Publications

Export 197 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
S. Haider, Cangussu, J., Cooper, K., and Dantu, R., Estimation of Defects Based on Defect Decay Model: ED^\{3\}M, IEEE Transactions on Software Engineering, vol. 34, pp. 336 - 356, 2008.
Y. Hashem, Takabi, H., Dantu, R., and Nielsen, R., A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats, in Proceedings of the 2017 International Workshop on Managing Insider Security Threats, New York, NY, USA, 2017.PDF icon Multimodal_NeuroPhysiological_Study_Malicious_Insider_Threat.pdf (3.77 MB)
Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., Towards Insider Threat Detection Using Psychophysiological Signals, in Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, New York, NY, USA, 2015.PDF icon Towards_Insider_Threat_Detection_Psychophysiological_signals.pdf (705.73 KB)
Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals, Journal of Internet Services and Information Security, vol. 6, pp. 20-36, 2016.PDF icon Inside_Mind_Of_Insider.pdf (1023.25 KB)
Y. Hashem, Takabi, H., and Dantu, R., Insider Threat Detection Based on Users’ Mouse Movements and Keystrokes Behavior, in Secure Knowledge Management Workshop, 2017.PDF icon Insider_Threat_.Detection_User_Mouse_Movement_Keystroke_Behavior.pdf (112.09 KB)
B. Holur, Dantu, R., and Derrick, C., Method and system for managing wireless bandwidth resources, 2009.
B. Hurd, Davis, J., and Dantu, R., Emerging Technologies Workshop I: The Case for AI, Cyber Future Summit. 2018.
H. Husna, Phithakkitnukoon, S., and Dantu, R., Traffic Shaping of Spam Botnets, in 2008 5th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, 2008.PDF icon traffic_shaping_spam_botnet.pdf (145.58 KB)
H. Husna, Phithakkitnukoon, S., Baatarjav, E. - A., and Dantu, R., Quantifying presence using calling patterns, in Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on, 2008.PDF icon quantifying_presence_call_patterns.pdf (126.24 KB)
H. Husna, Phithakkitnukoon, S., Palla, S., and Dantu, R., Behavior analysis of spam botnets, in 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08), 2008.PDF icon behavior_analysis_spam_botnets.pdf (560.82 KB)
K
P. Kolan, Dantu, R., and Cangussu, J., Nuisance Level of a Voice Call, ACM Trans. Multimedia Comput. Commun. Appl., vol. 5, pp. 6:1–6:22, 2008.
P. Kolan, Vaithilingam, R., and Dantu, R., Automatic Calibration Using Receiver Operating Characteristics Curves, in 2007 2nd International Conference on Communication Systems Software and Middleware, 2007.
P. Kolan and Dantu, R., Socio-technical Defense Against Voice Spamming, ACM Trans. Auton. Adapt. Syst., vol. 2, 2007.PDF icon sociotechnical_defense_against_voip_spamming.pdf (971.7 KB)
P. Kolan and Dantu, R., Call Algebra, in 2008 5th IEEE Consumer Communications and Networking Conference, 2008.PDF icon call_algebra.pdf (294.13 KB)
L
L. Langle and Dantu, R., Are You a Safe Driver?, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.PDF icon are_you_safe_driver.pdf (388.67 KB)
M
Y. Madhavan, Cangussu, J., and Dantu, R., Penetration Testing for Spam Filters, in Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02, Seattle, WA, 2009.PDF icon pentesting_spam_filters.pdf (156.74 KB)
Q. Mayo, Bryce, R., and Dantu, R., PhD Forum: A System Identification Approach to Monitoring Network Traffic Security, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015.PDF icon System_Identification_Approach_Monitor_Network_Traffic_Sec.pdf (146.01 KB)

Pages