Publications

Export 197 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
E. - A. Baatarjav, Dantu, R., and Phithakkitnukoon, S., Privacy Management for Facebook, in 4th International Conference on Information Systems Security (ICISS 2008), Hyderabad, India, 2008.PDF icon privacy_mgmt_facebook.pdf (661.91 KB)
Q
M. Alam, Dantu, R., Holur, B., and Eyceoz, T., Quality indicator and method for frame selection in wireless network, 2006.
N. Gupta and Dantu, R., Quantifying Cognitive Impairment Due to Physical or Mental Stress, in Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, New York, NY, USA, 2013.PDF icon quantify_cognitive_impairment_physical_mental_stress.pdf (403.58 KB)
G. Bajwa, Dantu, R., and Nana, A., Quantifying Dynamic Cerebral Autoregulation using Electroencephalograms, Archives of Physical Medicine and Rehabilitation, vol. 96. p. e69, 2015.
H. Husna, Phithakkitnukoon, S., Baatarjav, E. - A., and Dantu, R., Quantifying presence using calling patterns, in Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on, 2008.PDF icon quantifying_presence_call_patterns.pdf (126.24 KB)
H. Zhang, Dantu, R., and Cangussu, J., Quantifying Reciprocity in Social Networks, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.PDF icon quantifying_reciprocity_social_networks.pdf (250.6 KB)
H. Zhang and Dantu, R., Quantifying the Presence of Phone Users, in 2008 5th IEEE Consumer Communications and Networking Conference, 2008.PDF icon quantifying_presence_phone_users.pdf (278.32 KB)
J. Germain, Dantu, R., Thompson, M., and Dockendorf, M., Quantum Networks: Reset-and-Reuse can be a Game-changer for Entanglement via Distillation, in 2022 IEEE International Conference on Quantum Computing and Engineering (QCE), 2022.PDF icon Quantum_Networks_Reset-and-Reuse_can_be_a_Game-changer_for_Entanglement_via_Distillation.pdf (1.03 MB)
J. Germain, Dantu, R., and Thompson, M., Qubit Reset and Refresh: A Gamechanger for Random Number Generation, in Twelveth ACM Conference on Data and Application Security and Privacy (CODASPY ), 2022.PDF icon Qubit Reset and Refresh: A Gamechanger for Random Number Generation.pdf (1.08 MB)
R
C. Claiborne, Ncube, C., and Dantu, R., Random anonymization of mobile sensor data: Modified Android framework, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon random_anonymization_mobile_sensor_data.pdf (371.83 KB)
J. Talkington and Dantu, R., Realizing Optimal Chest Compression Fraction During Cardiopulmonary Resuscitation, in 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2016.PDF icon Realizing_Optimal_Chest_Compression_Fraction_CPR.pdf (222.05 KB)
S. Sarma, Bucuti, H., Chitnis, A., Klacman, A., and Dantu, R., Real-Time Mobile Device-Assisted Chest Compression During Cardiopulmonary Resuscitation, American Journal of Cardiology, vol. 120, no. 2, pp. 196 - 200, 2017.PDF icon RealTime_Mobile_Device_Assisted_Chest_Compression_CPR.pdf (729.79 KB)
T. Anderson, Bowen, E., Dantu, R., Doria, A., Gopal, R., Salim, J., Khosravi, H., Minhazuddin, M., and Wasserman, M., Requirements for Separation of IP Control and Forwarding. RFC Editor, 2003.PDF icon rfc3654.pdf (53.22 KB)
R. Dantu, Loper, K., and Kolan, P., Risk Management Using Behavior Based Attack Graphs, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
R. Dantu and Kolan, P., Risk Management Using Behavior Based Bayesian Networks, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon risk_mgmt_using_behavior_based_bayesian_networks.pdf (245.51 KB)
S
M. Fazeen, Gozick, B., Dantu, R., Bhukhiya, M., and González, M. C., Safe Driving Using Mobile Phones, Trans. Intell. Transport. Sys., 2012.PDF icon Safe Driving Using Mobile Phones.pdf (805.74 KB)
R. Dantu, Securing IMS and VoIP. 3rd Workshop on Voice over IP Security, Berlin, Germany, 2006.
R. Dantu, Ghosal, D., and Schulzrinne, H., Securing voice over IP, IEEE Network, vol. 20, pp. 4-5, 2006.
H. Sengar, Dantu, R., and Wijesekera, D., Securing VoIP and PSTN from integrated signaling network vulnerabilities, in 1st IEEE Workshop on VoIP Management and Security, 2006., 2006.PDF icon securing_voip_pstn_integrated_signaling_network.pdf (157.95 KB)
R. Dantu, Security and Privacy issues in Radiology. NSF Cyber Trust PI meeting, 2005.
X. Yang, Dantu, R., and Wijesekera, D., Security Issues in VoIP Telecommunication Networks, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, pp. 763–789, 2012.PDF icon security_issues_voip_telecom_networks.pdf (469.17 KB)
K. Morozov, Sarathi, R. Partha, Rainer, S., and Rui, X., On the security of the Courtois-Finiasz-Sendrier signature, 2018.PDF icon Security_Courtois_Finiasz_Sendrier_Signature.pdf (443.22 KB)
G. Bajwa, Dantu, R., Fazeen, M., and Joseph, iv, R., Self-Tracking via Brain-Mobile-Cloud Interface. 2013.
R. Dantu, Cangussu, J., and Turi, J., Sensitivity Analysis of an Attack Containment Model, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon sensitivity_analysis_attack_containment_model.pdf (359.68 KB)
K. Morneault, Dantu, R., Sidebottom, G., Bidulock, B., and Heitz, J., Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Adaptation Layer. 2002.

Pages