantu, R., Jonnada, S., Thiyagaraja, S., and Subbu, K., Cuffless Differential Blood Pressure Estimation Using Smart Phones, IEEE Transactions on Biomedical Engineering, vol. 60, pp. 1080 - 1089, 2013.
C. Claiborne, Fazeen, M., and Dantu, R., Android Sensor Data Anonymization, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
C. Claiborne, Ncube, C., and Dantu, R., Random anonymization of mobile sensor data: Modified Android framework, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon random_anonymization_mobile_sensor_data.pdf (371.83 KB)
D
R. Dantu, VoIP: Are We Secured. VoIP: Are We Secured, Plano, TX, USA, 2004.
R. Dantu, Method and system of integrated rate control for a traffic flow across wireline and wireless networks, 2005.
R. Dantu, CISE and Global Implications. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
R. Dantu, Kolan, P., and Cangussu, J., Network risk management using attacker profiling, Security and Communication Networks, vol. 2, pp. 83–96, 2009.PDF icon network_risk_management_using_attacker_profiling.pdf (557.53 KB)
R. Dantu and Cangussu, J., An Architecture for Automatic and Adaptive Defense, Journal of Information Privacy and Security, vol. 3, pp. 37-58, 2007.PDF icon architecture_automatic_adaptive_defense.pdf (252.72 KB)
R. Dantu, Patel, P., Patel, P., Garbuz, A., Miernik, J., Patel, A., and Holur, B., Method and system for providing services for wireless data calls, 2007.
R. Dantu, Panel: What do you mean security VoIP. IEEE ENTNET conference in conjunction with Supercom’2005, 2005.
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Depth perception using blurring and its application in VLSI wafer probing, Machine Vision and Applications, vol. 5, pp. 35–45, 1992.
R. Dantu, Clothier, G., and Atri, A., EAP Methods for Wireless Networks, Comput. Stand. Interfaces, vol. 29, pp. 289–301, 2007.PDF icon eap_methods_for_wireless_networks.pdf (336.97 KB)
R. Dantu, Securing IMS and VoIP. 3rd Workshop on Voice over IP Security, Berlin, Germany, 2006.
R. Dantu, Chandrasekaran, V., and Gupta, N., 911 services and vital sign measurement utilizing mobile phone sensors and applications, 2016.
R. Dantu and Kolan, P., Detecting Spam in VoIP Networks, in Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, Berkeley, CA, USA, 2005.PDF icon spam_in_voip_networks.pdf (269.37 KB)
R. Dantu, VoIP Security. 3rd Annual Dallas Wireless Security Conference, Dallas, Texas, USA, 2004.
R. Dantu, Davis, R., and George, T., System and method for transporting in/ain signaling over an internet protocol (IP) network, 2006.
R. Dantu, A Testbed for Research and Development For Securing Multimedia Communication Services. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
R. Dantu, Cangussu, J., and Patwardhan, S., Fast Worm Containment Using Feedback Control, IEEE Transactions on Dependable and Secure Computing, vol. 4, pp. 119 - 136, 2007.
R. Dantu and Cangussu, J., An Architecture for Network Security Using Feedback Control, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon architecture_network_security_feedback_control.pdf (162.67 KB)
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system for providing supplementary services for a wireless access network, 2008.

Pages