Publications

Conference Paper
W. Fagen, Cangussu, J., and Dantu, R., Goliath: A Configurable Approach for Network Testing, in Testbeds and Research Infrastructure for the Development of Networks and Communities, 2007. TridentCom 2007. 3rd International Conference on, 2007.PDF icon goliath_configurable_approach_network_testing.pdf (127.03 KB)
K. Subbu, Xu, N., and Dantu, R., iKnow Where You Are, in Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04, Washington, DC, USA, 2009.PDF icon iknow_where_you_are.pdf (224.2 KB)
K. Subbu, Gozick, B., and Dantu, R., Indoor localization through dynamic time warping, in 2011 IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, 2011.
S. Phithakkitnukoon and Dantu, R., Inferring Social Groups Using Call Logs, in On the Move to Meaningful Internet Systems: OTM 2008 Workshops, Monterrey, Mexico, 2008, pp. 200–210.PDF icon inferring_social_groups_using_call_logs.pdf (235.6 KB)
Y. Hashem, Takabi, H., and Dantu, R., Insider Threat Detection Based on Users’ Mouse Movements and Keystrokes Behavior, in Secure Knowledge Management Workshop, 2017.PDF icon Insider_Threat_.Detection_User_Mouse_Movement_Keystroke_Behavior.pdf (112.09 KB)
S. Badruddoja, Dantu, R., Widick, L., Zaccagni, Z., and Upadhyay, K., Integrating DOTS With Blockchain Can Secure Massive IoT Sensors, in 2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), New Orleans, LA, USA, 2020.PDF icon Integrating_DOTS_With_Blockchain_Can_Secure_Massive_IoT_Sensors.pdf (1.07 MB)
K. Upadhyay, Dantu, R., He, Y., Salau, A., and Badruddoja, S., Make Consumers Happy by Defuzzifying the Service Level Agreements, in 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021.PDF icon Make_Consumers_Happy_by_Defuzzifying_the_Service_Level_Agreements.pdf (722.47 KB)
A. Salau, Dantu, R., Morozov, K., Badruddoja, S., and Upadhyay, K., Making Blockchain Validators Honest, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Making_Blockchain_Validators_Honest.pdf (1.13 MB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Making Smart Contracts Predict and Scale, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Making_Smart_Contracts_Predict_and_Scale.pdf (1.4 MB)
S. Badruddoja, Dantu, R., He, Y., Upadhayay, K., and Thompson, M., Making Smart Contracts Smarter, in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 2021.PDF icon Making_Smart_Contracts_Smarter.pdf (998.18 KB)
Z. Zaccagni, Paul, A., and Dantu, R., Micro-Accreditation for Matching Employer E-Hire Needs, in 2019 IEEE International Conference on Blockchain (Blockchain), 2019.PDF icon Micro-Accreditation_for_Matching_Employer_E-Hire_Needs.pdf (614.98 KB)
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., A micro-manipulator vision in IC Manufacturing, in Proceedings. 1988 IEEE International Conference on Robotics and Automation, 1988.
S. Phithakkitnukoon and Dantu, R., Mobile Social Closeness and Communication Patterns, in Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2010.PDF icon mobile_social_closeness_communication_patterns.pdf (350.21 KB)
Y. Hashem, Takabi, H., Dantu, R., and Nielsen, R., A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats, in Proceedings of the 2017 International Workshop on Managing Insider Security Threats, New York, NY, USA, 2017.PDF icon Multimodal_NeuroPhysiological_Study_Malicious_Insider_Threat.pdf (3.77 MB)
J. Vempati, Bajwa, G., and Dantu, R., NFC Based Two-Pass Mobile Authentication, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
S. Jonnada, Dantu, R., Shrestha, P., Ranasinghe, I., and Widick, L., An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems, in National Cyber Summit, Huntsville, Alabama, USA, 2018.PDF icon NCS18_paper_33.pdf (887.17 KB)
T. Bucuti and Dantu, R., An opportunistic encryption extension for the DNS protocol, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon opportunistic_encryption_extension_dns_protocols.pdf (185.13 KB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Thompson, M., and Smith, C., Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.PDF icon Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf (348.53 KB)
H. Zhang and Dantu, R., Opt-in Detection Based on Call Detail Records, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Las Vegas, NV, USA, 2009.PDF icon optin_detection_call_detail_records.pdf (206.07 KB)
K. Upadhyay, Dantu, R., He, Y., Salau, A., and Badruddoja, S., Paradigm Shift from Paper Contracts to Smart Contracts, in 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021.PDF icon Paradigm_Shift_from_Paper_Contracts_to_Smart_Contracts.pdf (455.89 KB)
G. Bajwa, Dantu, R., and Aldridge, R., Pass-pic: A mobile user authentication, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon passpic_mobile_user_authentication.pdf (99.71 KB)
Y. Madhavan, Cangussu, J., and Dantu, R., Penetration Testing for Spam Filters, in Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02, Seattle, WA, 2009.PDF icon pentesting_spam_filters.pdf (156.74 KB)
N. Sen, Dantu, R., Vempati, J., and Thompson, M., Performance Analysis of Elliptic Curves for Real-Time Video Encryption, in 2018 National Cyber Summit (NCS), 2018.PDF icon Performance_Analysis_Elliptic_Curves_RealTime_Video_Encryption.pdf (382.64 KB)
Q. Mayo, Bryce, R., and Dantu, R., PhD Forum: A System Identification Approach to Monitoring Network Traffic Security, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015.PDF icon System_Identification_Approach_Monitor_Network_Traffic_Sec.pdf (146.01 KB)
S. Phithakkitnukoon and Dantu, R., Predicting Calls: New Service for an Intelligent Phone, in 10th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2007, San José, USA, 2007.PDF icon PredictingCalls_NewServices_IntelligentPhone.pdf (493.1 KB)

Pages