Publications

Export 197 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
R. Dantu, Patel, P., Patel, P., Garbuz, A., Miernik, J., Patel, A., and Holur, B., Method and system for providing services for wireless data calls, 2007.
R. Dantu, Panel: What do you mean security VoIP. IEEE ENTNET conference in conjunction with Supercom’2005, 2005.
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Depth perception using blurring and its application in VLSI wafer probing, Machine Vision and Applications, vol. 5, pp. 35–45, 1992.
R. Dantu, Clothier, G., and Atri, A., EAP Methods for Wireless Networks, Comput. Stand. Interfaces, vol. 29, pp. 289–301, 2007.PDF icon eap_methods_for_wireless_networks.pdf (336.97 KB)
R. Dantu, Securing IMS and VoIP. 3rd Workshop on Voice over IP Security, Berlin, Germany, 2006.
R. Dantu, Chandrasekaran, V., and Gupta, N., 911 services and vital sign measurement utilizing mobile phone sensors and applications, 2016.
R. Dantu and Kolan, P., Detecting Spam in VoIP Networks, in Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, Berkeley, CA, USA, 2005.PDF icon spam_in_voip_networks.pdf (269.37 KB)
R. Dantu, VoIP Security. 3rd Annual Dallas Wireless Security Conference, Dallas, Texas, USA, 2004.
R. Dantu, Davis, R., and George, T., System and method for transporting in/ain signaling over an internet protocol (IP) network, 2006.
R. Dantu, A Testbed for Research and Development For Securing Multimedia Communication Services. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
R. Dantu, Cangussu, J., and Patwardhan, S., Fast Worm Containment Using Feedback Control, IEEE Transactions on Dependable and Secure Computing, vol. 4, pp. 119 - 136, 2007.
R. Dantu and Cangussu, J., An Architecture for Network Security Using Feedback Control, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon architecture_network_security_feedback_control.pdf (162.67 KB)
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system for providing supplementary services for a wireless access network, 2008.
R. Dantu, Hospital Network Security: A Blueprint for Implementing Security in Radiology. First Annual Internet Security Conference, Plano, Texas, USA, 2005.
R. Dantu and Guturu, P., An Architecture for IP-based Next Generation Radio Access Network, Fourth-Generation Wireless Networks: Applications and Innovations: Applications and Innovations, p. 61, 2009.
R. Dantu, Kolan, P., Akl, R., and Loper, K., Classification of Attributes and Behavior in Risk Management Using Bayesian Networks, in 2007 IEEE International Conference on Intelligence and Security Informatics (ISI) , New Brunswick, NJ, 2007.
R. Dantu, Dimopoulos, N., Li, K., Patel, R., and Al-Khalili, A., Parallel algorithms for low-level vision on the homogeneous multiprocessor, Computers & Electrical Engineering, vol. 20, pp. 51 - 60, 1994.
R. Dantu, A Blueprint for Implementing Security in Radiology. AHRA Electronic Imaging Conference, 2005.
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system for providing wireless-specific services for a wireless access network, 2009.
R. Dantu, Loper, K., and Kolan, P., Risk Management Using Behavior Based Attack Graphs, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
R. Dantu and Oosterwijk, H., Top Ten Recommendations for PACS Security Implementation, Health Imaging & IT Magazine, 2005.
R. Dantu, Patel, P., Choksi, O., Patel, A., Ali, M., Miernik, J., and Holur, B., Wireless router and method for processing traffic in a wireless communications network, 2006.
R. Dantu, Top 3 challenges in VoIP Security and Management. 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE), Vancouver, BC, Canada, 2006.
R. Dantu, Cangussu, J., and Yelimeli, A., Dynamic Control of Worm Propagation, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.PDF icon dynamic_control_of_worm.pdf (142.08 KB)
R. Dantu, Palla, S., and Cangussu, J., Classification of phishers, Journal of Homeland Security and Emergency Management, vol. 5, 2008.PDF icon classification_phishers.pdf (410.26 KB)

Pages