Publications

Export 197 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
U
S. Palla and Dantu, R., Unwanted SMTP Paths and Relays, in 2007 2nd International Conference on Communication Systems Software and Middleware, 2007.
E. - A. Baatarjav and Dantu, R., Unveiling Hidden Patterns to Find Social Relevance, in Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on, 2011.PDF icon unveil_hidden_patterns_find_social_relevance.pdf (913.21 KB)
J. Vempati, Dantu, R., and Thompson, M., Uninterrupted Video Surveillance in the Face of an Attack, in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018.PDF icon Uninterrupted_Video_Surveillance_Attack.pdf (681.67 KB)
G. Bajwa, Fazeen, M., Dantu, R., and Tanpure, S., Unintentional bugs to vulnerability mapping in Android applications, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon unintentional_bugs_vulnerability_mapping_android_apps.pdf (182.24 KB)
T
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Trusted AI with Blockchain to Empower Metaverse, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Trusted_AI_with_Blockchain_to_Empower_Metaverse.pdf (1.04 MB)
R. Dantu and Paul, A., True Matching of Employers' Needs, NICE Conference. Miami, Florida, 2018.
H. Husna, Phithakkitnukoon, S., and Dantu, R., Traffic Shaping of Spam Botnets, in 2008 5th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, 2008.PDF icon traffic_shaping_spam_botnet.pdf (145.58 KB)
S. Phithakkitnukoon and Dantu, R., Towards Ubiquitous Computing with Call Prediction, SIGMOBILE Mob. Comput. Commun. Rev., vol. 15, pp. 52–64, 2011.PDF icon ubiquitous_computing_call_prediction.pdf (671.79 KB)
Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., Towards Insider Threat Detection Using Psychophysiological Signals, in Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, New York, NY, USA, 2015.PDF icon Towards_Insider_Threat_Detection_Psychophysiological_signals.pdf (705.73 KB)
A. Salau, Dantu, R., Morozov, K., Upadhyay, K., and Badruddoja, S., Towards a Threat Model and Security Analysis for Data Cooperatives, in 19th International Conference on Security and Cryptography (SECRYPT 2022), 2022.PDF icon Towards a Threat Model and Security Analysis for Data Cooperatives.pdf (511.21 KB)
R. Dantu and Oosterwijk, H., Top Ten Recommendations for PACS Security Implementation, Health Imaging & IT Magazine, 2005.
R. Dantu, Top 3 challenges in VoIP Security and Management. 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE), Vancouver, BC, Canada, 2006.
R. Dantu, To Patch or Not to Patch, Health Imaging and Technology News Magazine, pp. 48-49, 2005.
M. Jaynes and Dantu, R., Tire-road friction estimation utilizing smartphones, in Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on, 2014.PDF icon tire_road_friction_estimation_smartphone.pdf (192.64 KB)
R. Dantu, A Testbed for Research and Development For Securing Multimedia Communication Services. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
R. Dantu, A Testbed for Research and Development for Securing IP Multimedia Communication Services. NSF CRI PI Meeting, Boston, MA, 2007.

Pages