Publications

Export 173 results:
Author Title [ Type(Desc)] Year
Filters: Author is Ram Dantu  [Clear All Filters]
Conference Paper
J. Vempati, Bajwa, G., and Dantu, R., NFC Based Two-Pass Mobile Authentication, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
S. Jonnada, Dantu, R., Shrestha, P., Ranasinghe, I., and Widick, L., An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems, in National Cyber Summit, Huntsville, Alabama, USA, 2018.PDF icon NCS18_paper_33.pdf (887.17 KB)
T. Bucuti and Dantu, R., An opportunistic encryption extension for the DNS protocol, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon opportunistic_encryption_extension_dns_protocols.pdf (185.13 KB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Thompson, M., and Smith, C., Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.PDF icon Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf (348.53 KB)
H. Zhang and Dantu, R., Opt-in Detection Based on Call Detail Records, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Las Vegas, NV, USA, 2009.PDF icon optin_detection_call_detail_records.pdf (206.07 KB)
G. Bajwa, Dantu, R., and Aldridge, R., Pass-pic: A mobile user authentication, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon passpic_mobile_user_authentication.pdf (99.71 KB)
Y. Madhavan, Cangussu, J., and Dantu, R., Penetration Testing for Spam Filters, in Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02, Seattle, WA, 2009.PDF icon pentesting_spam_filters.pdf (156.74 KB)
N. Sen, Dantu, R., Vempati, J., and Thompson, M., Performance Analysis of Elliptic Curves for Real-Time Video Encryption, in 2018 National Cyber Summit (NCS), 2018.PDF icon Performance_Analysis_Elliptic_Curves_RealTime_Video_Encryption.pdf (382.64 KB)
Q. Mayo, Bryce, R., and Dantu, R., PhD Forum: A System Identification Approach to Monitoring Network Traffic Security, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015.PDF icon System_Identification_Approach_Monitor_Network_Traffic_Sec.pdf (146.01 KB)
S. Phithakkitnukoon and Dantu, R., Predicting Calls: New Service for an Intelligent Phone, in 10th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2007, San José, USA, 2007.PDF icon PredictingCalls_NewServices_IntelligentPhone.pdf (493.1 KB)
H. Zhang and Dantu, R., Predicting social ties in mobile phone networks, in 2010 IEEE International Conference on Intelligence and Security Informatics (ISI), Vancouver, BC, Canada, 2010.PDF icon predicting_social_ties_in_mobile_phone_networks.pdf (366.29 KB)
H. Takabi, Hashem, Y., and Dantu, R., Prediction of human error using eye movements patterns for unintentional insider threat detection, in 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 2018.PDF icon Predict_Human_Error_Eye_Movement_Unintentional_Insider_Threat.pdf (102.75 KB)
E. - A. Baatarjav, Dantu, R., and Phithakkitnukoon, S., Privacy Management for Facebook, in 4th International Conference on Information Systems Security (ICISS 2008), Hyderabad, India, 2008.PDF icon privacy_mgmt_facebook.pdf (661.91 KB)
N. Gupta and Dantu, R., Quantifying Cognitive Impairment Due to Physical or Mental Stress, in Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, New York, NY, USA, 2013.PDF icon quantify_cognitive_impairment_physical_mental_stress.pdf (403.58 KB)
H. Husna, Phithakkitnukoon, S., Baatarjav, E. - A., and Dantu, R., Quantifying presence using calling patterns, in Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on, 2008.PDF icon quantifying_presence_call_patterns.pdf (126.24 KB)
H. Zhang, Dantu, R., and Cangussu, J., Quantifying Reciprocity in Social Networks, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.PDF icon quantifying_reciprocity_social_networks.pdf (250.6 KB)
H. Zhang and Dantu, R., Quantifying the Presence of Phone Users, in 2008 5th IEEE Consumer Communications and Networking Conference, 2008.PDF icon quantifying_presence_phone_users.pdf (278.32 KB)
C. Claiborne, Ncube, C., and Dantu, R., Random anonymization of mobile sensor data: Modified Android framework, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon random_anonymization_mobile_sensor_data.pdf (371.83 KB)
J. Talkington and Dantu, R., Realizing Optimal Chest Compression Fraction During Cardiopulmonary Resuscitation, in 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2016.PDF icon Realizing_Optimal_Chest_Compression_Fraction_CPR.pdf (222.05 KB)
R. Dantu, Loper, K., and Kolan, P., Risk Management Using Behavior Based Attack Graphs, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
R. Dantu and Kolan, P., Risk Management Using Behavior Based Bayesian Networks, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon risk_mgmt_using_behavior_based_bayesian_networks.pdf (245.51 KB)
H. Sengar, Dantu, R., and Wijesekera, D., Securing VoIP and PSTN from integrated signaling network vulnerabilities, in 1st IEEE Workshop on VoIP Management and Security, 2006., 2006.PDF icon securing_voip_pstn_integrated_signaling_network.pdf (157.95 KB)
R. Dantu, Cangussu, J., and Turi, J., Sensitivity Analysis of an Attack Containment Model, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon sensitivity_analysis_attack_containment_model.pdf (359.68 KB)
S. Thiyagaraja, Vempati, J., Dantu, R., Sarma, T., and Dantu, S., Smart phone monitoring of second heart sound split, in 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014.PDF icon smartphone_monitoring_second_heart_sound_split.pdf (663.54 KB)
X. Yang, Dantu, R., and Wijesekera, D., A society-integrated testbed architecture for peer-to-peer telecommunications, in Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009. TridentCom 2009. 5th International Conference on, 2009.

Pages