Zhang, H., Dantu, R. (2011). Event Detection based on Call Detail Records. Behavior Computing: Modeling, Analysis, Mining and Decision. 305–316. Springer London: Proceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), June. http://dx.doi.org/10.1007/978-1-4471-2969-1_19
Zhang, H., Dantu, R. (2011). Smart Phone: Predicting the Next Call. Behavior Computing: Modeling, Analysis, Mining and Decision. 317-325. Springer London: Proceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), June. https://link.springer.com/chapter/10.1007/978-1-4471-2969-1_20
Dantu, R., Guturu, P. (2010). An Architecture for IP-based Next Generation Radio Access network. Fourth-Generation Wireless Networks: Applications and Innovations. 61-76. IGI Global Publications. https://www.igi-global.com/chapter/architecture-based-next-generation-radio/40697
Dantu, R., Guturu, P. (2009). An Architecture for IP-based Next Generation Radio Access network, book chapter. 16. IGI Global Publications, Fourth-Generation Wireless Networks: Applications and Innovations. https://www.igi-global.com/chapter/architecture-based-next-generation-radio/40697
Germain, J., Dantu, R., Thompson, M. (2024). A Gamechanger for Random Number Generation.. 367-369. Baltimore, Maryland: Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy.
Salau, A., Dantu, R., Upadhyay, K., Badruddoja, S. (2022). Data Cooperatives for Trusted News Sharing in Social Media. 237-244. San Antanio, Texas: 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA).
Salau, A., Dantu, R., Morozov, K., Badruddoja, S., Upadhayay, K. (2022). Making Blockchain Validators Honest. 267-273. San Antanio, Texas: 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA).
Badruddoja, S., Dantu, R., He, Y., Thompson, M., Salau, A., Upadyaya, K. (2022). Making Smart Contracts Predict and Scale. 127-134. San Antanio, Texas: 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA).
Badruddoja, S., Dantu, R., He, Y., Thompson, M., Salau, A., Upadyaya, K. (2022). Smarter Contracts to Predict using Deep-Learning Algorithms. 280-288. San Antanio, Texas: 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA).
Badruddoja, S., Dantu, R., He, Y., Thompson, M., Salau, A., Upadyaya, K. (2022). Trusted AI with Blockchain to Empower Metaverse. 237-244. San Antanio, Texas: 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA).
Salau, A., Dantu, R., Morozov, K., Badruddoja, S., Upadhyay, K. (2022). Making Blockchain Validators Honest. IEEE. https://doi.org/10.1109/BCCA55292.2022.9921952
Germain, J., Dantu, R., Thompson, M. (2022). Quantum Networks: Reset-and-Reuse can be a Game-changer for Entanglement via Distillation. 855-858. Broomfield, Colorado: I 2022 IEEE International Conference on Quantum Computing and Engineering (QCE.
Salau, A., Dantu, P., Morozov, K., Upadhyay, K., Badruddoja, S. (2022). Towards a Threat Model and Security Analysis for Data Cooperatives. 707-713. SECRYPT 2022.
Salau, A., Dantu, R., Morozov, K., Badruddoja, S., Upadhyay, K. (2022). Towards a Threat Model and Security Analysis for Data Cooperatives. 707-713. Lisbon,: Proceedings of the 19th International Conference on Security and Cryptography,(SECRYPT)}.
Dockendorf, M., Dantu, R., Long, j. (2022). Graph Algorithms over Homomorphic Encryption for Data Cooperatives. 205-214. Lisbon,: Proceedings of the 19th International Conference on Security and Cryptography.
Ranasinghe,, I., Dantu, R., Yuan, C., Albert, M. V. (2021). A Collaborative and Adaptive Feedback System for Physical Exercises. New York: The 7th IEEE International Conference on Collaboration and Internet Computing (CIC).
Upadhyaya, K., Dantu, R., He, Y., Badruddoja, S., Salau, A. (2021). Can't Understand SLAs? Use the Smart Contract. New York: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
Upadhyay, K., Dantu, R., He, Y., Salulu, A., Badruddoja, S. (2021). Make Consumers Happy by Defuzzifying the Service Level Agreements,. New York: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
Upadhyaya, K., Dantu, R., He, Y., Badruddoja, S., Salau, A. (2021). Paradigm Shift from Paper Contracts to Smart Contracts,. New York: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
Salau, A., Dantu, R., Upadyay, K. (2021). Data Cooperatives for Neighborhood Watch. New Jersy: IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
Dockendorf, M., Dantu, P., Morozov, K., Bhowmick, S. (2021). Investing Data with Untrusted Parties using HE. 845-853. Richardson: SECRYPT 2021.
Ranasinghe, I., Dantu, P., Dantu, P. V., Watts, S., Ocana, R. (2021). Cyber-Physiotherapy: Rehabilitation to Training. 1054-1057. New York: 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM),.
Badruddoja, S., Dantu, R., He, Y., Upadhyay, K., Thompson, M. A. (2021). Making Smart Contracts Smarter. 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
Talkington, J., Dantu, R., Morozov, K. (2020). Detecting Devices and Protocols on VPN-Encrypted Networks. Other. 8. IEEE.
Talkington, J., Morozov, K., Dantu, R. (2020). Why Protocols Fail to Transition to Mobile Domains. Other. 12. IEEE. https://ieeexplore.ieee.org/document/9042951
Sen, N., Dantu, R., Morozov, K. (2020). EW256357 : A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications’ Security. 291-310. Springer. https://link.springer.com/chapter/10.1007%2F978-3-030-63095-9_19
Ganduri,, Dantu, R., Thompson, M. A., Evans, S., Widick, L. (2020). A Human-Network-Security-Interface for an Average Joe. 1-6. Virginia: 18th Annual IEEE International Conference on Intelligence and Security Informatics.
Vempati, J., Dantu, R., Badruddoja, S., Thompson, M. A. (2020). Adaptive and Predictive SDN Control During DDoS Attacks. 1-6. Arlington, Virgina: 18th Annual IEEE International Conference on Intelligence and Security Informatics.
Sen, N., Dantu, R., Thompson, R. A. (2020). Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves. 1-7. Arlington, Virginia:.
Badruddoja, S., Dantu, R., Widick, L., Zaccagni, Z., Upadhyay, K. (2020). Integrating DOTS With Blockchain Can Secure Massive IoT Sensors. 937-946. New Orleans, LA: IEEE IPDPS.
Upadhyaya, K., Dantu, R., Zaccagni, Z., Dantu, R. Is Your Legal Contract Ambiguous? Convert to a Smart Legal Contract. 273-280. New York: IEEE.
Sen, N., Dantu, R., Thompson, M. A. (2020). Performance Analysis of Elliptic Curves for VoIP Audio Encryption using a Softphone. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST). 335, 503-508. Springer.
Ranasinghe, I., Jayaraman, A., Xiao, T., Dantu, R., Thompson, M. A., Albert, M. (2020). Home Care Robotic Assistant Prototype for Remote Human Supervision: Development and Pilot Analysis of Exercise Repetition Counting over Multiple Viewing Angles. 1. ARCM: Archives of Physical Medicine and Rehabilitation.
Claiborne, C., Dantu, R., Ncube, K. (2020). Guarding Sensitive Sensor Data against Malicious Mobile Applications. 1-6. Florida: 2020 Sixth International Conference on Mobile And Secure Services (MobiSecServ),.
Bucuti, T. H., Dantu, R., Morozov, K. (2019). CMCAP: Ephemeral Sandboxes for Adaptive Access Control. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19. ACM Press. http://dx.doi.org/10.1145/3322431.3325414
Dantu, R., Zaccagni, Z., Paul, A. (2019). Micro-Accreditation for Matching Employer E-Hire Needs. 347-352. Atlanta, GA: IEEE.
Dantu, R. (2019). Blockchain Based Authentication and Authorization Framework for Remote Collaboration Systems. 3 Biotech. 1-7. Washington DC: IEEE.
Muttavarapu, A. S., Dantu, R., Thompson, M. A. (2019). A Distributed Ledger for Spammers' Resume. Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS).
Talkington, J., Dantu, R., Morozov, K. (2019). Verifying OAuth Implementations Through Encrypted Network Analysis. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19. ACM Press. http://dx.doi.org/10.1145/3322431.3326449
Ranganthan, V. P., Dantu, R., Paul, A., Mears, P., Morozov, K. (2018). A Decentralized Marketplace Application on the Ethereum Blockchain. 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). IEEE. http://dx.doi.org/10.1109/cic.2018.00023
Vempati, J. A., Dantu, R. (2018). Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an Attack. 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). 80-89. Philadelphia, PA:.
Jonnada, S., Dantu, R., Ranasinghe, I. (2018). Cyber Handyman and Nursing for Humanitarian Services and Disaster Relief. 2018 IEEE International Symposium on Technologies for Homeland Security (HST). 1-6. Woburn, MA:.
Vempati, J. A., Dantu, R., Thompson, M. A. (2018). Uninterrupted Video Surveillance in the Face of an Attack. 843-848. New York: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
Sen, N., Dantu, R., Vempati, J. A., Thompson, M. A. (2018). Performance Analysis of Elliptic Curves for Real-Time Video Encryption. 2018 National Cyber Summit (NCS). 64-71.
Jonnada, S., Dantu, R., Shrestha, P. L., Ranasinghe, I., Widick, L. (2018). An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems. 38-44. IEEE National Cybersecurity Summit.
Vempati, J., Thompson, M. A., Dantu, R. (2017). Feedback control for resiliency in face of an attack. Proceedings of the 12th Annual Conference on Cyber and Information Security Research. 17.
Hashem, Y., Takabi, H., Dantu, R. (2017). Insider Threat Detection Based on Users' Mouse Movements and Keystrokes Behavior. Secure Knowledge Management Conference 2017 (SKM 2017).
Thiyagaraja, S., Dantu, R., Shrestha, P. L., Thompson, M. A., Smith, C. (2017). Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices. Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017 IEEE/ACM International Conference on. 25--30.
Hashem, Y., Takabi, H., Dantu, R., Nielsen, R. D. (2017). A multi-modal neuro-physiological study of malicious insider threats. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS) International Workshop on Managing Insider Security Threats. 33--44. New York, New York: Association for Computing Machinery (ACM). http://doi.acm.org/10.1145/3139923.3139930
Dantu, R., Jonnada, S. (2017). Cyber Handyman: Bridging the gap between rural and urban communities. Charlottesville, Virginia: National Workshop on Developing the Research Agenda for Connected Rural Communities (CRC17).
Dantu, R., Talkington, J. (2017). Realizing Optimal Chest Compression Fraction During Cardiopulmonary Resuscitation. 347-349. Washington,DC: 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE). http://ieeexplore.ieee.org/document/7545860/
Vempati, J., Dantu, R., Thompson, M. (2017). Feedback control for resiliency in face of an attack. 7. Oak Ridge, Tennessee: The 12th Annual Cyber and Information Security Research (CISR) Conference, Oak Ridge National Laboratory, Oak Ridge, Tennessee. https://dl.acm.org/citation.cfm?id=3064815
Dantu, R., Jaynes, M. (2017). Automating ECU Identification for Vehicle Security. 632-635. Anaheim, CA: IEEE Workshop on Machine Learning in Security of Cyber-Physical Systems, as part of the 2016 IEEE International Conference on Machine Learning Applications. http://ieeexplore.ieee.org/document/7838215/
Mayo, Q. R., Bryce, R. C., Dantu, R. (2015). PhD Forum: A System Identification Approach to Monitoring Network Traffic Security. Cyber Security and Cloud Computing (CSCloud), 2015 IEEE 2nd International Conference on. 509--511.
Dantu, R., Quentin, M., Bryce, R. (2015). A System Identification Approach to Monitoring Network Traffic Security. 509 - 511. New York, NY: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York. http://ieeexplore.ieee.org/document/7371530/
Dantu, R., Gupta, N., Dantu, S., Nana, A. (2015). Fitts Law Extensions for Multiple Joint Movements. 96(10), e61. Dallas, Texas: American Congress on Rehabilitation Medicine. http://www.archives-pmr.org/article/S0003-9993(15)00860-6/abstract
Dantu, R., Bajwa, G., Nana, A. (2015). Quantifying Dynamic Cerebral Autoregulation using Electroencephalograms. 96(10), e69. Dallas, Texas: American Congress on Rehabilitation Medicine. http://www.archives-pmr.org/article/S0003-9993(15)00886-2/abstract
Dantu, R., Widick, L., Talkington, J., Bajwa, G. (2015). A Framework for Secured Collaboration in mHealth. 364 - 369. Atlanta, GA: Fifth International Symposium on Security in Collaboration Technologies and Systems (SECOTS). http://ieeexplore.ieee.org/document/7210450/
Dantu, R., Bucuti, T. (2015). An opportunistic encryption extension for the DNS protocol. 194 - 194. Baltimore, MD: IEEE International Conference on Intelligent Security Informatics. http://ieeexplore.ieee.org/document/7165976/
Dantu, R., Bajwa, G., Aldridge, R. (2015). Pass-Pic: A Mobile User Authentication. 195 - 195. Baltimore, MD: International Conference on Intelligent Security Informatics. http://ieeexplore.ieee.org/document/7165977/
Dantu, R., Claiborne, C., Ncube, C. (2015). Random Anonymization of Mobile Sensor Data -Modified Android Framework. 182 - 184. Baltimore, MD: IEEE International Conference on Intelligent Security Informatics. http://ieeexplore.ieee.org/document/7165968/
Dantu, R., Bajwa, G., Fazeen, M., Issadeen, M., Tanpure, S. (2015). Unintentional Bugs to Vulnerability Mapping in Android Applications. 176 - 178. Baltimore, MD: IEEE International Conference on Intelligent Security Informatics. http://ieeexplore.ieee.org/document/7165966/
Jaynes, M., Dantu, R. (2014). Tire-road friction estimation utilizing smartphones. Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on.
Dantu, R., M, F. (2014). Another free app: Does it have the right intentions?. 282-289. Toronto, ON: Twelfth Annual International Conference on Privacy, Security and Trust (PST). http://ieeexplore.ieee.org/document/6890950/
Dantu, R., Thiagraj, S., Vempati, J., Dantu, T., S. D. (2014). Smart phone monitoring of second heart sound split. 2181-2184. Chicago, IL: Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology (EMBC). http://ieeexplore.ieee.org/document/6944050/
Dantu, R., Fazeen, M., Bajwa, G. (2014). Context-aware multimedia encryption in mobile platforms. 53-56. New York, NY: In Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14), Robert K. Abercrombie and J. Todd McDonald (Eds.), ACM. https://dl.acm.org/citation.cfm?doid=2602087.2602115
Dantu, R., Bajwa, G. (2013). Cerebral autoregulation assessment using electroencephalograms. 327-330. Boston, Massachusetts: BodyNets’13, Proceedings of the 8th International Conference on Body Area Networks. https://dl.acm.org/citation.cfm?id=2555319.2555393
Gupta, N., Dantu, R. (2013). Evaluation of Respiration Quality Using Smart Phone. Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments. New York, NY, USA: ACM. http://doi.acm.org/10.1145/2504335.2504364
Dantu, R., Thiagaraja, S. (2013). Finger blood flow monitoring using smart phones. 237-239. Boston, Massachusetts: Proceedings of the 8th International Conference on Body Area Networks. http://dx.doi.org/10.4108/icst.bodynets.2013.253704
Dantu, R., Bajwa, G., Fazeen, M., Joseph, R. (2013). Self-Tracking via Brain-Mobile-Cloud Interface. AAAI Spring Symposium: Data Driven Wellness.
Dantu, R., Claiborne, C., Fazeen, M. (2013). Android Sensor Data Anonymization. Rodney Bay, St. Lucia: 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013.
Dantu, R., Vempati, J., Bajwa, G. (2013). NFC Based Two-Pass Mobile Authentication. 467-468. Rodney Bay, St. Lucia: 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013. http://www.springer.com/us/book/9783642412837
Dantu, R., Bajwa, G. (2013). Cryptographic Key Generation using Electroencephalograms. Arlington, Virginia, USA: Learning From Authoritative Experimental Results, LASER’2013. http://2013.laser-workshop.org/program/wip
Dantu, R., Gupta, N. (2013). Quantifying cognitive impairment due to physical or mental stress. 6. Rhodes, Greece: PETRA. https://dl.acm.org/citation.cfm?id=2504335.2504384
Barthold, C., Subbu, K., Dantu, R. (2011). Evaluation of gyroscope-embedded mobile phones. Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on. Anchorage, AK:.
Dantu, R., Subbu, P., G. B. (2011). Indoor localization through dynamic time warping. 1639-1644. Anchorage, AK: IEEE International Conference on Systems, Man, and Cybernetics, (SMC) 2011. http://ieeexplore.ieee.org/document/6083906/
Dantu, R., E. B. (2011). Current and Future Trends in Social Media. Boston, Massachusetts: The Third IEEE International Conference on Social Computing - International Workshop on Modeling Social Media: User Interface Modeling in Social Media (MSM11), MIT campus in Cambridge, MA. http://ieeexplore.ieee.org/document/6113312/
Dantu, R., C, B., K, P. (2011). Evaluation of gyroscope-embedded mobile phones. 1632-1638. Anchorage, AK: IEEE International Conference on Systems, Man, and Cybernetics, (SMC) 2011. http://ieeexplore.ieee.org/abstract/document/6083905/
Dantu, R., Baatarjav, . (2011). Unveiling Hidden Patterns to Find Social Relevance. 242 - 249. Boston, MA: The Third IEEE International Conference on Social Computing, MIT campus in Cambridge, MA. http://ieeexplore.ieee.org/document/6113121/
Dantu, R., Baatarjav, E. (2011). Social Relevance. MIT campus in Cambridge, MA: Interdisciplinary Workshop on Information and Decision in Social Networks (WIDS 2010) Organized by Laboratory for Information and Decision Systems.
Chandrasekaran, V., Dantu, R., Gupta, N., Yang, X., Wijesekera, D. (2010). Efficiency of Social Connection-based Routing in P2P VoIP Networks. Proceedings of the 2Nd International Conference on COMmunication Systems and NETworks. Piscataway, NJ, USA: IEEE Press. http://dl.acm.org/citation.cfm?id=1831443.1831488
Sroufe, P., Phithakkitnukoon, S., Dantu, R., Cangussu, J. (2010). Email Shape Analysis. Lecture Notes in Computer Science book series (LNCS, volume 5935). 18-29. Springer, Berlin, Heidelberg: International Conference Distributed Computing and Networking (ICDCN'2010). https://link.springer.com/chapter/10.1007/978-3-642-11322-2_7
Phithakkitnukoon, S., Dantu, R. (2010). Mobile Social Closeness and Communication Patterns. Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference. Piscataway, NJ, USA: IEEE Press. http://dl.acm.org/citation.cfm?id=1834217.1834285
Zhang, H., Dantu, R. (2010). Smart Phone: Predicting the Next Call. 317-325. Springer, London: Proceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), June. https://link.springer.com/chapter/10.1007/978-1-4471-2969-1_20
Zhang, H., Dantu, R. (2010). Event Detection based on Call Detail Records. 305-316. Springer, London: Proceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), JuneProceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), Hyderabad, India. https://link.springer.com/chapter/10.1007/978-1-4471-2969-1_19
Zhang, H., Dantu, R. (2010). Predicting Social Ties in Mobile Phone Networks. 25 - 30. Vancouver, BC: Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2010),May. http://ieeexplore.ieee.org/document/5484780/
Chandrasekaran, V., Dantu, R., Gupta, N. K., Yang, X., Wijesekera, D. (2010). Efficiency of Social Connection-based Routing in P2P VoIP Networks. 1-6. Bangalore: Fourth Workshop on Intelligent Networks: Adaptation, Communication & Reconfiguration (part of COMSNETS'2010). http://ieeexplore.ieee.org/document/5431975/
Dantu, R. (2010). Social Aspects of Video Phones. 1-7. Bangalore: 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010). http://ieeexplore.ieee.org/abstract/document/5431971/
Baatarjav, E., Amin, A., Dantu, R., Gupta, N. K. (2010). Are you My friend?. 1-5. Las Vegas, NV: Seventh IEEE Conference on Consumer Communications & Networking Conference (CCNC 2010), Special Session on Social Networking (SocNets). http://ieeexplore.ieee.org/abstract/document/5421732/
Phithakkitnukoon, S., Dantu, R. (2010). Mobile Social Closeness and Similarity in Calling Patterns. 1-5. Las Vegas, NV: Seventh IEEE Conference on Consumer Communications & Networking Conference (CCNC 2010), Special Session on Social Networking (SocNets). http://ieeexplore.ieee.org/document/5421787/
Yang, X., Stavrou, A., Dantu, R., Wijesekera, D. (2010). Small World VoIP. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 76). 137-155. Springer, Berlin, Heidelberg: International Conference on Mobile Computing, Applications, and Services. https://link.springer.com/chapter/10.1007/978-3-642-29336-8_8
Chandrasekaran, V., Dantu, S., Kadiyala, P., Dantu, R., Phithakkitnukoon, S. (2010). Socio-Technical Aspects of Video Phones. 1-7. Bangalore: Fourth Workshop on Intelligent Networks: Adaptation, Communication & Reconfiguration (part of COMSNETS'2010). http://ieeexplore.ieee.org/document/5431971/
Baatarjav, E., Dantu, R., Tang, Y., Cangussu, Jo\~ao, (2009). BBN-based Privacy Management System for Facebook. Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics. Piscataway, NJ, USA: IEEE Press. http://dl.acm.org/citation.cfm?id=1706428.1706467
Zhang, H., Dantu, R., Cangussu, Jo\~ao, (2009). Change Point Detection Based on Call Detail Records. Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics. Piscataway, NJ, USA: IEEE Press. http://dl.acm.org/citation.cfm?id=1706428.1706438
Phithakkitnukoon, S., Dantu, R. (2009). Defense Against SPIT Using Community Signals. Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics. Piscataway, NJ, USA: IEEE Press. http://dl.acm.org/citation.cfm?id=1706428.1706481
Zhang, H., Dantu, R. (2009). Opt-in Detection based on Call Detail Records. 607-608. Proceedings of the 6th Annual IEEE Consumer Communications & Networking Conference (CCNC 2009).
Madhavan, Y., Cangussu, Jo\~ao,, Dantu, R. (2009). Penetration Testing for Spam Filters. Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02. Seattle, WA: IEEE Computer Society. http://dx.doi.org/10.1109/COMPSAC.2009.168
Zhang, H., Dantu, R., Cangussu, J. (2009). Quantifying reciprocity in Social Networks. 4, 1031-1035. IEEE InternationalWorkshop on Social Mobile Web (SMW09), in conjunction with SocialCom-09.
Madhavan, Y., Cangussu, J., Dantu, R. (2009). Spam Penetration Testing. 6. 1st IEEE International Workshop on Computer Forensics in Software Engineering (CFSE'2009), in conjunction with COMPSAC 2009, Seattle, Washington.
Langle, L., Dantu, R. (2009). Are you A Safe Driver. 502-507. Vancouver, BC: IEEE International Conference on Embedded and Pervasive Systems, EAP-09. http://ieeexplore.ieee.org/document/5284183/
Subbu,, K., Xu, N., Dantu, R. (2009). iKnow Where You Are. 469-474. Vancouver, BC: In Proceedings of the IEEE International Symposium on Social Intelligence and Networking (SIN09), in conjunction with SocialCom. http://ieeexplore.ieee.org/document/5284201/
Baatarjav, E., Dantu, R., Tang, Y., Cangussu, J. (2009). BBN-based Privacy Management System for Facebook. 194 - 196. Dallas, TX: Proc. of IEEE Inter. Conf. on Intelligence and Security Informatics, Dallas, TX. http://ieeexplore.ieee.org/abstract/document/5137300/
Zhang, H., Dantu, R., Cangussu, J. (2009). Change Point Detection based on Call Detail Records. 55 - 60. Dallas, Texas: Proc. of IEEE Inter. Conf. on Intelligence and Security Informatics, Dallas, TX. http://ieeexplore.ieee.org/document/5137271/
Baatarjav, E., Phithakkitnukoon, S., Dantu, R. (2009). Defense Against SPIT Using Community Signals. 232 - 232. Dallas, TX: Proc. of IEEE Inter. Conf. on Intelligence and Security Informatics, Dallas, TX. http://ieeexplore.ieee.org/abstract/document/5137314/
Yang, X., Dantu, R., Wijesekera, D. (2009). A society-integrated testbed architecture for peer-to-peer telecommunications. Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009. TridentCom 2009. 5th International Conference on.
Alazzawe, A., Alazzawe, A., Wijesekera, D., Dantu, R. (2009). A testbed for mobile social computing. Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009. TridentCom 2009. 5th International Conference on.
Yang, X., Dantu, R., Wijesekera, D. (2009). Achieving Peer-to-Peer Telecommunication Services through Social Hashing. 1-2. Las Vegas, NV: The 6th Annual IEEE Conference on Consumer Communications & Networking Conference (CCNC 2009). http://ieeexplore.ieee.org/document/4784812/
Sroufe, P., Phithakkitnukoon, S., Dantu, R. (2009). Email Shape Analysis for Spam Botnet Detection. 1-2. Las Vegas, NV: The 6th Annual IEEE Conference on Consumer Communications & Networking Conference (CCNC 2009). http://ieeexplore.ieee.org/abstract/document/4784781/
Baatarjav, E., Dantu, R., Phithakkitnukoon, S. (2008). Privacy Management for Facebook. 273 - 286. Springer-Verlag Berlin, Heidelberg: The International Conference on Information Systems Security (ICISS 2008), Hyderabad, India. https://dl.acm.org/citation.cfm?id=1496288
Phithakkitnukoon, S., Dantu, R. (2008). Adequacy of Data for Characterizing Caller Behavior. 9. Las Vegas, NV: The 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - The 2nd Workshop on Social Network Mining and Analysis (SNA-KDD 2008). https://pdfs.semanticscholar.org/dd5c/e102bbbd565c17fa5bcaf62e183d23b23f60.pdf?_ga=2.246883718.382614901.1517971822-1402626469.1517971822
Husna, H., Phithakkitnukoon, S., Palla, S., Dantu, R. (2008). Behavior Analysis of Spam Botnets. 246-253. Bangalore: The 3rd Annual IEEE International Conference on Communication System Software and Middleware (COMSWARE 2008), Bangalore, India. http://ieeexplore.ieee.org/abstract/document/4554418/
Phithakkitnukoon, S., Husna, H., Dantu, R. (2008). Behavioral Entropy of a Cellular Phone User. 160-167. Springer, Boston, MA: The 1st International Workshop on Social Computing, Behavioral Modeling, and Prediction (SBP 2008), Springer Lecture Notes in Computer Science (LNCS). https://link.springer.com/chapter/10.1007/978-0-387-77672-9_18#citeas
Phithakkitnukoon, S., Dantu, R. (2008). CPL: Enhancing Mobile Phone Functionality by Call Predicted List. Proceedings of the OTM Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: 2008 Workshops: ADI, AWeSoMe, COMBEK, EI2N, IWSSA, MONET, OnToContent + QSI, ORM, PerSys, RDDS, SEMELS, and SWWS. Berlin, Heidelberg: Springer-Verlag. http://dx.doi.org/10.1007/978-3-540-88875-8_80
Phithakkitnukoon, S., Dantu, R. (2008). CPL: Enhancing Mobile Phone Functionality by Call Predicted List. 571-581. Springer, Berlin, Heidelberg: OnTheMove Federated Conference (OTM 2008) - The 3rd International Workshop on MObile and NEtworking Technologies for social applications (MONET'08), LNCS 5333, Monterrey, Mexico. https://link.springer.com/chapter/10.1007/978-3-540-88875-8_80
Zhang, H., Dantu, R. (2008). Discovery of Social groups using Call Detail Records. 489-498. Springer, Berlin, Heidelberg: OnTheMove Federated Conference (OTM 2008) - The 3rd International Workshop on MObile and NEtworking Technologies for social applications (MONET'08), LNCS 5333, Monterrey, Mexico, November. https://link.springer.com/chapter/10.1007/978-3-540-88875-8_72
Baatarjav, E., Phithakkitnukoon, S., Dantu, R. (2008). Group Recommendation System for Facebook. 211-219. Springer, Berlin, Heidelberg: On The Move Federated Conference (OTM 2008) - The First International Workshop on Community-Based Evolution of Knowledge-Intensive Systems (COMBEK'08), LNCS 5333, Monterrey, Mexico. https://link.springer.com/chapter/10.1007/978-3-540-88875-8_41
Phithakkitnukoon, S., Dantu, R. (2008). Inferring Social Groups using Call Logs. 200-210. Springer, Berlin, Heidelberg: OnTheMove Federated Conference (OTM 2008) - The International Workshop on Community-Based Evolution of Knowledge-Intensive Systems (COMBEK'08), LNCS 5333, Monterrey, Mexico. https://link.springer.com/chapter/10.1007/978-3-540-88875-8_40
Sroufe, P., Dantu, R. (2008). Experiences in Building a Multi-University Testbed for Research in Multimedia Communications. 1-5. Miami, FL: ACM International Parallel & Distributed Processing Symposium, Miami, FL. http://ieeexplore.ieee.org/document/4536392/
Kolan, P., Dantu, R. (2008). Call Algebra. 2008 5th IEEE Consumer Communications and Networking Conference.
Phithakkitnukoon, S., Husna, H., Baatarjav, E., Dantu, R. (2008). Quantifying Presence using Calling Patterns. 184 - 187. Bangalore: The 3rd Annual IEEE International Conference on Communication System Software and Middleware (COMSWARE 2008), Bangalore, India. http://ieeexplore.ieee.org/document/4554403/
Zhang, H., Dantu, R. (2008). Quantifying the presence of Phone users. 883-887. Las Vegas, NV: The 5th Annual IEEE Conference on Consumer Communications and Networking Conference (CCNC 2008), Las Vegas, NV. http://ieeexplore.ieee.org/document/4446504/
Husna, H., Phithakkitnukoon, S., Dantu, R. (2008). Traffic Shaping of Spam Botnets. 786-787. Las Vegas, NV: The 5th Annual IEEE Conference on Consumer Communications and Networking Conference (CCNC 2008), Las Vegas, NV. http://ieeexplore.ieee.org/document/4446479/
Phithakkitnukoon, S., Dantu, R. (2007). Predicting Calls: New Service for an Intelligent Phone. 4787, 27-36. Springer, Berlin, Heidelberg: IFIP/IEEE International Conference on Multimedia, and Mobile Networks (MMNC). https://link.springer.com/chapter/10.1007/978-3-540-75869-3_3
Dantu, R., Kolan, P., Akl, R. (2007). Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. 71-74. New Brunswick, NJ: IEEE International Conference on Security Informatics (ISI), New Jersey. http://ieeexplore.ieee.org/document/4258676/
Fagen, W., Canussu, J., Dantu, R. (2007). Goliath: A Configurable Approach for Network Testing. 1-9. Lake Buena Vista, FL: 2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities. http://ieeexplore.ieee.org/document/4444667/
Kolan, P., Vaithialingam, R., Dantu, R. (2007). Automatic Calibration Using Receiver Operating Characteristics Curves. 1-8. Bangalore: IEEE First Workshop on Information Assurance Middleware for COMmunications (IAMCOM). http://ieeexplore.ieee.org/abstract/document/4268127/
Palla, S., Dantu, R. (2007). Unwanted SMTP Paths and Relays. Bangalore: IEEE 2nd International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007). http://ieeexplore.ieee.org/document/4268083/
Palla, S., Dantu, R. (2006). Detecting phishing in emails. Proceedings of MIT Spam Conference.
Sengar, H., Dantu, R., Wijesekera, D. (2006). Securing VoIP and PSTN from Integrated Signaling Network Vulnerabilities. 1-7. Vancouver, BC: 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE). http://ieeexplore.ieee.org/document/1638116/
Palla, P., Dantu, R. (2006). Detecting Phishing in E-mails. 6. Boston, Massachusetts: MIT Spam Conference.
Dantu, R., Cangussu, Jo\~ao, (2005). An Architecture for Network Security Using Feedback Control. Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics. Atlanta, GA: Springer-Verlag. http://dx.doi.org/10.1007/11427995_84
Dantu, R., Kolan, P. (2005). Risk Management Using Behavior Based Bayesian Networks. Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics. Atlanta, GA: Springer-Verlag. http://dx.doi.org/10.1007/11427995_10
Dantu, R., Cangussu, Jo\~ao,, Turi, J. (2005). Sensitivity Analysis of an Attack Containment Model. Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics. Atlanta, GA: Springer-Verlag. http://dx.doi.org/10.1007/11427995_11
Dantu, R., Kolan, P. (2005). Detecting Spam in VoIP Networks. 31-38. Berkeley, CA: Proceedings of USENIX, SRUTI'05. https://dl.acm.org/citation.cfm?id=1251287
Dantu, R., Cangussu, J. (2005). An architecture for Network Security Using Feedback Control. 636-637. Springer, Berlin, Heidelberg: IEEE International Conference on Intelligence and Security Informatics, ISI 2005,Lecture Notes in Computer Science, Springer Verlag. https://link.springer.com/chapter/10.1007/11427995_84
Dantu, R., Kolan, P. (2005). Risk Management using Behavior based Bayesian Networks. 115-126. Springer, Berlin, Heidelberg: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Lecture Notes in Computer Science. https://link.springer.com/chapter/10.1007/11427995_10
Dantu, R., Cangussu, J., Turi, J. (2005). Sensitivity Analysis of an Attack Containment Model. 127-138. Springer, Berlin, Heidelberg: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Lecture Notes in Computer Science. https://link.springer.com/chapter/10.1007/11427995_11
Dantu, R., Abbas, K., O'Neill, M., Mikler, A. (2004). Data centric modeling of environmental sensor networks. 447-452. Dallas, TX: IEEE GLOBECOM Workshop on Adaptive Wireless Networks, IEEE GLOBECOM 2004, Dallas, USA. http://ieeexplore.ieee.org/abstract/document/1417621/
Dantu, R., Abbas, K., O'Neill II, M., Mikler, A. R. (2004). Data Modeling of Environmental Sensor Networks. EEE GLOBECOM Workshop on Adaptive Wireless Networks.
Dantu, R., Abbas, K., O’Neill, M., Mikler, A. R., others, (2004). Data centric modeling of environmental sensor networks. Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004. IEEE. 447–452.
Dantu, R., Kolan, P. (2004). Detecting Spam in VoIP Networks. 5-5. Berkeley, CA: IEEE GLOBECOM workshop on VoIP Security, GLOBECOM 2004, Dallas, USA. https://dl.acm.org/citation.cfm?id=1251287
Dantu, R., Joglekar, S. (2004). Collaborative Vision using Networked Sensors. 305-399. Las Vegas, NV: IEEE International Conference on Information Technology, special track on sensor networks, ITCC 2004. http://ieeexplore.ieee.org/abstract/document/1286673/
Dantu, R., Cangussu, J., Yelimeli, A. (2004). Dynamic Control of Worm Propagation. 419-423. Las Vegas, NV: IEEE International Conference on Information Technology, ITCC 2004, special track on information assurance and security. http://ieeexplore.ieee.org/document/1286491/
Dantu, R., Loper, K., Kolan, P. (2004). Risk Management using Behavior based Attack Graphs. 445-449. Las Vegas, NV: IEEE International Conference on Information Technology, special track on information assurance and security, ITCC 2004. http://ieeexplore.ieee.org/abstract/document/1286496/
Dantu, R. (2002). An Architecture of Security Engineering. Boston, Massachusetts: ACSA Workshop on Application of Engineering Principals for Security System Design.
Dantu, R. (2001). IP in Radio Access Networks. Dallas, Texas: 19th IEEE Annual CVT Symposium.
Khasnabish, B., Dantu, R. (1996). Traffic Management in an Enterprise Networking Switch, Few Case Studies. 1-10. Dallas, Texas: First International Workshop on Enterprise Networking (part of ICC '96).
Dantu, R., Dimopolous, N. J., Patel, R. V., Al-Khalili, A. J. (1990). Micro-manipulators for Wafer Probing. 711-722. Proceedings of SPIE Conference on Application of Artificial Intelligence. http://dx.doi.org/10.1117/12.21121
Dantu, R., Patel, R. V., Dimopolous, N. J., Al-Khalili, A. J. (1989). Vision Algorithms for VLSI Wafer Probing. 54-65. Philadelphia, PA: Proc. SPIE 1197, Automated Inspection and High-Speed Vision Architectures III. http://dx.doi.org/10.1117/12.969934
Dantu, R., Dimopolous, N. J., Patel, R. V., Al-Khalili, A. J. (1988). A micro-manipulator vision in IC manufacturing. 1455-1460. Philadelphia, PA: Proceedings of the 1988 IEEE International Conference on Robotics and Automation, USA. http://ieeexplore.ieee.org/document/12271/
Dimopolous, N. J., Li, K. F., Wang, E. C., Dantu, R. (1987). The Homogeneous Multiprocessor System – An Overview. 592-599. Raleigh, NC: Proceedings of the 1987 IEEE International Conference on Parallel Processing.
Dantu, R., Dimopolous, N. J., Li, K. F., Patel, R. V., Al-Khalili, A. J. (1986). Parallel Algorithms for Low-level Vision on the Homogeneous Multiprocessor. 421-423. Proceedings of IEEE International Conference on Computer Vision (CVPR'86), Miami. https://www.sciencedirect.com/science/article/pii/004579069490006X
Dantu, R., Dimopolous, N. J., Patel, R. V., Al-Khalili, A. J. (1986). An Integrated Micro-manipulator System for Integrated Circuit Manufacturing. Montreal: Proceedings of the 1986 Canadian Conference on Industrial Computer Systems.
Dantu, R., Rao, N. V. (1982). Teaching Aids for Microprocessor Interfacing Devices. International Conference on Teaching Aids in Physics Education (TAPE), National University of Singapore.
Thiyagaraja, S., Dantu, R., Shrestha, P. L., Chitnis, A., Thompson, M. A., Anumandla, P., Sarma, T., Dantu, S. (2018). A novel heart-mobile interface for detection and classification of heart sounds. Other. 45, 313 - 324. Elsavier. https://www.sciencedirect.com/science/article/pii/S1746809418301101
Sarma, S., Bucuti, H., Chitnis, A., Klacman, A., Dantu, R. (2017). Real-Time Mobile Device-Assisted Chest Compression During Cardiopulmonary Resuscitation. American Journal of Cardiology. 120, 196 - 200. http://dx.doi.org/10.1016/j.amjcard.2017.04.007
Dantu, R., Sarma, T., Chitnis, A., Bucuti, T., Klacman, A. (2017). Real Time Mobile Device Assisted Cardiopulmonary Resuscitation. 120(2), 196-200. American Journal of Cardiology. https://www.ncbi.nlm.nih.gov/pubmed/28550930
Dantu, R., Chandrasekaran, V., Gupta, N. (2016). 911 services and vital sign measurement utilizing mobile phone sensors and applications. US: University of North Texas. https://patents.google.com/patent/US9485345/en
Hashem, Y., Takabi, H., GhasemiGol, M., Dantu, R. (2016). Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals. Other. 6(1), 20--36.
Dantu, R., G. B. (2016). Neurokey: Towards a New Paradigm of Cancelable Biometrics based Key Generation using Electroencephalograms. 62, 93-115. Computer & Security, Elsevier Publications. https://www.sciencedirect.com/science/article/pii/S0167404816300669
Dantu, R., Gupta, N., Dantu, V., Morgan, Z. (2015). Effective CPR Procedure With Real-Time Evaluation and Feedback Using Smartphones. (US20150351647A1), .
Dantu, R., Takabi, H., Hashem, Y. (2015). Towards Insider Threat Detection Using Psychophysiological Signals. 71-74. New York, NY: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, Boulder, Colarado. https://dl.acm.org/citation.cfm?id=2808792
Dantu, R., G. B. (2015). Detecting on-road driver distraction events using a single channel dry sensor EEG. Other.
Dantu, R., Gupta, N. (2014). Effective CPR Procedure with Real Time Evaluation and Feedback Using Smartphone. 2, 2800111. IEEE Journal on Journal of Translational Engineering in Health and Medicine. http://ieeexplore.ieee.org/document/6823662/
Dantu, R., Chandrasekaran, V., Subbu, K., Jonnada, S., Thiyagaraja, S. (2013). Cuffless Differential Blood Pressure Estimation Using Smart Phones. 60(4), 1080-1089. IEEE Trans. Biomed. Engineering. http://ieeexplore.ieee.org/abstract/document/6256704/
Dantu, R., Chandrasekaran, V., Subbu, K. (2013). Socio-technical aspects of remote media control for a NG9-1-1 system. Multimedia Tools and Applications. 62(3), 733-759. Hingham, MA:. https://dl.acm.org/citation.cfm?id=2440692
Dantu, R., Gozick, B., Subbu, K. (2013). LocateMe: Magnetic-fields-based indoor localization using smartphones. 4, 73. New York, NY: ACM Transactions on Intelligent System Technology. https://dl.acm.org/citation.cfm?id=2508054
Dantu, R., M, F., Bhukhiya, M., B, G. (2013). Safe Driving Using Mobile Phones. 13(2), 1462-1468. IEEE Transactions on Intelligent Transportation Systems.
Phithakkitnukoon, S., Dantu, R., Claxton, R., Eagle, N. (2012). Behavior Based Call predictor for a Smart Phone. 180-185. Springer, Berlin, Heidelberg: ACM Transactions on Autonomous and Adaptive Systems. https://link.springer.com/chapter/10.1007/978-3-642-32692-9_24
Dantu, R., Yang, X., Wijasekara, D., Kant, K., Zhang (Eds.), N., Das, S. (2012). Security Issues in VoIP Telecommunication Networks. 2, 763–789. Wyman Street, Waltham, MA 02451: Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges.
Subbu, K. P., Dantu, R., Gozick, B., Maeshiro, T. (2011). Magnetic Maps for Indoor Navigation. 60(12), 3883 - 3891. IEEE Transactions on Instrumentation and Measurement. http://ieeexplore.ieee.org/document/5773083/
Phithakkitnukoon, S., Dantu, R., Claxton, R., Eagle, N. (2011). Behavior-based Adaptive Call Predictor. Other. 6, 21:1\textendash21:28. http://doi.acm.org/10.1145/2019583.2019588
Phithakkitnukoon, S., Dantu, R. (2011). Mobile Social Group Sizes and Scaling Ratio. Other. 26, 71\textendash85. http://dx.doi.org/10.1007/s00146-009-0230-5
Phithakkitnukoon, S., Dantu, R. (2011). Towards Ubiquitous Computing with Call Prediction. Other. 15, 52\textendash64. http://doi.acm.org/10.1145/1978622.1978628
Dantu, R., Subbu, K., Chandrasekaran, V. (2011). Socio-technical Aspects of Remote Media Control for a NG9-1-1 System. 62(3), 733–759. Hingham, MA: Multimedia Tools and Applications. https://dl.acm.org/citation.cfm?id=2440692
Zhang, H., Dantu, R., W. Cangussu, J. (2011). Socioscope: Human Relationship and Behavior Analysis in Social Networks. 41(6), 1122-1143. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans. http://ieeexplore.ieee.org/document/5732708/
Dantu, R., Guturu, P. (2011). Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. 1(3), 241–254. Social Network Analysis and Mining. https://link.springer.com/article/10.1007/s13278-011-0017-9
Alazzawe, A., Alazzawe, A., Wijesekera, D., Dantu, R. (2010). A Testbed for Large Mobile Social Computing Experiments. 8(2), 89–97. International Journal of Sensor Networks. http://www.inderscience.com/offer.php?id=34618
Palla, S., Dantu, R., Cangussu, Jo\~ao, (2010). Spam Classification Based on E-Mail Path Analysis. Other. 332.
Phithakkitnukoon, S., Dantu, R. (2010). ContextAlert: Context-aware alert mode for a mobile phone. International Journal of Pervasive Computing and Communications. 6, 1\textendash23.
Phithakkitnukoon, S., Dantu, R. (2010). ContextAlert: Context-Aware Alert Mode Control for a Mobile Phone. 6(3), 25. International Journal of Pervasive Computing and Communications, Emerald Publishers. http://www.emeraldinsight.com/doi/abs/10.1108/17427371011084266?journalCode=ijpcc
Sroufe, P., Tate, S., Dantu, R., Celikel, E. (2010). Experiences During a Collegiate Cyber Defense Competition. 5(3), 382–396. Journal of Applied Security Research, Taylor & Francis Publications. https://libres.uncg.edu/ir/uncg/f/S_Tate_Experiences_2010.pdf
Fazen, M., Bhukari, M., Dantu, R. (2010). Safe Driving Using Mobile Phones. 13(2), 1462 - 1468. IEEE Transactions on Vehicular Technology. http://ieeexplore.ieee.org/document/6171850/
Gupta, N., Dantu, R., Schulzrinne, H., Magnussen, W. (2010). Next Generation 9-1-1: Architecture and challenges in realizing an IP-multimedia-based emergency service. 7(1), 12. Journal of Homeland Security and Emergency Management. https://www.degruyter.com/view/j/jhsem.2010.7.1/jhsem.2010.7.1.1657/jhsem.2010.7.1.1657.xml
Fagen, W., Cangussu, J., Dantu, R. (2009). A Virtual Environment for Network Testing. Journal of Networking and Computer Applications (JNCA). 32(1), 184-214. Elsevier.
Dantu, R., Schulzrinne, H., Fahmy, S., Cangussu, J. (2009). Issues and Challenges in Securing VoIP. Journal of Computers and Security. 743-753. Elsevier.
Holur, B., Dantu, R., Derrick, C. (2009). Method and system for managing wireless bandwidth resources. US: Cisco Technology Inc. https://patents.google.com/patent/US7539499B2/en
Dantu, R., Chiang, S., Yin, H., Kachhla, R. (2009). Method and system for providing wireless-specific services for a wireless access network. US: Cisco Technology Inc. https://patents.google.com/patent/US7639647/en
Phithakkitnukoon, S., Dantu, R. (2009). Mobile Social Group Sizes and Scaling Ratio. Journal of AI and Society. 15. Springer Verlag.
Dantu, R., Kolan, P., Cangussu, J. (2009). Network Risk Management using Attacker Profiling. Journal of Security and Communication Networks. 83-96. John Wiley and Sons.
Phithakkitnukoon, S., Dantu, R. (2009). Towards Ubiquitous Computing with Call Prediction. ACM SIGMOBILE Mobile Computing and Communications Review. 12.
Kolan, P., Dantu, R., Cangussu, J. (2009). Nuisance Level of a Voice Call. 5(1), 30. New York, NY: ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM). https://dl.acm.org/citation.cfm?id=1404886
Dantu, R. (2009). Network Risk Management using Attacker Profiling. 2(1), 83–96. Security and Communication Networks.
Dantu, R., Chiang, S., Yin, H., Kachhla, R. (2008). Method and system for providing supplementary services for a wireless access network. US: Cisco Technology Inc. https://patents.google.com/patent/US7444151/en
Dantu, R., Chiang, S., Yin, H., Kachhla, R. (2008). Method and system of control signaling for a wireless access network. US: Cisco Technology Inc. https://patents.google.com/patent/US7471674/en
Phithakkitnukoon, S., Dantu, R., Baatarjav, E. (2008). VoIP Security - Attacks and Solutions. 17(3), 114-123. The Information Security Journal: A Global Perspective. http://www.tandfonline.com/doi/abs/10.1080/19393550802308618
Guturu, P., Dantu, R. (2008). An Impatient Evolutionary Algorithm with Probabilistic Tabu Search for Unified Solution of Some NP Hard Problems in Graph and Set Theory via Clique Finding. 38(3), 645 - 666. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics). http://ieeexplore.ieee.org/document/4459184/
Palla, S., Dantu, R. (2008). Classification of Phishers. 5(1), 1-10. Journal of Homeland Security and Emergency Management. https://www.degruyter.com/view/j/jhsem.2008.5.1/jhsem.2008.5.1.1393/jhsem.2008.5.1.1393.xml
Palla, S., Dantu, R., Cangussu, Jo\~ao, (2008). Spam Classification Based on E-Mail Path Analysis. Other. 2, 46-69. https://ideas.repec.org/a/igg/jisp00/v2y2008i2p46-69.html
Palla, S., Dantu, R., Cangussu, J. (2008). Spam Classification Based on Email Path Analysis. 2(2), 46-69. New York: International Journal of Information Security and Privacy, IGN Publishing. https://www.igi-global.com/article/spam-classification-based-mail-path/2481
Haider, S. W., Cangussu, J., Cooper, K., Dantu, R. (2008). Estimation of Defects based on Defect Decay Model: ED3M. 34(3), 336 - 356. IEEE Transactions on Software Engineering. http://ieeexplore.ieee.org/document/4492790/
Dantu, R., Oosterwijk, H., Kolan, P., Husna, H. (2007). HIPAA: Securing Medical Networks. Network Security. 2007, 13\textendash16. http://dx.doi.org/10.1016/S1353-4858(07)70055-7
Dantu, R., Patel, P., Patel, P., Garbuz, A., Miernik, J., Patel, A., Holur, B. (2007). Method and system for providing services for wireless data calls. US: Cisco Technology Inc. https://patents.google.com/patent/US7225238/en
Dantu, R., Ester, G., O\textquoterightConnell, Pete, (2007). System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network. US: Alcatel SA. https://patents.google.com/patent/US7167443/en
Dantu, R., Cangussu, J. (2007). An Architecture for Automatic and Adaptive Defense. 3(2), 37-55. Georgia, USA: Journal of Information Security and Privacy, Ivy League Publishing. http://www.tandfonline.com/doi/abs/10.1080/15536548.2007.10855815
Dantu, R. (2007). Securing Medical Networks. (11), 13-16. Network Security. https://www.sciencedirect.com/science/article/pii/S1353485807700557
Dantu, R. (2007). Fast Worm Containment using Feedback Control. 4(2), 119-136. IEEE Transactions on Dependability and Secure Computing, Vol.5, No.2, pp. 119-136, April-June 2007; You do not have access to modify this field.IEEE Transactions on Dependability and Secure Computing. http://ieeexplore.ieee.org/document/4198177/
Dantu, R., Clothier, G., Atri, A. (2007). EAP Methods for Wireless Networks. 29(3), 289-301. International Journal of Computer Standards and Interfaces, Elsevier. https://www.sciencedirect.com/science/article/pii/S092054890600050X
Dantu, R. (2007). Socio-Technical Defense Against Voice Spamming. New York, NY: ACM Transactions on Autonomous and Adaptive Systems (TAAS). https://dl.acm.org/citation.cfm?id=1216897
Dantu, R. (2006). A Testbed for Research and Development For Securing Multimedia Communication Services. Snowbird, Utah: NSF Workshop on Computing Research Infrastructure.
Dantu, R. (2006). CISE and Global Implications. Snowbird, Utah: NSF Workshop on Computing Research Infrastructure.
Prasanna, V. I., Mikler, A. R., Dantu, R., Abbas, K. (2006). Dynamic resource management in QoS controlled networks. Telecommunications Systems. 32(1), 11–30. Springer Netherlands.
Patel, P., Choksi, O., Davidson, K., Dantu, R. (2006). Method and system for configuring wireless routers and networks. US: Cisco Technology Inc. https://patents.google.com/patent/US7031266/en
Alam, M., Dantu, R., Holur, B., Eyceoz, T. (2006). Quality indicator and method for frame selection in wireless network. US: Cisco Technology Inc. https://patents.google.com/patent/US7079512/en
Dantu, R., Davis, R., George, T. (2006). System and method for transporting in/ain signaling over an internet protocol (IP) network. US: Alcatel USA Sourcing LP. https://patents.google.com/patent/US7006433B1/en?oq=US7006433
Dantu, R. (2006). Top 3 challenges in VoIP Security and Management. Vancouver, BC, Canada: 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE).
Dantu, R., Patel, P., Choksi, O., Patel, A., Ali, M., Miernik, J., Holur, B. (2006). Wireless router and method for processing traffic in a wireless communications network. US: Cisco Technology Inc. https://patents.google.com/patent/US7068624B1/en
Sengar, H., Dantu, R., Wijesekera, D., Jajodia, S. (2006). SS7 Over IP: Signaling Interworking Vulnerabilities. 20(6), 32-41. IEEE Network. http://ieeexplore.ieee.org/document/4050028/
Dantu, R., Ghosal, D., Schulzrinne, H. (2006). Securing Voice over IP. 20(5), 4-5. IEEE Network. http://ieeexplore.ieee.org/document/1705876/
Dantu, R. (2005). Method and system of integrated rate control for a traffic flow across wireline and wireless networks. US: Cisco Technology Inc. https://patents.google.com/patent/US6904286B1/en
George, T., Bidulock, B., Dantu, R., Kalla, M., Schwarzbauer, H., Sidebottom, G., Morneault, K. (2005). Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) User Peer-to-Peer Adaptation Layer (M2PA). 1-52. IETF RFC 4165 (Internet Engineering Task Force). https://www.ietf.org/rfc/rfc4165.txt
Dantu, R., Oosterwijk, H. (2005). To Patch or Not to Patch. 48-49. Health Imaging and Technology News Magazine.
Dantu, R. (2005). Top Ten Recommendations for PACS Security Implementation. 1. Health Imaging & IT Magazine. http://www.healthimaging.com/topics/managing-technology
Yang, L., Dantu, R., Anderson, T., Gopal, R. (2004). Forwarding and Control Element Separation (ForCES) Framework. RFC Editor.
Yang, L., Dantu, R., Anderson, T. (2004). Framework and Architecture for separation of IP control and data elements. 40. IETF RFC 3746 (Internet Engineering Task Force). https://tools.ietf.org/html/rfc3746
Anderson, T., Bowen, E., Dantu, R., Doria, A., Gopal, R., Salim, J., Khosravi, H., Minhazuddin, M., Wasserman, M. (2003). Requirements for Separation of IP Control and Forwarding. RFC Editor.
Anderson, T., Bowen, E., Dantu, R., Doria, A., Gopal, R., Salim, J., Khosravi, H., Wasserman, M. (2003). Requirements for separation of IP control and data elements. 18. IETF RFC 365 (Internet Engineering Task Force). https://tools.ietf.org/html/rfc3654
Morneault, K., Dantu, R., Sidebottom, G., Bidulock, B., Heitz, J. (2002). Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Adaptation Layer. https://tools.ietf.org/html/rfc3331
Morneault, K., Dantu, R., Sidebottom, G., George, T., Bidulock, B., Heitz, J. (2002). M2PA: MTP2 User Adaptation Layer. Other. 94. https://www.ietf.org/rfc/rfc4165.txt
Jamoussi, B., Andersson, L., Callon, R., Dantu, R., Wu, L., Doolan, P., Worster, T., Feldman, N., Fredette, A., Girish, M., Gray, E., Heinanen, J., Kilt, T. (2002). Constraint-Based Label Switched Path Setup using Label Distribution Protocol. 42. IETF RFC 3212 (Internet Engineering Task Force). https://tools.ietf.org/html/rfc3212
Dantu, R., O\textquoterightConnell, Pete, (2001). System and method for packet level distributed routing in fiber optic rings. Alcatel USA Sourcing LP. https://worldwide.espacenet.com/publicationDetails/biblio?FT=D\&date=20010314\&DB=\&locale=en_EP\&CC=EP\&NR=1083696A2\&KC=A2\&ND=4
Dantu, R. (1998). ATM Forum Draft on OC-48c Physical Layer Specification.
Knitl, W., Dantu, R. (1998). ATM Forum Draft on QOS in MPOA, Multiprotocol Over ATM.
Dantu, R. (1997). ATM Forum Draft on I-PNNI Requirements.
Kumar, S., Dantu, R. (1997). The Era of Full Service Network. America's Network. 10-16.
Dantu, R., Dimopolous, N. J., Patel, R. V., Al-Khalili, A. J. (1994). Parallel Algorithms for Low Level Vision on the Homogeneous Multiprocessor. 20(1), 51-60. Journal of Computer & Electrical Engineering. https://www.sciencedirect.com/science/article/pii/004579069490006X?via%3Dihub
Dantu, R., Dimopolous, N. J., Patel, R. V., Al-Khalili, A. J. (1992). Depth perception using blurring and its application in VLSI wafer probing. 5(1), 35-45. Springer-Verlag: Journal of Machine Vision and Application. https://link.springer.com/article/10.1007%2FBF01213528
Dimopolous, N. J., Li, K. F., Wong, E. C., Dantu, R., Atwood, A. J. (1989). Homogeneous multiprocessor system: a status report. Journal of Computer Systems Science, and Engineering. 4(4), 227-239.
Dantu, R. (1989). Micro-manipulator Vision for Wafer Probing. 2(3), 114 - 117. IEEE Transactions on Semiconductor Manufacturing. http://ieeexplore.ieee.org/document/29680/
Zhang, H., Dantu, R. (2010). Socioscope: Human Relationship and Behavior Analysis in Mobile Social Networks. Denton, TX, USA: University of North Texas.
Dantu, R. (2016). Method and Systems for Remote Expert Assistance(Principal Inventor). Provisional Application UNTD-0099PRO (122302.222), Application No. 62437182.
Dantu, R. (2016). Methods and Systems for Mobile CPR Assistance(Principal Inventor). Provisional 62/420,888 Patent Application UNTD-0096PRO (122302.00217), Application No. 62420,888.
Dantu, R. (2016). Methods and Systems for Mobile Monitoring and Analysis of Heart Sounds(Principal Inventor). Provisional Application UNTD-0097PRO(122302.218), Application No. 62420,912.
Dantu, R., Gupta, N., Chandrasekharan, V. (2016). 911 Services and Vital Sign Measurement Utilizing Mobile Phone Sensors and Applications(Principal Inventor). US Patent 9,485,345 granted.
Dantu, R., Gupta, N., Chandrasekharan, V. (2016). 911 Services and Vital Sign Measurement Utilizing Mobile Phone Sensors and Applications(Principal Inventor). Provisional patent for adding claims for the chest sounds for the U.S. Patent Application Serial No. 13/623,273, (Dantu_R03(b)- UNTD-0063D1 (122302.213),.
Dantu, R., Gupta, N., Dantu, V., Morgan, Z. (2014). Effective CPR Procedure with Real Time Evaluation & Feedback(Principal Inventor). UNTD-0085PRO (122302.188).
Dantu, R. (2011). System and Method for Measuring Heart Rate, Respiratory Rate, Blood Pressure and CPR (Principal Inventor). US patent.
Dantu, R. (2011). System and Method for alerts during Unsafe Driving and a Data Recorder (Black Box) for Automobiles (Principal Inventor). US patent.
Dantu, R. (2011). System and Method for Navigation and Location Finding for Blind and Visually Impaired Using Mobile Phones (Principal Inventor). US patent.
Dantu, R. (2010). Method and system for configuring wireless routers and networks, Application, Co-Inventor. US Patent 7,826,463.
Dantu, R. (2009). Method and system for providing wireless-specific services for a wireless access network, Principal Inventor. US Patent 7,639,647.
Dantu, R. (2009). Method and system for managing wireless bandwidth resources, Co-Inventor. US Patent 7,539,499.
Dantu, R. (2008). Method and system of control signaling for a wireless access network, Principal Inventor. US Patent 7,471,674.
Dantu, R. (2008). Method and system for providing supplementary services for a wireless access network, Principal Inventor. US Patent, 7,444,151.
Dantu, R. (2007). Method and system for redundancy scheme for Network Processor Systems, Co-Inventor. US Patent, 7,272,746.
Dantu, R. (2007). Method and system for providing services for wireless data calls, Principal Inventor. US Patent, 7,225,238.
Dantu, R. (2007). Method and system of control signaling for a wireless access network, Principal Inventor. US Patent 7,173,925.
Dantu, R. (2007). System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network, Principal Inventor. US Patent 7,167,443.
Dantu, R. (2007). Method and system for providing supplementary services for a wireless access network, Principal Inventor. US Patent 7,164,913.
Dantu, R. (2006). Quality indicator and method for frame selection in wireless network, Co-Inventor. US Patent, 7,079,512.
Dantu, R. (2006). Wireless router and method for processing traffic in a wireless communications network, Principal Inventor. US Patent, 7,068,624.
Dantu, R. (2006). Method and system for providing wireless-specific services for a wireless access network, Principal Inventor. US Patent, 7, 058, 033.
Dantu, R. (2006). Method and system for configuring wireless routers and networks, Co-Inventor. US Patent, 7,031,266.
Dantu, R. (2006). System and method for transporting in/ain signaling over an internet protocol (IP) network, Principal Inventor. US Patent, 7,006,433.
Dantu, R. (2005). Method and system for managing wireless bandwidth resources, Co-Inventor. US Patent, 6,957,071.
Dantu, R. (2005). Method and system of integrated rate control for a traffic flow across wireline and wireless networks, Principal Inventor. US Patent, 6,904,286.
Dantu, R. (2003). System and Method for Packet Level Distributed Routing in Fiber Optic Rings, Principal Inventor. US Patent 6,532,088.
Dantu, R. (2001). Method and Apparatus for Transport of SS7 Messages Over IP Network, Principal Inventor. European Patent, EP1089575.
Dantu, R. (2001). System and Method for Packet Level Distributed Routing in Fiber Optic Rings, Principal Inventor. European Patent, EP1083696.
Dantu, R. (2001). System and Method for Packet Level Restoration of IP Traffic Using Overhead Signaling in a Fiber Optic Ring Network, Principal Inventor. European Patent, EP1083706.
Jonnada, S., Dantu, R., Ranasinghe, I., Widick, L., Thompson, M. A., Hauge, J. A. (2020). Cyber-Human System for Remote Collaborators. (arXiv:2009.03143), 38. New York: Cornell University arXivLabs.
Zaccagni, Z., Dantu, R. (2020). A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews. 50. International Journal of Cryptographic Research.
Dantu, R., Bajwa, G., Mohammed, F. (2019). Detecting driver distraction using stimuli-response EEG analysis. Computer Report. abs/1904.09100, 40 pages. New York: Cornell University.