Publications

Export 28 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
Book Chapter
S. Phithakkitnukoon, Husna, H., and Dantu, R., Behavioral Entropy of a Cellular Phone User, in Social Computing, Behavioral Modeling, and Prediction, H. Liu, Salerno, J. J., and Young, M. J., Eds. Boston, MA: Springer US, 2008, pp. 160–167.PDF icon behavioral_entropy_cellphone_user.pdf (665.52 KB)
E. - A. Baatarjav, Phithakkitnukoon, S., and Dantu, R., Group Recommendation System for Facebook, in On the Move to Meaningful Internet Systems: OTM 2008 Workshops, Monterrey, Mexico, November 9-14, 2008. Proceedings, R. Meersman, Tari, Z., and Herrero, P., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 211–219.PDF icon group_recommendation_system_for_facebook.pdf (353.63 KB)
Conference Paper
H. Husna, Phithakkitnukoon, S., Palla, S., and Dantu, R., Behavior analysis of spam botnets, in 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08), 2008.PDF icon behavior_analysis_spam_botnets.pdf (560.82 KB)
K. Upadhyay, Dantu, R., He, Y., Badruddoja, S., and Salau, A., Can't Understand SLAs? Use the Smart Contract, in 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021.PDF icon Cant_Understand_SLAs_Use_the_Smart_Contract.pdf (526.15 KB)
H. Zhang and Dantu, R., Discovery of Social Groups Using Call Detail Records, in On the Move to Meaningful Internet Systems: OTM 2008 Workshops, Monterrey, Mexico, 2008.PDF icon discovery_social_groups_call_detail_records.pdf (891.31 KB)
S. Phithakkitnukoon and Dantu, R., Inferring Social Groups Using Call Logs, in On the Move to Meaningful Internet Systems: OTM 2008 Workshops, Monterrey, Mexico, 2008, pp. 200–210.PDF icon inferring_social_groups_using_call_logs.pdf (235.6 KB)
Y. Hashem, Takabi, H., and Dantu, R., Insider Threat Detection Based on Users’ Mouse Movements and Keystrokes Behavior, in Secure Knowledge Management Workshop, 2017.PDF icon Insider_Threat_.Detection_User_Mouse_Movement_Keystroke_Behavior.pdf (112.09 KB)
K. Upadhyay, Dantu, R., He, Y., Salau, A., and Badruddoja, S., Make Consumers Happy by Defuzzifying the Service Level Agreements, in 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021.PDF icon Make_Consumers_Happy_by_Defuzzifying_the_Service_Level_Agreements.pdf (722.47 KB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Making Smart Contracts Predict and Scale, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Making_Smart_Contracts_Predict_and_Scale.pdf (1.4 MB)
S. Badruddoja, Dantu, R., He, Y., Upadhayay, K., and Thompson, M., Making Smart Contracts Smarter, in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 2021.PDF icon Making_Smart_Contracts_Smarter.pdf (998.18 KB)
Y. Hashem, Takabi, H., Dantu, R., and Nielsen, R., A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats, in Proceedings of the 2017 International Workshop on Managing Insider Security Threats, New York, NY, USA, 2017.PDF icon Multimodal_NeuroPhysiological_Study_Malicious_Insider_Threat.pdf (3.77 MB)
K. Upadhyay, Dantu, R., He, Y., Salau, A., and Badruddoja, S., Paradigm Shift from Paper Contracts to Smart Contracts, in 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021.PDF icon Paradigm_Shift_from_Paper_Contracts_to_Smart_Contracts.pdf (455.89 KB)
H. Takabi, Hashem, Y., and Dantu, R., Prediction of human error using eye movements patterns for unintentional insider threat detection, in 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 2018.PDF icon Predict_Human_Error_Eye_Movement_Unintentional_Insider_Threat.pdf (102.75 KB)
H. Husna, Phithakkitnukoon, S., Baatarjav, E. - A., and Dantu, R., Quantifying presence using calling patterns, in Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on, 2008.PDF icon quantifying_presence_call_patterns.pdf (126.24 KB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Smarter Contracts to Predict using Deep-Learning Algorithms, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Smarter_Contracts_to_Predict_using_Deep-Learning_Algorithms.pdf (1.01 MB)
Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., Towards Insider Threat Detection Using Psychophysiological Signals, in Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, New York, NY, USA, 2015.PDF icon Towards_Insider_Threat_Detection_Psychophysiological_signals.pdf (705.73 KB)
H. Husna, Phithakkitnukoon, S., and Dantu, R., Traffic Shaping of Spam Botnets, in 2008 5th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, 2008.PDF icon traffic_shaping_spam_botnet.pdf (145.58 KB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Trusted AI with Blockchain to Empower Metaverse, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Trusted_AI_with_Blockchain_to_Empower_Metaverse.pdf (1.04 MB)

Pages