2022
- A. Salau, Dantu, R., Morozov, K., Badruddoja, S., and Upadhyay, K., “Making Blockchain Validators Honest”, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.
- S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., “Making Smart Contracts Predict and Scale”, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.
- J. Germain, Dantu, R., Thompson, M., and Dockendorf, M., “Quantum Networks: Reset-and-Reuse can be a Game-changer for Entanglement via Distillation”, in 2022 IEEE International Conference on Quantum Computing and Engineering (QCE), 2022.
- J. Germain, Dantu, R., and Thompson, M., “Qubit Reset and Refresh: A Gamechanger for Random Number Generation”, in Twelveth ACM Conference on Data and Application Security and Privacy (CODASPY ), 2022.
- S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., “Smarter Contracts to Predict using Deep-Learning Algorithms”, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.
- A. Salau, Dantu, R., Morozov, K., Upadhyay, K., and Badruddoja, S., “Towards a Threat Model and Security Analysis for Data Cooperatives”, in 19th International Conference on Security and Cryptography (SECRYPT 2022), 2022.
- S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., “Trusted AI with Blockchain to Empower Metaverse”, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.
2021
- K. Upadhyay, Dantu, R., He, Y., Badruddoja, S., and Salau, A., “Can't Understand SLAs? Use the Smart Contract”, in 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent
Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021.
- I. Ranasinghe, Yuan, C., Dantu, R., and Albert, M. V., “A Collaborative and Adaptive Feedback System for Physical Exercises”, in 2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC), Atlanta, GA, USA, 2021.
- I. Ranasinghe, Dantu, R., Albert, M. V., Watts, S., and Ocana, R., “Cyber-Physiotherapy: Rehabilitation to Training”, in 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), Bordeaux, France, 2021.
- A. Salau, Dantu, R., and Upadhyay, K., “Data Cooperatives for Neighborhood Watch”, in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 2021.
- K. Upadhyay, Dantu, R., He, Y., Salau, A., and Badruddoja, S., “Make Consumers Happy by Defuzzifying the Service Level Agreements”, in 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent
Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021.
- S. Badruddoja, Dantu, R., He, Y., Upadhayay, K., and Thompson, M., “Making Smart Contracts Smarter”, in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 2021.
- K. Upadhyay, Dantu, R., He, Y., Salau, A., and Badruddoja, S., “Paradigm Shift from Paper Contracts to Smart Contracts”, in 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent
Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021.
2020
- J. Vempati, Dantu, R., Badruddoja, S., and Thompson, M., “Adaptive and Predictive SDN Control During DDoS Attacks”, in 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), 2020.
- S. Badruddoja, Dantu, R., Widick, L., Zaccagni, Z., and Upadhyay, K., “Integrating DOTS With Blockchain Can Secure Massive IoT Sensors”, in 2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), New Orleans, LA, USA, 2020.
- K. Upadhyay, Dantu, R., Zaccagni, Z., and Badruddoja, S., “Is your legal contract ambiguous? Convert to a smart legal contract”, in 2020 IEEE International Conference on Blockchain (Blockchain), 2020.
2019
- L. Widick, Ranasinghe, I., Dantu, R., and Jonnada, S., “Blockchain Based Authentication and Authorization Framework for Remote Collaboration
Systems”, in 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia
Networks" (WoWMoM), 2019.
- T. Bucuti, Dantu, R., and Morozov, K., “CMCAP: Ephemeral Sandboxes for Adaptive Access Control”, in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, 2019.
- G. Bajwa, Fazeen, M., and Dantu, R., “Detecting driver distraction using stimuli-response EEG analysis”, CoRR, vol. abs/1904.09100, 2019.
- A. Muttavarapu, Dantu, R., and Thompson, M., “Distributed Ledger for Spammers' Resume”, in 2019 IEEE Conference on Communications and Network Security (CNS), 2019.
- Z. Zaccagni, Paul, A., and Dantu, R., “Micro-Accreditation for Matching Employer E-Hire Needs”, in 2019 IEEE International Conference on Blockchain (Blockchain), 2019.
- J. Talkington, Dantu, R., and Morozov, K., “Verifying OAuth Implementations Through Encrypted Network Analysis”, in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, 2019.
2018
- J. Vempati and Dantu, R., “Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face
of an Attack”, in 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), 2018.
- M. Thompson and Dantu, R., “Bridging the Gap: Developing Innovative Minds Early On for Cybersecurity”. 2018.
- S. Jonnada, Dantu, R., and Ranasinghe, I., “Cyber Handyman and Nursing for Humanitarian Services and Disaster Relief”, in 2018 IEEE International Symposium on Technologies for Homeland Security (HST), 2018.
- V. Prasad Ranganthan, Dantu, R., Paul, A., Mears, P., and Morozov, K., “A Decentralized Marketplace Application on the Ethereum Blockchain”, in IEEE 4th International Conference on Collaboration and Internet Computing (CIC), Philadelphia, PA, USA, 2018.
- B. Hurd, Davis, J., and Dantu, R., “Emerging Technologies Workshop I: The Case for AI”, Cyber Future Summit. 2018.
- J. Davis, Khalfan, S., Tiene, R., and Dantu, R., “The Future is Connected: How Can it be Cyber Secure?”, Cyber Future Summit. 2018.
- S. Thiyagaraja, Dantu, R., Shrestha, P., Chitnis, A., Thompson, M., Anumandla, P., Sarma,
T., and Dantu, S., “A novel heart-mobile interface for detection and classification of heart sounds”, Biomedical Signal Processing and Control, vol. 45, pp. 313 - 324, 2018.
- S. Jonnada, Dantu, R., Shrestha, P., Ranasinghe, I., and Widick, L., “An OAuth-Based Authorization Framework for Access Control in Remote Collaboration
Systems”, in National Cyber Summit, Huntsville, Alabama, USA, 2018.
- N. Sen, Dantu, R., Vempati, J., and Thompson, M., “Performance Analysis of Elliptic Curves for Real-Time Video Encryption”, in 2018 National Cyber Summit (NCS), 2018.
- H. Takabi, Hashem, Y., and Dantu, R., “Prediction of human error using eye movements patterns for unintentional insider threat
detection”, in 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis
(ISBA), 2018.
- K. Morozov, Sarathi, R. Partha, Rainer, S., and Rui, X., “On the security of the Courtois-Finiasz-Sendrier signature”, 2018.
- J. Davis, Johnson, S., LeVine, M., Dantu, R., and Rojas-Levi, E., “Technologies Shaping Transportation of the Future and Smart Cities”, Cyber Future Summit. 2018.
- R. Dantu and Paul, A., “True Matching of Employers' Needs”, NICE Conference. Miami, Florida, 2018.
- J. Vempati, Dantu, R., and Thompson, M., “Uninterrupted Video Surveillance in the Face of an Attack”, in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing
And Communications/ 12th IEEE International Conference On Big Data Science And Engineering
(TrustCom/BigDataSE), 2018.
2015
- R. Dantu, Gupta, N., Dantu, V., and Morgan, Z., “Effective CPR Procedure With Real-Time Evaluation and Feedback Using Smartphones”, U.S. Patent US20150351647A12015.
- N. Gupta, Dantu, R., Dantu, S., and Nana, A., “Fitts Law Extensions for Multiple Joint Movements”, Archives of Physical Medicine and Rehabilitation, vol. 96. p. e61, 2015.
- L. Widick, Talkington, J., Bajwa, G., and Dantu, R., “A framework for secured collaboration in mHealth”, in Collaboration Technologies and Systems (CTS), 2015 International Conference on, 2015.
- T. Bucuti and Dantu, R., “An opportunistic encryption extension for the DNS protocol”, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.
- G. Bajwa, Dantu, R., and Aldridge, R., “Pass-pic: A mobile user authentication”, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.
- Q. Mayo, Bryce, R., and Dantu, R., “PhD Forum: A System Identification Approach to Monitoring Network Traffic Security”, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015.
- G. Bajwa, Dantu, R., and Nana, A., “Quantifying Dynamic Cerebral Autoregulation using Electroencephalograms”, Archives of Physical Medicine and Rehabilitation, vol. 96. p. e69, 2015.
- C. Claiborne, Ncube, C., and Dantu, R., “Random anonymization of mobile sensor data: Modified Android framework”, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.
- Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., “Towards Insider Threat Detection Using Psychophysiological Signals”, in Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security
Threats, New York, NY, USA, 2015.
- G. Bajwa, Fazeen, M., Dantu, R., and Tanpure, S., “Unintentional bugs to vulnerability mapping in Android applications”, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.
2014
- M. Fazeen and Dantu, R., “Another free app: Does it have the right intentions?”, in Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, 2014.
- M. Fazeen, Bajwa, G., and Dantu, R., “Context-aware Multimedia Encryption in Mobile Platforms”, in Proceedings of the 9th Annual Cyber and Information Security Research Conference, New York, NY, USA, 2014.
- N. Gupta, Dantu, V., and Dantu, R., “Effective CPR Procedure With Real Time Evaluation and Feedback Using Smartphones”, IEEE Journal of Translational Engineering in Health and Medicine, vol. 2, pp. 1-11, 2014.
- S. Thiyagaraja, Vempati, J., Dantu, R., Sarma, T., and Dantu, S., “Smart phone monitoring of second heart sound split”, in 2014 36th Annual International Conference of the IEEE Engineering in Medicine and
Biology Society, 2014.
- M. Jaynes and Dantu, R., “Tire-road friction estimation utilizing smartphones”, in Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on, 2014.
2013
- C. Claiborne, Fazeen, M., and Dantu, R., “Android Sensor Data Anonymization”, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID
2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
- G. Bajwa and Dantu, R., “Cerebral Autoregulation Assessment Using Electroencephalograms”, in Proceedings of the 8th International Conference on Body Area Networks, ICST, Brussels, Belgium, Belgium, 2013.
- V. Chandrasekaran, Dantu, R., Jonnada, S., Thiyagaraja, S., and Subbu, K., “Cuffless Differential Blood Pressure Estimation Using Smart Phones”, IEEE Transactions on Biomedical Engineering, vol. 60, pp. 1080 - 1089, 2013.
- N. Gupta and Dantu, R., “Evaluation of Respiration Quality Using Smart Phone”, in Proceedings of the 6th International Conference on PErvasive Technologies Related
to Assistive Environments, New York, NY, USA, 2013.
- S. Thiyagaraja and Dantu, R., “Finger Blood Flow Monitoring Using Smart Phones”, in Proceedings of the 8th International Conference on Body Area Networks, ICST, Brussels, Belgium, Belgium, 2013.
- K. Subbu, Gozick, B., and Dantu, R., “LocateMe: Magnetic-fields-based Indoor Localization Using Smartphones”, ACM Trans. Intell. Syst. Technol., vol. 4, pp. 73:1–73:27, 2013.
- J. Vempati, Bajwa, G., and Dantu, R., “NFC Based Two-Pass Mobile Authentication”, in Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID
2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings, 2013.
- N. Gupta and Dantu, R., “Quantifying Cognitive Impairment Due to Physical or Mental Stress”, in Proceedings of the 6th International Conference on PErvasive Technologies Related
to Assistive Environments, New York, NY, USA, 2013.
- G. Bajwa, Dantu, R., Fazeen, M., and Joseph, iv, R., “Self-Tracking via Brain-Mobile-Cloud Interface”. 2013.
- V. Chandrasekaran, Dantu, R., and Subbu, K., “Socio-technical Aspects of Remote Media Control for a NG9-1-1 System”, Multimedia Tools Appl., vol. 62, pp. 733–759, 2013.
2012
- H. Zhang and Dantu, R., “Event Detection Based on Call Detail Records”, in Behavior Computing: Modeling, Analysis, Mining and Decision, L. Cao and Yu, P., Eds. London: Springer London, 2012, pp. 305–316.
- M. Fazeen, Gozick, B., Dantu, R., Bhukhiya, M., and González, M. C., “Safe Driving Using Mobile Phones”, Trans. Intell. Transport. Sys., 2012.
- X. Yang, Dantu, R., and Wijesekera, D., “Security Issues in VoIP Telecommunication Networks”, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, pp. 763–789, 2012.
- H. Zhang and Dantu, R., “Smart Phone: Predicting the Next Call”, in Behavior Computing: Modeling, Analysis, Mining and Decision, L. Cao and Yu, P., Eds. London: Springer London, 2012, pp. 317–325.
2011
- S. Phithakkitnukoon, Dantu, R., Claxton, R., and Eagle, N., “Behavior-based Adaptive Call Predictor”, ACM Trans. Auton. Adapt. Syst., vol. 6, pp. 21:1–21:28, 2011.
- E. - A. Baatarjav and Dantu, R., “Current and Future Trends in Social Media”, in 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE
Third Int'l Conference on Social Computing, 2011.
- C. Barthold, Subbu, K., and Dantu, R., “Evaluation of gyroscope-embedded mobile phones”, in Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on, Anchorage, AK, 2011.
- M. Fazeen, Dantu, R., and Guturu, P., “Identification of leaders, lurkers, associates and spammers in a social network: context-dependent
and context-independent approaches”, Social Network Analysis and Mining, vol. 1, pp. 241–254, 2011.
- K. Subbu, Gozick, B., and Dantu, R., “Indoor localization through dynamic time warping”, in 2011 IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, 2011.
- B. Gozick, Subbu, K., Dantu, R., and Maeshiro, T., “Magnetic Maps for Indoor Navigation”, IEEE Transactions on Instrumentation and Measurement, vol. 60, pp. 3883 - 3891, 2011.
- S. Phithakkitnukoon and Dantu, R., “Mobile Social Group Sizes and Scaling Ratio”, AI Soc., vol. 26, pp. 71–85, 2011.
- H. Zhang, Dantu, R., and Cangussu, J., “Socioscope: Human Relationship and Behavior Analysis in Social Networks”, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol. 41, pp. 1122-1143, 2011.
- S. Phithakkitnukoon and Dantu, R., “Towards Ubiquitous Computing with Call Prediction”, SIGMOBILE Mob. Comput. Commun. Rev., vol. 15, pp. 52–64, 2011.
- E. - A. Baatarjav and Dantu, R., “Unveiling Hidden Patterns to Find Social Relevance”, in Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference
on Social Computing (SocialCom), 2011 IEEE Third International Conference on, 2011.
2010
-
E. - A. Baatarjav, Amin, A., Dantu, R., and Gupta, N. Kant,
“Are You My Friend?”, in
Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2010.
-
-
V. Chandrasekaran, Dantu, R., Gupta, N., Yang, X., and Wijesekera, D.,
“Efficiency of Social Connection-based Routing in P2P VoIP Networks”, in
Proceedings of the 2Nd International Conference on COMmunication Systems and NETworks, Piscataway, NJ, USA, 2010.
-
P. Sroufe, Phithakkitnukoon, S., Dantu, R., and Cangussu, J.,
“Email Shape Analysis”, in
Distributed Computing and Networking: 11th International Conference, ICDCN 2010, Kolkata,
India, January 3-6, 2010. Proceedings,
K. Kant, Pemmaraju, S. V., Sivalingam, K. M., and Wu, J., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 18–29.
-
P. Sroufe, Tate, S., Dantu, R., and Cankaya, E.,
“Experiences During a Collegiate Cyber Defense Competition”,
Journal of Applied Security Research, vol. 5, pp. 382–396, 2010.
-
-
N. Gupta, Dantu, R., Schulzrinne, H., Goulart, A., and Magnussen, W.,
“Next generation 9-1-1: Architecture and challenges in realizing an IP-multimedia-based
emergency service”,
Journal of Homeland Security and Emergency Management, vol. 7, 2010.
-
-
X. Yang, Stavrou, A., Dantu, R., and Wijesekera, D.,
“Small World VoIP”, in
Mobile Computing, Applications, and Services: Second International ICST Conference,
MobiCASE 2010, Santa Clara, CA, USA, October 25-28, 2010, Revised Selected Papers,
M. Gris and Yang, G., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 137–155.
-
-
V. Chandrasekaran, Dantu, S., Kadiyala, P., Dantu, R., and Phithakkitnukoon, S.,
“Socio-technical aspects of video phones”, in
2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS
2010), 2010.
-
-
A. Alazzawe, Alazzawe, A., Wijesekera, D., and Dantu, R.,
“A Testbed for Large Mobile Social Computing Experiments”,
Int. J. Sen. Netw., vol. 8, pp. 89–97, 2010.
2009
- X. Yang, Dantu, R., and Wijesekera, D., “Achieving Peer-to-peer Telecommunication Services Through Social Hashing”, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2009.
- R. Dantu and Guturu, P., “An Architecture for IP-based Next Generation Radio Access Network”, Fourth-Generation Wireless Networks: Applications and Innovations: Applications and
Innovations, p. 61, 2009.
- L. Langle and Dantu, R., “Are You a Safe Driver?”, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.
- E. - A. Baatarjav, Dantu, R., Tang, Y., and Cangussu, J., “BBN-based Privacy Management System for Facebook”, in Proceedings of the 2009 IEEE International Conference on Intelligence and Security
Informatics, Piscataway, NJ, USA, 2009.
- H. Zhang, Dantu, R., and Cangussu, J., “Change Point Detection Based on Call Detail Records”, in Proceedings of the 2009 IEEE International Conference on Intelligence and Security
Informatics, Piscataway, NJ, USA, 2009.
- S. Phithakkitnukoon and Dantu, R., “Defense Against SPIT Using Community Signals”, in Proceedings of the 2009 IEEE International Conference on Intelligence and Security
Informatics, Piscataway, NJ, USA, 2009.
- P. Sroufe, Phithakkitnukoon, S., Dantu, R., and Cangussu, J., “Email Shape Analysis for Spam Botnet Detection”, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Piscataway, NJ, USA, 2009.
- K. Subbu, Xu, N., and Dantu, R., “iKnow Where You Are”, in Proceedings of the 2009 International Conference on Computational Science and Engineering
- Volume 04, Washington, DC, USA, 2009.
- R. Dantu, Fahmy, S., Schulzrinne, H., and Cangussu, J., “Issues and challenges in securing VoIP”, Computers & Security, vol. 28, pp. 743-753, 2009.
- B. Holur, Dantu, R., and Derrick, C., “Method and system for managing wireless bandwidth resources”, 2009.
- R. Dantu, Chiang, S., Yin, H., and Kachhla, R., “Method and system for providing wireless-specific services for a wireless access network”, 2009.
- R. Dantu, Kolan, P., and Cangussu, J., “Network risk management using attacker profiling”, Security and Communication Networks, vol. 2, pp. 83–96, 2009.
- H. Zhang and Dantu, R., “Opt-in Detection Based on Call Detail Records”, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, Las Vegas, NV, USA, 2009.
- Y. Madhavan, Cangussu, J., and Dantu, R., “Penetration Testing for Spam Filters”, in Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications
Conference - Volume 02, Seattle, WA, 2009.
- H. Zhang, Dantu, R., and Cangussu, J., “Quantifying Reciprocity in Social Networks”, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.
- X. Yang, Dantu, R., and Wijesekera, D., “A society-integrated testbed architecture for peer-to-peer telecommunications”, in Testbeds and Research Infrastructures for the Development of Networks Communities
and Workshops, 2009. TridentCom 2009. 5th International Conference on, 2009.
- A. Alazzawe, Alazzawe, A., Wijesekera, D., and Dantu, R., “A testbed for mobile social computing”, in Testbeds and Research Infrastructures for the Development of Networks Communities
and Workshops, 2009. TridentCom 2009. 5th International Conference on, 2009.
- W. Fagen, Cangussu, J., and Dantu, R., “A Virtual Environment for Network Testing”, J. Netw. Comput. Appl., vol. 32, pp. 184–214, 2009.
2008
- S. Phithakkitnukoon and Dantu, R., “Adequacy of data for characterizing caller behavior”, in Proceedings of KDD Inter. Workshop on Social Network Mining and Analysis (SNAKDD, 2008.
- H. Husna, Phithakkitnukoon, S., Palla, S., and Dantu, R., “Behavior analysis of spam botnets”, in 2008 3rd International Conference on Communication Systems Software and Middleware
and Workshops (COMSWARE '08), 2008.
- S. Phithakkitnukoon, Husna, H., and Dantu, R., “Behavioral Entropy of a Cellular Phone User”, in Social Computing, Behavioral Modeling, and Prediction, H. Liu, Salerno, J. J., and Young, M. J., Eds. Boston, MA: Springer US, 2008, pp. 160–167.
- P. Kolan and Dantu, R., “Call Algebra”, in 2008 5th IEEE Consumer Communications and Networking Conference, 2008.
- R. Dantu, Palla, S., and Cangussu, J., “Classification of phishers”, Journal of Homeland Security and Emergency Management, vol. 5, 2008.
- S. Phithakkitnukoon and Dantu, R., “CPL: Enhancing Mobile Phone Functionality by Call Predicted List”, in Proceedings of the OTM Confederated International Workshops and Posters on On the
Move to Meaningful Internet Systems: 2008 Workshops: ADI, AWeSoMe, COMBEK, EI2N, IWSSA,
MONET, OnToContent + QSI, ORM, PerSys, RDDS, SEMELS, and SWWS, Berlin, Heidelberg, 2008.
- H. Zhang and Dantu, R., “Discovery of Social Groups Using Call Detail Records”, in On the Move to Meaningful Internet Systems: OTM 2008 Workshops, Monterrey, Mexico, 2008.
- S. Haider, Cangussu, J., Cooper, K., and Dantu, R., “Estimation of Defects Based on Defect Decay Model: ED^\{3\}M”, IEEE Transactions on Software Engineering, vol. 34, pp. 336 - 356, 2008.
- R. Dantu, Schulzrinne, H., and Sroufe, P., “Experiences in building a multi-university testbed for research in multimedia communications”, in Parallel and Distributed Processing, 2008. IPDPS 2008. IEEE International Symposium
on, 2008.
- E. - A. Baatarjav, Phithakkitnukoon, S., and Dantu, R., “Group Recommendation System for Facebook”, in On the Move to Meaningful Internet Systems: OTM 2008 Workshops, Monterrey, Mexico,
November 9-14, 2008. Proceedings, R. Meersman, Tari, Z., and Herrero, P., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 211–219.
- P. Guturu and Dantu, R., “An Impatient Evolutionary Algorithm With Probabilistic Tabu Search for Unified Solution
of Some NP-Hard Problems in Graph and Set Theory via Clique Finding”, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 38, pp. 645 - 666, 2008.
- S. Phithakkitnukoon and Dantu, R., “Inferring Social Groups Using Call Logs”, in On the Move to Meaningful Internet Systems: OTM 2008 Workshops, Monterrey, Mexico, 2008, pp. 200–210.
- R. Dantu, Chiang, S., Yin, H., and Kachhla, R., “Method and system for providing supplementary services for a wireless access network”, 2008.
- R. Dantu, Chiang, S., Yin, H., and Kachhla, R., “Method and system of control signaling for a wireless access network”, 2008.
- P. Kolan, Dantu, R., and Cangussu, J., “Nuisance Level of a Voice Call”, ACM Trans. Multimedia Comput. Commun. Appl., vol. 5, pp. 6:1–6:22, 2008.
- E. - A. Baatarjav, Dantu, R., and Phithakkitnukoon, S., “Privacy Management for Facebook”, in 4th International Conference on Information Systems Security (ICISS 2008), Hyderabad, India, 2008.
- H. Husna, Phithakkitnukoon, S., Baatarjav, E. - A., and Dantu, R., “Quantifying presence using calling patterns”, in Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008.
3rd International Conference on, 2008.
- H. Zhang and Dantu, R., “Quantifying the Presence of Phone Users”, in 2008 5th IEEE Consumer Communications and Networking Conference, 2008.
- S. Palla, Dantu, R., and Cangussu, J., “Spam Classification Based on E-Mail Path Analysis”, International Journal of Information Security and Privacy (IJISP), vol. 2, pp. 46-69, 2008.
- H. Husna, Phithakkitnukoon, S., and Dantu, R., “Traffic Shaping of Spam Botnets”, in 2008 5th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, 2008.
- S. Phithakkitnukoon, Dantu, R., and Baatarjav, E. - A., “VoIP Security: Attacks and Solutions”, Information Security Journal: A Global Perspective, vol. 17, pp. 114–123, 2008.
2007
- R. Dantu and Cangussu, J., “An Architecture for Automatic and Adaptive Defense”, Journal of Information Privacy and Security, vol. 3, pp. 37-58, 2007.
- P. Kolan, Vaithilingam, R., and Dantu, R., “Automatic Calibration Using Receiver Operating Characteristics Curves”, in 2007 2nd International Conference on Communication Systems Software and Middleware, 2007.
- R. Dantu, Kolan, P., Akl, R., and Loper, K., “Classification of Attributes and Behavior in Risk Management Using Bayesian Networks”, in 2007 IEEE International Conference on Intelligence and Security Informatics (ISI)
, New Brunswick, NJ, 2007.
- R. Dantu, Clothier, G., and Atri, A., “EAP Methods for Wireless Networks”, Comput. Stand. Interfaces, vol. 29, pp. 289–301, 2007.
- R. Dantu, Cangussu, J., and Patwardhan, S., “Fast Worm Containment Using Feedback Control”, IEEE Transactions on Dependable and Secure Computing, vol. 4, pp. 119 - 136, 2007.
- W. Fagen, Cangussu, J., and Dantu, R., “Goliath: A Configurable Approach for Network Testing”, in Testbeds and Research Infrastructure for the Development of Networks and Communities,
2007. TridentCom 2007. 3rd International Conference on, 2007.
- R. Dantu, Oosterwijk, H., Kolan, P., and Husna, H., “HIPAA: Securing Medical Networks”, Network Security, vol. 2007, pp. 13–16, 2007.
- R. Dantu, Patel, P., Patel, P., Garbuz, A., Miernik, J., Patel, A., and Holur, B., “Method and system for providing services for wireless data calls”, 2007.
- S. Phithakkitnukoon and Dantu, R., “Predicting Calls: New Service for an Intelligent Phone”, in 10th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks
and Services, MMNS 2007, San José, USA, 2007.
- P. Kolan and Dantu, R., “Socio-technical Defense Against Voice Spamming”, ACM Trans. Auton. Adapt. Syst., vol. 2, 2007.
- R. Dantu, Ester, G., and O'Connell, P., “System and method for packet level restoration of IP traffic using overhead signaling
in a fiber optic ring network”, 2007.
- R. Dantu, “A Testbed for Research and Development for Securing IP Multimedia Communication Services”. NSF CRI PI Meeting, Boston, MA, 2007.
- S. Palla and Dantu, R., “Unwanted SMTP Paths and Relays”, in 2007 2nd International Conference on Communication Systems Software and Middleware,
2007.
2006
- R. Dantu, “CISE and Global Implications”. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
- S. Palla and Dantu, R., “Detecting phishing in emails”, in Proceedings of MIT Spam Conference, 2006.
- V. Prasanna, Mikler, A., Dantu, R., and Abbas, K., “Dynamic resource management in QoS controlled networks”, Telecommunication Systems, vol. 32, pp. 11–30, 2006.
- R. Dantu, “Future Threats”. NSF Workshop on Future Topics for Cyber Trust, 2006.
- P. Patel, Choksi, O., Davidson, K., and Dantu, R., “Method and system for configuring wireless routers and networks”, 2006.
- M. Alam, Dantu, R., Holur, B., and Eyceoz, T., “Quality indicator and method for frame selection in wireless network”, 2006.
- R. Dantu, “Securing IMS and VoIP”. 3rd Workshop on Voice over IP Security, Berlin, Germany, 2006.
- R. Dantu, Ghosal, D., and Schulzrinne, H., “Securing voice over IP”, IEEE Network, vol. 20, pp. 4-5, 2006.
- H. Sengar, Dantu, R., and Wijesekera, D., “Securing VoIP and PSTN from integrated signaling network vulnerabilities”, in 1st IEEE Workshop on VoIP Management and Security, 2006., 2006.
- H. Sengar, Dantu, R., Wijesekera, D., and Jajodia, S., “SS7 over IP: signaling interworking vulnerabilities”, IEEE Network, vol. 20, pp. 32-41, 2006.
- R. Dantu, Davis, R., and George, T., “System and method for transporting in/ain signaling over an internet protocol (IP)
network”, 2006.
- R. Dantu, “A Testbed for Research and Development For Securing Multimedia Communication Services”. NSF Workshop on Computing Research Infrastructure, Snowbird, Utah, 2006.
- R. Dantu, “Top 3 challenges in VoIP Security and Management”. 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE), Vancouver,
BC, Canada, 2006.
- R. Dantu, Patel, P., Choksi, O., Patel, A., Ali, M., Miernik, J., and Holur, B., “Wireless router and method for processing traffic in a wireless communications network”, 2006.
2005
- R. Dantu and Cangussu, J., “An Architecture for Network Security Using Feedback Control”, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security
Informatics, Atlanta, GA, 2005.
- R. Dantu, “A Blueprint for Implementing Security in Radiology”. AHRA Electronic Imaging Conference, 2005.
- R. Dantu and Kolan, P., “Detecting Spam in VoIP Networks”, in Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop,
Berkeley, CA, USA, 2005.
- R. Dantu, “Hospital Network Security: A Blueprint for Implementing Security in Radiology”. First Annual Internet Security Conference, Plano, Texas, USA, 2005.
- R. Dantu, “Method and system of integrated rate control for a traffic flow across wireline and
wireless networks”, 2005.
- R. Dantu, “Panel: What do you mean security VoIP”. IEEE ENTNET conference in conjunction with Supercom’2005, 2005.
- R. Dantu and Kolan, P., “Risk Management Using Behavior Based Bayesian Networks”, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security
Informatics, Atlanta, GA, 2005.
- R. Dantu, “Security and Privacy issues in Radiology”. NSF Cyber Trust PI meeting, 2005.
- R. Dantu, Cangussu, J., and Turi, J., “Sensitivity Analysis of an Attack Containment Model”, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security
Informatics, Atlanta, GA, 2005.
- T. George, Bidulock, B., Dantu, R., Schwarzbauer, H., and Morneault, K., “Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Peer-to-Peer Adaptation
Layer (M2PA)”. 2005.
- R. Dantu, “Technology and Policy in securing Voice over IP”. 2nd Workshop on Voice over IP Security, Washington, DC, 2005.
- R. Dantu, “To Patch or Not to Patch”, Health Imaging and Technology News Magazine, pp. 48-49, 2005.
- R. Dantu and Oosterwijk, H., “Top Ten Recommendations for PACS Security Implementation”, Health Imaging & IT Magazine, 2005.
2004
- R. Dantu and Joglekar, S., “Collaborative Vision Using Networked Sensors”, in Proceedings of the International Conference on Information Technology: Coding
and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
- R. Dantu, Abbas, K., O'Neill, M., and Mikler, A., “Data centric modeling of environmental sensor networks”, in Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004.
IEEE, 2004.
- R. Dantu, “Differences between VoIP and Data Security”. Internet2 workshop on VoIP, Austin, Texas, USA, 2004.
- R. Dantu, Cangussu, J., and Yelimeli, A., “Dynamic Control of Worm Propagation”, in Proceedings of the International Conference on Information Technology: Coding
and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
- L. Yang, Dantu, R., Anderson, T., and Gopal, R., “Forwarding and Control Element Separation (ForCES) Framework”. RFC Editor, 2004.
- R. Dantu, Loper, K., and Kolan, P., “Risk Management Using Behavior Based Attack Graphs”, in Proceedings of the International Conference on Information Technology: Coding
and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
- R. Dantu and Oosterwijk, H., “Survey on Hospital Network Security and Privacy”. Barco Ltd, 2004.
- R. Dantu, “VoIP: Are We Secured”. VoIP: Are We Secured, Plano, TX, USA, 2004.
- R. Dantu, “VoIP Security”. Annual DFW Secret Service Agents Meeting, Dallas, Texas, USA, 2004.
- R. Dantu, “VoIP Security”. 3rd Annual Dallas Wireless Security Conference, Dallas, Texas, USA, 2004.
2003
- T. Anderson, Bowen, E., Dantu, R., Doria, A., Gopal, R., Salim, J., Khosravi, H.,
Minhazuddin, M., and Wasserman, M., “Requirements for Separation of IP Control and Forwarding”. RFC Editor, 2003.
2002
- L. Andersson, Callon, R., Dantu, R., Doolan, P., Feldman, N., Fredette, A., Gray,
E., Heinanen, J., Jamoussi, B., Kilty, T., Malis, A., Girish, M., Worster, T., and
Wu, L., “Constraint-Based Label Switched Path Setup using Label Distribution Protocol”. 2002.
- K. Morneault, Dantu, R., Sidebottom, G., Bidulock, B., and Heitz, J., “Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Adaptation Layer”. 2002.
2001
1994
- R. Dantu, Dimopoulos, N., Li, K., Patel, R., and Al-Khalili, A., “Parallel algorithms for low-level vision on the homogeneous multiprocessor”, Computers & Electrical Engineering, vol. 20, pp. 51 - 60, 1994.
1992
- R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., “Depth perception using blurring and its application in VLSI wafer probing”, Machine Vision and Applications, vol. 5, pp. 35–45, 1992.
1990
1989
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., “Micromanipulator vision for wafer probing”, IEEE Transactions on Semiconductor Manufacturing, vol. 2, pp. 114-117, 1989.
1988