Publications

Export 197 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
R. Dantu, A Testbed for Research and Development for Securing IP Multimedia Communication Services. NSF CRI PI Meeting, Boston, MA, 2007.
R. Dantu, Ester, G., and O'Connell, P., System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network, 2007.
R. Dantu, Security and Privacy issues in Radiology. NSF Cyber Trust PI meeting, 2005.
R. Dantu, Oosterwijk, H., Kolan, P., and Husna, H., HIPAA: Securing Medical Networks, Network Security, vol. 2007, pp. 13–16, 2007.PDF icon securing_medical_networks.pdf (227.68 KB)
R. Dantu, Differences between VoIP and Data Security. Internet2 workshop on VoIP, Austin, Texas, USA, 2004.
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Micromanipulator vision for wafer probing, IEEE Transactions on Semiconductor Manufacturing, vol. 2, pp. 114-117, 1989.
R. Dantu, Fahmy, S., Schulzrinne, H., and Cangussu, J., Issues and challenges in securing VoIP, Computers & Security, vol. 28, pp. 743-753, 2009.PDF icon Issues_and_challenges_in_securing_VoIP.pdf (527.79 KB)
R. Dantu and Paul, A., True Matching of Employers' Needs, NICE Conference. Miami, Florida, 2018.
R. Dantu and Joglekar, S., Collaborative Vision Using Networked Sensors, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
R. Dantu, VoIP: Are We Secured. VoIP: Are We Secured, Plano, TX, USA, 2004.
R. Dantu, Method and system of integrated rate control for a traffic flow across wireline and wireless networks, 2005.
R. Dantu, CISE and Global Implications. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
R. Dantu, Kolan, P., and Cangussu, J., Network risk management using attacker profiling, Security and Communication Networks, vol. 2, pp. 83–96, 2009.PDF icon network_risk_management_using_attacker_profiling.pdf (557.53 KB)
R. Dantu and Cangussu, J., An Architecture for Automatic and Adaptive Defense, Journal of Information Privacy and Security, vol. 3, pp. 37-58, 2007.PDF icon architecture_automatic_adaptive_defense.pdf (252.72 KB)
R. Dantu, Patel, P., Patel, P., Garbuz, A., Miernik, J., Patel, A., and Holur, B., Method and system for providing services for wireless data calls, 2007.
C
C. Claiborne, Fazeen, M., and Dantu, R., Android Sensor Data Anonymization, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
C. Claiborne, Ncube, C., and Dantu, R., Random anonymization of mobile sensor data: Modified Android framework, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon random_anonymization_mobile_sensor_data.pdf (371.83 KB)
V. Chandrasekaran, Dantu, R., Jonnada, S., Thiyagaraja, S., and Subbu, K., Cuffless Differential Blood Pressure Estimation Using Smart Phones, IEEE Transactions on Biomedical Engineering, vol. 60, pp. 1080 - 1089, 2013.
V. Chandrasekaran, Dantu, R., and Subbu, K., Socio-technical Aspects of Remote Media Control for a NG9-1-1 System, Multimedia Tools Appl., vol. 62, pp. 733–759, 2013.PDF icon sociotechnical_aspects_rmc_ng911_system.pdf (916.49 KB)
V. Chandrasekaran, Dantu, S., Kadiyala, P., Dantu, R., and Phithakkitnukoon, S., Socio-technical aspects of video phones, in 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010), 2010.PDF icon socio_technical_aspects_video_phones.pdf (635.82 KB)
V. Chandrasekaran, Dantu, R., Gupta, N., Yang, X., and Wijesekera, D., Efficiency of Social Connection-based Routing in P2P VoIP Networks, in Proceedings of the 2Nd International Conference on COMmunication Systems and NETworks, Piscataway, NJ, USA, 2010.PDF icon efficiency_social_connection_routing_p2p_voip_networks.pdf (582.86 KB)
B
T. Bucuti, Dantu, R., and Morozov, K., CMCAP: Ephemeral Sandboxes for Adaptive Access Control, in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, 2019.PDF icon CMCAP_Ephemeral_Sandbox_Adapt_AccessCtrl.pdf (1.66 MB)
T. Bucuti and Dantu, R., An opportunistic encryption extension for the DNS protocol, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon opportunistic_encryption_extension_dns_protocols.pdf (185.13 KB)
C. Barthold, Subbu, K., and Dantu, R., Evaluation of gyroscope-embedded mobile phones, in Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on, Anchorage, AK, 2011.PDF icon evaluation_of_gyroscope_embedded_mobile_phones.pdf (967.77 KB)
G. Bajwa, Dantu, R., and Aldridge, R., Pass-pic: A mobile user authentication, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon passpic_mobile_user_authentication.pdf (99.71 KB)

Pages