Publications

Journal Article
R. Dantu, Oosterwijk, H., Kolan, P., and Husna, H., HIPAA: Securing Medical Networks, Network Security, vol. 2007, pp. 13–16, 2007.PDF icon securing_medical_networks.pdf (227.68 KB)
M. Fazeen, Dantu, R., and Guturu, P., Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches, Social Network Analysis and Mining, vol. 1, pp. 241–254, 2011.PDF icon leaders_lurkers_associates_spammers.pdf (891.55 KB)
P. Guturu and Dantu, R., An Impatient Evolutionary Algorithm With Probabilistic Tabu Search for Unified Solution of Some NP-Hard Problems in Graph and Set Theory via Clique Finding, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 38, pp. 645 - 666, 2008.
Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals, Journal of Internet Services and Information Security, vol. 6, pp. 20-36, 2016.PDF icon Inside_Mind_Of_Insider.pdf (1023.25 KB)
R. Dantu, Fahmy, S., Schulzrinne, H., and Cangussu, J., Issues and challenges in securing VoIP, Computers & Security, vol. 28, pp. 743-753, 2009.PDF icon Issues_and_challenges_in_securing_VoIP.pdf (527.79 KB)
K. Subbu, Gozick, B., and Dantu, R., LocateMe: Magnetic-fields-based Indoor Localization Using Smartphones, ACM Trans. Intell. Syst. Technol., vol. 4, pp. 73:1–73:27, 2013.
B. Gozick, Subbu, K., Dantu, R., and Maeshiro, T., Magnetic Maps for Indoor Navigation, IEEE Transactions on Instrumentation and Measurement, vol. 60, pp. 3883 - 3891, 2011.
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Micromanipulator vision for wafer probing, IEEE Transactions on Semiconductor Manufacturing, vol. 2, pp. 114-117, 1989.
S. Phithakkitnukoon and Dantu, R., Mobile Social Group Sizes and Scaling Ratio, AI Soc., vol. 26, pp. 71–85, 2011.
R. Dantu, Kolan, P., and Cangussu, J., Network risk management using attacker profiling, Security and Communication Networks, vol. 2, pp. 83–96, 2009.PDF icon network_risk_management_using_attacker_profiling.pdf (557.53 KB)
G. Bajwa and Dantu, R., Neurokey: towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms, Computers & Security, p. -, 2016.PDF icon Neurokey_Towards_New_Paradigm_Cancelable_Biometric_KeyGen_EEG.pdf (2.35 MB)
N. Gupta, Dantu, R., Schulzrinne, H., Goulart, A., and Magnussen, W., Next generation 9-1-1: Architecture and challenges in realizing an IP-multimedia-based emergency service, Journal of Homeland Security and Emergency Management, vol. 7, 2010.
S. Thiyagaraja, Dantu, R., Shrestha, P., Chitnis, A., Thompson, M., Anumandla, P., Sarma, T., and Dantu, S., A novel heart-mobile interface for detection and classification of heart sounds, Biomedical Signal Processing and Control, vol. 45, pp. 313 - 324, 2018.PDF icon 1-s2.0-S1746809418301101-main.pdf (2.82 MB)
P. Kolan, Dantu, R., and Cangussu, J., Nuisance Level of a Voice Call, ACM Trans. Multimedia Comput. Commun. Appl., vol. 5, pp. 6:1–6:22, 2008.
R. Dantu, Dimopoulos, N., Li, K., Patel, R., and Al-Khalili, A., Parallel algorithms for low-level vision on the homogeneous multiprocessor, Computers & Electrical Engineering, vol. 20, pp. 51 - 60, 1994.
S. Sarma, Bucuti, H., Chitnis, A., Klacman, A., and Dantu, R., Real-Time Mobile Device-Assisted Chest Compression During Cardiopulmonary Resuscitation, American Journal of Cardiology, vol. 120, no. 2, pp. 196 - 200, 2017.PDF icon RealTime_Mobile_Device_Assisted_Chest_Compression_CPR.pdf (729.79 KB)
M. Fazeen, Gozick, B., Dantu, R., Bhukhiya, M., and González, M. C., Safe Driving Using Mobile Phones, Trans. Intell. Transport. Sys., 2012.PDF icon Safe Driving Using Mobile Phones.pdf (805.74 KB)
R. Dantu, Ghosal, D., and Schulzrinne, H., Securing voice over IP, IEEE Network, vol. 20, pp. 4-5, 2006.
X. Yang, Dantu, R., and Wijesekera, D., Security Issues in VoIP Telecommunication Networks, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, pp. 763–789, 2012.PDF icon security_issues_voip_telecom_networks.pdf (469.17 KB)
K. Morozov, Sarathi, R. Partha, Rainer, S., and Rui, X., On the security of the Courtois-Finiasz-Sendrier signature, 2018.PDF icon Security_Courtois_Finiasz_Sendrier_Signature.pdf (443.22 KB)
H. Zhang, Dantu, R., and Cangussu, J., Socioscope: Human Relationship and Behavior Analysis in Social Networks, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol. 41, pp. 1122-1143, 2011.PDF icon Socioscope_Human_Relationship_Behavior_Analysis_Social_Network.pdf (1.9 MB)
V. Chandrasekaran, Dantu, R., and Subbu, K., Socio-technical Aspects of Remote Media Control for a NG9-1-1 System, Multimedia Tools Appl., vol. 62, pp. 733–759, 2013.PDF icon sociotechnical_aspects_rmc_ng911_system.pdf (916.49 KB)
P. Kolan and Dantu, R., Socio-technical Defense Against Voice Spamming, ACM Trans. Auton. Adapt. Syst., vol. 2, 2007.PDF icon sociotechnical_defense_against_voip_spamming.pdf (971.7 KB)
S. Palla, Dantu, R., and Cangussu, J., Spam Classification Based on E-Mail Path Analysis, Pervasive Information Security and Privacy Developments: Trends and Advancements: Trends and Advancements, p. 332, 2010.
S. Palla, Dantu, R., and Cangussu, J., Spam Classification Based on E-Mail Path Analysis, International Journal of Information Security and Privacy (IJISP), vol. 2, pp. 46-69, 2008.

Pages