Publications

Export 56 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
J. Davis, Khalfan, S., Tiene, R., and Dantu, R., The Future is Connected: How Can it be Cyber Secure?, Cyber Future Summit. 2018.
J. Davis, Johnson, S., LeVine, M., Dantu, R., and Rojas-Levi, E., Technologies Shaping Transportation of the Future and Smart Cities, Cyber Future Summit. 2018.
R. Dantu, Panel: What do you mean security VoIP. IEEE ENTNET conference in conjunction with Supercom’2005, 2005.
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system for providing supplementary services for a wireless access network, 2008.
R. Dantu, Cangussu, J., and Yelimeli, A., Dynamic Control of Worm Propagation, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.PDF icon dynamic_control_of_worm.pdf (142.08 KB)
R. Dantu and Joglekar, S., Collaborative Vision Using Networked Sensors, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
R. Dantu, VoIP Security. 3rd Annual Dallas Wireless Security Conference, Dallas, Texas, USA, 2004.
R. Dantu, Patel, R., Dimopoulos, N., and Al-Khalili, A., Vision Algorithms For VLSI Wafer Probing. 1990.
R. Dantu, A Testbed for Research and Development For Securing Multimedia Communication Services. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
R. Dantu, Davis, R., and George, T., System and method for transporting in/ain signaling over an internet protocol (IP) network, 2006.
R. Dantu, Loper, K., and Kolan, P., Risk Management Using Behavior Based Attack Graphs, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
R. Dantu, A Blueprint for Implementing Security in Radiology. AHRA Electronic Imaging Conference, 2005.
R. Dantu and Cangussu, J., An Architecture for Automatic and Adaptive Defense, Journal of Information Privacy and Security, vol. 3, pp. 37-58, 2007.PDF icon architecture_automatic_adaptive_defense.pdf (252.72 KB)
R. Dantu, Hospital Network Security: A Blueprint for Implementing Security in Radiology. First Annual Internet Security Conference, Plano, Texas, USA, 2005.
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system of control signaling for a wireless access network, 2008.
R. Dantu, Fahmy, S., Schulzrinne, H., and Cangussu, J., Issues and challenges in securing VoIP, Computers & Security, vol. 28, pp. 743-753, 2009.PDF icon Issues_and_challenges_in_securing_VoIP.pdf (527.79 KB)
R. Dantu, Abbas, K., O'Neill, M., and Mikler, A., Data centric modeling of environmental sensor networks, in Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004. IEEE, 2004.PDF icon data_centric_modeling_environment_sensor_networks.pdf (509.71 KB)
R. Dantu and Oosterwijk, H., Top Ten Recommendations for PACS Security Implementation, Health Imaging & IT Magazine, 2005.
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Micromanipulator vision for wafer probing, IEEE Transactions on Semiconductor Manufacturing, vol. 2, pp. 114-117, 1989.
R. Dantu, Top 3 challenges in VoIP Security and Management. 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE), Vancouver, BC, Canada, 2006.
R. Dantu, Patel, P., Choksi, O., Patel, A., Ali, M., Miernik, J., and Holur, B., Wireless router and method for processing traffic in a wireless communications network, 2006.
R. Dantu and Kolan, P., Risk Management Using Behavior Based Bayesian Networks, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon risk_mgmt_using_behavior_based_bayesian_networks.pdf (245.51 KB)
R. Dantu, To Patch or Not to Patch, Health Imaging and Technology News Magazine, pp. 48-49, 2005.
R. Dantu, Cangussu, J., and Turi, J., Sensitivity Analysis of an Attack Containment Model, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon sensitivity_analysis_attack_containment_model.pdf (359.68 KB)
R. Dantu and Oosterwijk, H., Survey on Hospital Network Security and Privacy. Barco Ltd, 2004.

Pages