Skip to main content

Ram Dantu

Title: Professor

Department: Computer Science and Engineering

College: College of Engineering

Curriculum Vitae

Curriculum Vitae Link

Education

  • PhD, Concordia University, 1990
    Major: Electrical Engineering
    Specialization: Computer Engineering
  • MENG, University of Madras, India, 1978
    Major: Electrical and Electronic Engineering
    Specialization: Applied Electronics Engineering
  • BE, Madras Institute of Technology, Madras, India, 1977
    Major: Electronics Engineering
  • BS, Andhra University, India, 1974
    Major: Physics

Current Scheduled Teaching

CSCE 6585.001Advanced Topics in Network SecurityFall 2024
CSCE 6950.844Doctoral DissertationFall 2024
CSCE 6940.844Individual ResearchFall 2024
CSCE 6900.844Special ProblemsFall 2024
CSCE 6940.829Individual ResearchSummer 10W 2024

Previous Scheduled Teaching

CSCE 6940.829Individual ResearchSummer 10W 2024
CSCE 6950.944Doctoral DissertationSpring 2024
CSCE 6940.944Individual ResearchSpring 2024
CSCE 6581.001Advanced Topics in Computer NetworksFall 2023 SPOT
CSCE 6950.844Doctoral DissertationFall 2023
CSCE 6940.844Individual ResearchFall 2023
CSCE 6950.852Doctoral DissertationSummer 10W 2023
CSCE 6940.829Individual ResearchSummer 10W 2023
CSCE 6950.744Doctoral DissertationSpring 2023
CSCE 6950.944Doctoral DissertationSpring 2023
CSCE 6940.744Individual ResearchSpring 2023
CSCE 5950.844Master's ThesisSpring 2023
CSCE 6585.001Advanced Topics in Network SecurityFall 2022 SPOT
CSCE 6950.844Doctoral DissertationFall 2022
CSCE 6940.844Individual ResearchFall 2022
CSCE 5934.844Directed StudySummer 10W 2022
CSCE 6950.852Doctoral DissertationSummer 10W 2022
CSCE 6940.829Individual ResearchSummer 10W 2022
CSCE 5934.744Directed StudySpring 2022
CSCE 6950.744Doctoral DissertationSpring 2022
CSCE 6940.744Individual ResearchSpring 2022
CSCE 5585.001Advanced Network SecurityFall 2021 SPOT
CSCE 6581.001Advanced Topics in Computer NetworksFall 2021 SPOT
CSCE 4575.001Blockchain and ApplicationsFall 2021 Syllabus SPOT
CSCE 6950.744Doctoral DissertationFall 2021
CSCE 6940.744Individual ResearchFall 2021
CSCE 4999.744Senior ThesisFall 2021
CSCE 6940.744Individual ResearchSummer 10W 2021
CSCE 6950.744Doctoral DissertationSpring 2021
CSCE 6940.744Individual ResearchSpring 2021
CSCE 5585.001Advanced Network SecurityFall 2020 SPOT
CSCE 6585.001Advanced Topics in Network SecurityFall 2020 SPOT
CSCE 4575.001Blockchain and ApplicationsFall 2020 Syllabus SPOT
CSCE 6950.744Doctoral DissertationFall 2020
CSCE 6940.744Individual ResearchFall 2020
CSCE 4520.001Wireless Networks and ProtocolsFall 2020 Syllabus SPOT
CSCE 5520.001Wireless Networks and ProtocolsFall 2020 SPOT
CSCE 5934.744Directed StudySummer 10W 2020
CSCE 4890.744Directed StudySpring 2020
CSCE 5934.744Directed StudySpring 2020
CSCE 6950.744Doctoral DissertationSpring 2020
CSCE 6940.744Individual ResearchSpring 2020
CSCE 6585.001Advanced Topics in Network SecurityFall 2019 SPOT
CSCE 6950.744Doctoral DissertationFall 2019
CSCE 6940.744Individual ResearchFall 2019
CSCE 5950.744Master's ThesisFall 2019
CSCE 4520.001Wireless Networks and ProtocolsFall 2019 Syllabus SPOT
CSCE 5520.001Wireless Networks and ProtocolsFall 2019 SPOT
CSCE 6585.001Advanced Topics in Network SecuritySummer SUM 2019
CSCE 4890.744Directed StudySummer 10W 2019
CSCE 6950.744Doctoral DissertationSummer 10W 2019
CSCE 5950.744Master's ThesisSummer 10W 2019
CSCE 6950.744Doctoral DissertationSpring 2019
CSCE 6940.744Individual ResearchSpring 2019
CSCE 5950.744Master's ThesisSpring 2019
CSCE 5585.001Advanced Network SecurityFall 2018 SPOT
CSCE 6581.001Advanced Topics in Computer NetworksFall 2018 SPOT
CSCE 6950.744Doctoral DissertationFall 2018
CSCE 6940.744Individual ResearchFall 2018
CSCE 5950.744Master's ThesisFall 2018
CSCE 4999.744Senior ThesisFall 2018
CSCE 4930.001Topics in Computer Science and EngineeringFall 2018 Syllabus SPOT
CSCE 4520.001Wireless Networks and ProtocolsFall 2018 Syllabus SPOT
CSCE 5520.001Wireless Networks and ProtocolsFall 2018 SPOT
CSCE 5520.600Wireless Networks and ProtocolsFall 2018 SPOT
CSCE 6950.744Doctoral DissertationSummer 10W 2018
CSCE 5934.744Directed StudySpring 2018
CSCE 6950.744Doctoral DissertationSpring 2018
CSCE 6940.744Individual ResearchSpring 2018
CSCE 5950.744Master's ThesisSpring 2018
CSCE 4999.744Senior ThesisSpring 2018
CSCE 5934.744Directed StudyFall 2017
CSCE 6950.744Doctoral DissertationFall 2017
CSCE 6940.744Individual ResearchFall 2017
CSCE 5950.744Master's ThesisFall 2017
CSCE 5950.744Master's ThesisSummer 10W 2017
CSCE 4890.744Directed StudySpring 2017
CSCE 5934.744Directed StudySpring 2017
CSCE 6950.744Doctoral DissertationSpring 2017
CSCE 6940.744Individual ResearchSpring 2017
CSCE 5950.744Master's ThesisSpring 2017
CSCE 6581.001Advanced Topics in Computer NetworksFall 2016 SPOT
CSCE 6950.744Doctoral DissertationFall 2016
CSCE 6940.744Individual ResearchFall 2016
CSCE 5950.744Master's ThesisFall 2016
CSCE 4520.001Wireless Networks and ProtocolsFall 2016 Syllabus SPOT
CSCE 5520.001Wireless Networks and ProtocolsFall 2016 SPOT
CSCE 6950.744Doctoral DissertationSummer 10W 2016
CSCE 5934.744Directed StudySpring 2016
CSCE 6950.744Doctoral DissertationSpring 2016
CSCE 6940.744Individual ResearchSpring 2016
CSCE 5950.744Master's ThesisSpring 2016
CSCE 4950.744Special Problems in Computer Science and EngineeringSpring 2016
CSCE 6581.001Advanced Topics in Computer NetworksFall 2015 SPOT
CSCE 5934.744Directed StudyFall 2015
CSCE 6950.744Doctoral DissertationFall 2015
CSCE 6940.744Individual ResearchFall 2015
CSCE 5950.744Master's ThesisFall 2015
CSCE 5900.744Special ProblemsFall 2015
CSCE 4520.001Wireless Networks and ProtocolsFall 2015 Syllabus SPOT
CSCE 5520.001Wireless Networks and ProtocolsFall 2015 SPOT
CSCE 5934.744Directed StudySummer 10W 2015
CSCE 5934.744Directed StudySpring 2015
CSCE 6950.744Doctoral DissertationSpring 2015
CSCE 6940.744Individual ResearchSpring 2015
CSCE 5950.744Master's ThesisSpring 2015
CSCE 6581.001Advanced Topics in Computer NetworksFall 2014
CSCE 5934.744Directed StudyFall 2014
CSCE 6950.744Doctoral DissertationFall 2014
CSCE 6940.744Individual ResearchFall 2014
CSCE 5950.744Master's ThesisFall 2014
CSCE 4520.001Wireless Networks and ProtocolsFall 2014 Syllabus
CSCE 5520.001Wireless Networks and ProtocolsFall 2014
CSCE 6940.744Individual ResearchSummer 10W 2014
CSCE 5934.744Directed StudySpring 2014
CSCE 6950.744Doctoral DissertationSpring 2014
CSCE 6940.744Individual ResearchSpring 2014
CSCE 5950.744Master's ThesisSpring 2014
CSCE 5934.744Directed StudyFall 2013
CSCE 6950.744Doctoral DissertationFall 2013
CSCE 6940.744Individual ResearchFall 2013
CSCE 3530.001Introduction to Computer NetworksFall 2013 Syllabus
SLIS 6900.701Special ProblemsFall 2013
CSCE 4520.001Wireless Networks and ProtocolsFall 2013 Syllabus
CSCE 5520.001Wireless Networks and ProtocolsFall 2013
CSCE 5934.744Directed StudySummer 10W 2013
CSCE 6950.744Doctoral DissertationSummer 10W 2013
SLIS 6900.709Special ProblemsSummer 10W 2013
CSCE 6581.001Advanced Computer NetworksSpring 2013
CSCE 4890.744Directed StudySpring 2013
CSCE 5934.744Directed StudySpring 2013
CSCE 6950.744Doctoral DissertationSpring 2013
CSCE 6940.744Individual ResearchSpring 2013
CSCE 5950.744Master's ThesisSpring 2013
CSCE 5934.744Directed StudyFall 2012
CSCE 6950.744Doctoral DissertationFall 2012
CSCE 6940.744Individual ResearchFall 2012
CSCE 5950.744Master's ThesisFall 2012
CSCE 4520.001Wireless Networks and ProtocolsFall 2012 Syllabus
CSCE 5520.001Wireless Networks and ProtocolsFall 2012
CSCE 5934.744Directed StudySummer 10W 2012
CSCE 6581.001Advanced Computer NetworksSpring 2012
CSCE 5580.001Computer NetworksSpring 2012
CSCE 4890.744Directed StudySpring 2012
CSCE 5934.744Directed StudySpring 2012
CSCE 6950.744Doctoral DissertationSpring 2012
CSCE 6940.744Individual ResearchSpring 2012
CSCE 5950.744Master's ThesisSpring 2012
CSCE 5934.744Directed StudyFall 2011
CSCE 6950.744Doctoral DissertationFall 2011
CSCE 6940.744Individual ResearchFall 2011
CSCE 5950.744Master's ThesisFall 2011
CSCE 5910.744Special ProblemsFall 2011
CSCE 4520.001Wireless Networks and ProtocolsFall 2011 Syllabus
CSCE 5520.001Wireless Networks and ProtocolsFall 2011
CSCE 5934.744Directed StudySpring 2011
CSCE 6950.744Doctoral DissertationSpring 2011
CSCE 6940.744Individual ResearchSpring 2011
CSCE 5950.744Master's ThesisSpring 2011
CSCE 5934.744Directed StudyFall 2010
CSCE 6950.744Doctoral DissertationFall 2010
CSCE 6940.744Individual ResearchFall 2010
CSCE 5950.744Master's ThesisFall 2010
CSCE 4950.744Special Problems in Computer Science and EngineeringFall 2010
CSCE 4520.001Wireless Networks and ProtocolsFall 2010 Syllabus
CSCE 5520.001Wireless Networks and ProtocolsFall 2010
CSCE 4890.744Directed StudySummer 10W 2010
CSCE 5934.744Directed StudySummer 10W 2010
CSCE 6950.744Doctoral DissertationSummer 10W 2010
CSCE 6940.744Individual ResearchSummer 10W 2010
CSCE 5950.744Master's ThesisSummer 10W 2010
CSCE 6581.001Advanced Computer NetworksSpring 2010
CSCE 4890.744Directed StudySpring 2010
CSCE 5934.744Directed StudySpring 2010
CSCE 6950.744Doctoral DissertationSpring 2010
CSCE 6940.744Individual ResearchSpring 2010
CSCE 5950.744Master's ThesisSpring 2010
CSCE 5934.744Directed StudyFall 2009
CSCE 6950.744Doctoral DissertationFall 2009
CSCE 6940.744Individual ResearchFall 2009
CSCE 5950.744Master's ThesisFall 2009
CSCE 4520.001Wireless Networks and ProtocolsFall 2009
CSCE 5520.001Wireless Networks and ProtocolsFall 2009
CSCE 5934.744Directed StudySummer 10W 2009
CSCE 5950.744Master's ThesisSummer 10W 2009
CSCE 6590.001Advanced Topics in Wireless Communications and NetworksSpring 2009
CSCE 5934.744Directed StudySpring 2009
CSCE 6950.744Doctoral DissertationSpring 2009
CSCE 6940.744Individual ResearchSpring 2009
CSCE 5934.744Directed StudyFall 2008
CSCE 6950.744Doctoral DissertationFall 2008
CSCE 6940.744Individual ResearchFall 2008
CSCE 4520.001Wireless Networks and ProtocolsFall 2008
CSCE 5520.001Wireless Networks and ProtocolsFall 2008
CSCE 5934.744Directed StudySummer 10W 2008
CSCE 6940.744Individual ResearchSummer 10W 2008
CSCE 6581.001Advanced Computer NetworksSpring 2008
CSCE 5580.001Computer NetworksSpring 2008
CSCE 5934.744Directed StudySpring 2008
CSCE 6950.744Doctoral DissertationSpring 2008
CSCE 6940.744Individual ResearchSpring 2008
CSCE 5950.744Master's ThesisSpring 2008
CSCE 4950.744Special Problems in Computer Science and EngineeringSpring 2008
CSCE 5934.744Directed StudyFall 2007
CSCE 6950.744Doctoral DissertationFall 2007
CSCE 6940.744Individual ResearchFall 2007
CSCE 5950.744Master's ThesisFall 2007
CSCE 4520.001Wireless Networks and ProtocolsFall 2007
CSCE 5520.001Wireless Networks and ProtocolsFall 2007
CSCE 5934.744Directed StudySummer 10W 2007
CSCE 6950.744Doctoral DissertationSummer 10W 2007
CSCE 6940.744Individual ResearchSummer 10W 2007
CSCE 5950.744Master's ThesisSummer 10W 2007
CSCE 6590.001Advanced Topics in Wireless Communications and NetworksSpring 2007
CSCE 5580.001Computer NetworksSpring 2007
CSCE 6950.744Doctoral DissertationSpring 2007
CSCE 6940.744Individual ResearchSpring 2007
CSCE 5934.744Directed StudyFall 2006
CSCE 6950.744Doctoral DissertationFall 2006
CSCE 6940.744Individual ResearchFall 2006
CSCE 5950.744Master's ThesisFall 2006
CSCE 4520.001Wireless Networks and ProtocolsFall 2006
CSCE 5520.001Wireless Networks and ProtocolsFall 2006
CSCE 5934.744Directed StudySummer 10W 2006
CSCE 6950.744Doctoral DissertationSummer 10W 2006
CSCE 6940.744Individual ResearchSummer 10W 2006
CSCE 6590.002Advanced Topics in Wireless Communications and NetworksSpring 2006
CSCE 5580.003Computer NetworksSpring 2006
CSCE 6950.744Doctoral DissertationSpring 2006
CSCE 6940.744Individual ResearchSpring 2006
CSCE 5950.744Master's ThesisSpring 2006
CSCE 6581.001Advanced Computer NetworksFall 2005
CSCE 4890.744Directed StudyFall 2005
CSCE 5934.744Directed StudyFall 2005
CSCE 6950.744Doctoral DissertationFall 2005
CSCE 6940.744Individual ResearchFall 2005
CSCE 5950.744Master's ThesisFall 2005
CSCE 5520.001Wireless Networks and ProtocolsFall 2005
CSCI 5890.744Directed StudySummer 10W 2005
CSCI 6940.744Individual ResearchSummer 10W 2005
CSCI 5900.744Special ProblemsSummer 10W 2005
CSCI 5780.001Computer NetworksSpring 2005
CSCI 5890.744Directed StudySpring 2005
CSCI 6940.744Individual ResearchSpring 2005
CSCI 5950.744Master's ThesisSpring 2005
CSCI 5900.744Special ProblemsSpring 2005
CSCI 4330.008Topics in Computer ScienceSpring 2005
CSCI 5330.008Topics in Computer ScienceSpring 2005
CSCI 6781.001Advanced Computer NetworksFall 2004
CSCI 6940.744Individual ResearchFall 2004
CSCI 5950.744Master's ThesisFall 2004
CSCI 4330.003Topics in Computer ScienceFall 2004

Published Intellectual Contributions

    Book Chapter

  • Zhang, H., Dantu, R. (2011). Event Detection based on Call Detail Records. Behavior Computing: Modeling, Analysis, Mining and Decision. 305–316. Springer London, Proceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), June. http://dx.doi.org/10.1007/978-1-4471-2969-1_19
  • Zhang, H., Dantu, R. (2011). Smart Phone: Predicting the Next Call. Behavior Computing: Modeling, Analysis, Mining and Decision. 317-325. Springer London, Proceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), June. https://link.springer.com/chapter/10.1007/978-1-4471-2969-1_20
  • Dantu, R., Guturu, P. (2010). An Architecture for IP-based Next Generation Radio Access network. Fourth-Generation Wireless Networks: Applications and Innovations. 61-76. IGI Global Publications. https://www.igi-global.com/chapter/architecture-based-next-generation-radio/40697
  • Dantu, R., Guturu, P. (2009). An Architecture for IP-based Next Generation Radio Access network, book chapter. 16. IGI Global Publications, Fourth-Generation Wireless Networks: Applications and Innovations. https://www.igi-global.com/chapter/architecture-based-next-generation-radio/40697
  • Conference Proceeding

  • Germain, J., Dantu, R., Thompson, M. (2024). A Gamechanger for Random Number Generation.. 367-369. Baltimore, Maryland, Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy.
  • Biancardi, M., Kami Reddy, P., Morozov, K., Dantu, R. Closeness Centrality on Encrypted Graphs.
  • Qiu, C., Yadav, S., Ji, Y., Squicciarini, A., Dantu, R., Zhao, J., Xu, C. Fine-Grained Geo-Obfuscation to Protect Workers’ Location Privacy in Large-Scale Time-Sensitive Spatial Crowdsourcing. 27th International Conference on Extending Database Technology (EDBT) 2024.
  • Zaman, S., Dantu, R., Badruddoja, S., Talapuru, S., Smatresk, K. (2023). Seamless Asset Exchange in Interconnected Metaverses: Unraveling On-Chain Atomic Swap. 10 pages. Denton, Texas 76207-7102, The Fifth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, TPS’2023.
  • Dockendorf, M., Dantu, R. (2023). k-Anonymity in Federated Heterogenous Graphs and k-Core Anonymization. 10 pages. New York, The Fifth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, TPS’2023.
  • Long, J., Dantu, R., White, J. (2023). Performance Analysis of Homomorphically-Encrypted Heterogeneous Multi-layer Graph Databases. New York, IEEE.
  • Talapuru, S., Smatresk, Upadhyay, K., Badruddoja, S. (2023). The Dark Side of Metaverse: Why is it Falling Short of Expectation. New York, IEEE.
  • Dockendorf, M., Dantu, R. (2023). Privacy-Preserving Algorithms for Data Cooperatives with Directed Graphs. 876-884. New York, Springer International Conference on Security and Cryptography, SECRYPT’2023.
  • Zaccagni, Z., Dantu, R., Morozov, K. (2023). Proof of Review: Trust Me, It's Been Reviewed. 11 pages. New York, ACM. UNT Discovery Park 3940 North Elm Street (Department of Computer Science and Engineering)
  • Zaccagni, Z., Dantu, R., Morozov, K. (2023). Proof of Review: Trust Me, It's Been Reviewed. 23–34. New York NY, ACM. https://dl.acm.org/doi/10.1145/3625078.3625082
  • Dockendorf, M., Dantu, R. (2023). Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives. 192-205. Rome, Itly, International Conference on Security and Cryptography, SECRYPT’2023.
  • zaman , S., Dantu, R., Badruddoja, S., Talapuru, S., Upadhyay, K. (2023). Layerwise Interoperability in Metaverse: key to Next-Generation Electronic Commerce. 1-10. New York, IEEE.
  • Germain, J., Dantu, R. (2023). W-State as a OHE Scheme for Efficient Path Selection on Quantum Random Walks. 6 pages. NewYork, INFOCOM'23 Workshop on Quantum Computing.
  • Zaccagni, Z., Dantu, R., Morozov, K. (2023). Maintaining Review Credibility Using NLP, Reputation, and Blockchain. 58-66. IEEE. https://ieeexplore.ieee.org/document/10063712
  • Salau, A., Dantu, R., Morozov, K., Upadhyay, K., Badruddoja, S. (2023). Multi-Tier Reputation for Data Cooperatives. 253-273. Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-031-18679-0_14
  • Upadhyay, K., Dantu, R., Badruddoja, S., Salau, A. (2022). Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). 11 pages. Washington, DC, Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
  • Salau, A., Dantu, R., Upadhyay, K., Badruddoja, S. (2022). Data Cooperatives for Trusted News Sharing in Social Media. 237-244. San Antanio, Texas, 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA).
  • Salau, A., Dantu, R., Morozov, K., Badruddoja, S., Upadhayay, K. (2022). Making Blockchain Validators Honest. 267-273. San Antanio, Texas, 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA).
  • Badruddoja, S., Dantu, R., He, Y., Thompson, M., Salau, A., Upadyaya, K. (2022). Making Smart Contracts Predict and Scale. 127-134. San Antanio, Texas, 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA).
  • Badruddoja, S., Dantu, R., He, Y., Salau, A., Upadhyay , K. (2022). Scalable Smart Contracts for Linear Regression Algorithms. Denmark, Copenhagen, 2nd International Conference on Blockchain Technology and Emerging Applications (EAI BlockTEA.
  • Badruddoja, S., Dantu, R., He, Y., Thompson, M., Salau, A., Upadyaya, K. (2022). Smarter Contracts to Predict using Deep-Learning Algorithms. 280-288. San Antanio, Texas, 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA).
  • Badruddoja, S., Dantu, R., He, Y., Thompson, M., Salau, A., Upadyaya, K. (2022). Trusted AI with Blockchain to Empower Metaverse. 237-244. San Antanio, Texas, 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA).
  • Salau, A., Dantu, R., Morozov, K., Badruddoja, S., Upadhyay, K. (2022). Making Blockchain Validators Honest. IEEE. https://doi.org/10.1109/BCCA55292.2022.9921952
  • Germain, J., Dantu, R., Thompson, M. (2022). Quantum Networks: Reset-and-Reuse can be a Game-changer for Entanglement via Distillation. 855-858. Broomfield, Colorado, I 2022 IEEE International Conference on Quantum Computing and Engineering (QCE.
  • Salau, A., Dantu, R., Morozov, K. (2022). Multi-tier reputation for data cooperative. Vilamoura,, The Third International Conference on Mathematical Research for Blockchain Economy (MARBLE 2022)..
  • Salau, A., Dantu, P., Morozov, K., Upadhyay, K., Badruddoja, S. (2022). Towards a Threat Model and Security Analysis for Data Cooperatives. 707-713. SECRYPT 2022.
  • Salau, A., Dantu, R., Morozov, K., Badruddoja, S., Upadhyay, K. (2022). Towards a Threat Model and Security Analysis for Data Cooperatives. 707-713. Lisbon,, Proceedings of the 19th International Conference on Security and Cryptography,(SECRYPT)}.
  • Dockendorf, M., Dantu, R., Long, j. (2022). Graph Algorithms over Homomorphic Encryption for Data Cooperatives. 205-214. Lisbon,, Proceedings of the 19th International Conference on Security and Cryptography.
  • Ranasinghe,, I., Dantu, R., Yuan, C., Albert, M.V. (2021). A Collaborative and Adaptive Feedback System for Physical Exercises. New York, The 7th IEEE International Conference on Collaboration and Internet Computing (CIC).
  • Upadhyaya, K., Dantu, R., He, Y., Badruddoja, S., Salau, A. (2021). Can't Understand SLAs? Use the Smart Contract. New York, 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
  • Upadhyay, K., Dantu, R., He, Y., Salulu, A., Badruddoja, S. (2021). Make Consumers Happy by Defuzzifying the Service Level Agreements,. New York, 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
  • Upadhyaya, K., Dantu, R., He, Y., Badruddoja, S., Salau, A. (2021). Paradigm Shift from Paper Contracts to Smart Contracts,. New York, 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
  • Salau, A., Dantu, R., Upadyay, K. (2021). Data Cooperatives for Neighborhood Watch. New Jersy, IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
  • Dockendorf, M., Dantu, P., Morozov, K., Bhowmick, S. (2021). Investing Data with Untrusted Parties using HE. 845-853. Richardson, SECRYPT 2021.
  • Ranasinghe, I., Dantu, P., Dantu, P.V., Watts, S., Ocana, R. (2021). Cyber-Physiotherapy: Rehabilitation to Training. 1054-1057. New York, 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM),.
  • Badruddoja, S., Dantu, R., He, Y., Upadhyay, K., Thompson, M.A. (2021). Making Smart Contracts Smarter. 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
  • Shrestha, P.L., Dantu, R. (2020). On-Road Performance Evaluation of IEEE 802.11p/WAVE in BSM Signalling and Video Streaming using WSMP. 2020 Wireless Telecommunications Symposium (WTS).
  • Talkington, J., Dantu, R., Morozov, K. (2020). Detecting Devices and Protocols on VPN-Encrypted Networks. Other. 8. IEEE.
  • Dantu, R., claiborne, C., Ncube, C. (2020). Guarding Sensitive Sensor Data against Malicious Mobile Applications. Other. 1-6. Florida, IEEE.
  • Talkington, J., Morozov, K., Dantu, R. (2020). Why Protocols Fail to Transition to Mobile Domains. Other. 12. IEEE. https://ieeexplore.ieee.org/document/9042951
  • Sen, N., Dantu, R., Morozov, K. (2020). EW256357 : A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications’ Security. 291-310. Springer. https://link.springer.com/chapter/10.1007%2F978-3-030-63095-9_19
  • Ganduri, Dantu, R., Thompson, M.A., Evans, S., Widick, L. (2020). A Human-Network-Security-Interface for an Average Joe. 1-6. Virginia, 18th Annual IEEE International Conference on Intelligence and Security Informatics.
  • Vempati, J., Dantu, R., Badruddoja, S., Thompson, M.A. (2020). Adaptive and Predictive SDN Control During DDoS Attacks. 1-6. Arlington, Virgina, 18th Annual IEEE International Conference on Intelligence and Security Informatics.
  • Sen, N., Dantu, R., Thompson, R.A. (2020). Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves. 1-7. Arlington, Virginia,
  • Badruddoja, S., Dantu, R., Widick, L., Zaccagni, Z., Upadhyay, K. (2020). Integrating DOTS With Blockchain Can Secure Massive IoT Sensors. 937-946. New Orleans, LA, IEEE IPDPS.
  • Upadhyaya, K., Dantu, R., Zaccagni, Z., Dantu, R. Is Your Legal Contract Ambiguous? Convert to a Smart Legal Contract. 273-280. New York, IEEE.
  • Sen, N., Dantu, R., Thompson, M.A. (2020). Performance Analysis of Elliptic Curves for VoIP Audio Encryption using a Softphone. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST). 335 503-508. Springer.
  • Ranasinghe, I., Jayaraman, A., Xiao, T., Dantu, R., Thompson, M.A., Albert, M. (2020). Home Care Robotic Assistant Prototype for Remote Human Supervision: Development and Pilot Analysis of Exercise Repetition Counting over Multiple Viewing Angles. 1. ARCM: Archives of Physical Medicine and Rehabilitation.
  • Claiborne, C., Dantu, R., Ncube, K. (2020). Guarding Sensitive Sensor Data against Malicious Mobile Applications. 1-6. Florida, 2020 Sixth International Conference on Mobile And Secure Services (MobiSecServ),.
  • Bucuti, T.H., Dantu, R., Morozov, K. (2019). CMCAP: Ephemeral Sandboxes for Adaptive Access Control. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19. ACM Press. http://dx.doi.org/10.1145/3322431.3325414
  • Dantu, R., Zaccagni, Z., Paul, A. (2019). Micro-Accreditation for Matching Employer E-Hire Needs. 347-352. Atlanta, GA, IEEE.
  • Dantu, R. (2019). Blockchain Based Authentication and Authorization Framework for Remote Collaboration Systems. 3 Biotech. 1-7. Washington DC, IEEE.
  • Muttavarapu, A.S., Dantu, R., Thompson, M.A. (2019). A Distributed Ledger for Spammers' Resume. Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS).
  • Talkington, J., Dantu, R., Morozov, K. (2019). Verifying OAuth Implementations Through Encrypted Network Analysis. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19. ACM Press. http://dx.doi.org/10.1145/3322431.3326449
  • Ranganthan, V.P., Dantu, R., Paul, A., Mears, P., Morozov, K. (2018). A Decentralized Marketplace Application on the Ethereum Blockchain. 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). IEEE. http://dx.doi.org/10.1109/cic.2018.00023
  • Vempati, J.A., Dantu, R. (2018). Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an Attack. 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). 80-89. Philadelphia, PA,
  • Jonnada, S., Dantu, R., Ranasinghe, I. (2018). Cyber Handyman and Nursing for Humanitarian Services and Disaster Relief. 2018 IEEE International Symposium on Technologies for Homeland Security (HST). 1-6. Woburn, MA,
  • Vempati, J.A., Dantu, R., Thompson, M.A. (2018). Uninterrupted Video Surveillance in the Face of an Attack. 843-848. New York, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
  • Sen, N., Dantu, R., Vempati, J.A., Thompson, M.A. (2018). Performance Analysis of Elliptic Curves for Real-Time Video Encryption. 2018 National Cyber Summit (NCS). 64-71.
  • Jonnada, S., Dantu, R., Shrestha, P.L., Ranasinghe, I., Widick, L. (2018). An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems. 38-44. IEEE National Cybersecurity Summit.
  • Dantu, R., Y, H., H, T. (2018). Prediction of Human Error Using Eye Movements Patterns for Unintentional Insider Threat Detection. 6 pages. IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), 2018.
  • Vempati, J., Thompson, M.A., Dantu, R. (2017). Feedback control for resiliency in face of an attack. Proceedings of the 12th Annual Conference on Cyber and Information Security Research. 17.
  • Hashem, Y., Takabi, H., Dantu, R. (2017). Insider Threat Detection Based on Users' Mouse Movements and Keystrokes Behavior. Secure Knowledge Management Conference 2017 (SKM 2017).
  • Thiyagaraja, S., Dantu, R., Shrestha, P.L., Thompson, M.A., Smith, C. (2017). Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices. Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017 IEEE/ACM International Conference on. 25--30.
  • Hashem, Y., Takabi, H., Dantu, R., Nielsen, R.D. (2017). A multi-modal neuro-physiological study of malicious insider threats. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS) International Workshop on Managing Insider Security Threats. 33--44. New York, New York, Association for Computing Machinery (ACM). http://doi.acm.org/10.1145/3139923.3139930
  • Dantu, R., Jonnada , S. (2017). Cyber Handyman: Bridging the gap between rural and urban communities. Charlottesville, Virginia, National Workshop on Developing the Research Agenda for Connected Rural Communities (CRC17).
  • Dantu, R., Talkington, J. (2017). Realizing Optimal Chest Compression Fraction During Cardiopulmonary Resuscitation. 347-349. Washington,DC, 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE). http://ieeexplore.ieee.org/document/7545860/
  • Vempati, J., Dantu, R., Thompson, M. (2017). Feedback control for resiliency in face of an attack. 7. Oak Ridge, Tennessee, The 12th Annual Cyber and Information Security Research (CISR) Conference, Oak Ridge National Laboratory, Oak Ridge, Tennessee. https://dl.acm.org/citation.cfm?id=3064815
  • Dantu, R., Jaynes, M. (2017). Automating ECU Identification for Vehicle Security. 632-635. Anaheim, CA, IEEE Workshop on Machine Learning in Security of Cyber-Physical Systems, as part of the 2016 IEEE International Conference on Machine Learning Applications. http://ieeexplore.ieee.org/document/7838215/
  • Mayo, Q.R., Bryce, R.C., Dantu, R. (2015). PhD Forum: A System Identification Approach to Monitoring Network Traffic Security. Cyber Security and Cloud Computing (CSCloud), 2015 IEEE 2nd International Conference on. 509--511.
  • Dantu, R., Quentin, M., Bryce, R. (2015). A System Identification Approach to Monitoring Network Traffic Security. 509 - 511. New York, NY, The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York. http://ieeexplore.ieee.org/document/7371530/
  • Dantu, R., Gupta, N., Dantu, S., Nana, A. (2015). Fitts Law Extensions for Multiple Joint Movements. 96 (10) e61. Dallas, Texas, American Congress on Rehabilitation Medicine. http://www.archives-pmr.org/article/S0003-9993(15)00860-6/abstract
  • Dantu, R., Bajwa, G., Nana, A. (2015). Quantifying Dynamic Cerebral Autoregulation using Electroencephalograms. 96 (10) e69. Dallas, Texas, American Congress on Rehabilitation Medicine. http://www.archives-pmr.org/article/S0003-9993(15)00886-2/abstract
  • Dantu, R., Widick, L., Talkington, J., Bajwa, G. (2015). A Framework for Secured Collaboration in mHealth. 364 - 369. Atlanta, GA, Fifth International Symposium on Security in Collaboration Technologies and Systems (SECOTS). http://ieeexplore.ieee.org/document/7210450/
  • Dantu, R., Bucuti, T. (2015). An opportunistic encryption extension for the DNS protocol. 194 - 194. Baltimore, MD, IEEE International Conference on Intelligent Security Informatics. http://ieeexplore.ieee.org/document/7165976/
  • Dantu, R., Bajwa, G., Aldridge, R. (2015). Pass-Pic: A Mobile User Authentication. 195 - 195. Baltimore, MD, International Conference on Intelligent Security Informatics. http://ieeexplore.ieee.org/document/7165977/
  • Dantu, R., Claiborne, C., Ncube, C. (2015). Random Anonymization of Mobile Sensor Data -Modified Android Framework. 182 - 184. Baltimore, MD, IEEE International Conference on Intelligent Security Informatics. http://ieeexplore.ieee.org/document/7165968/
  • Dantu, R., Bajwa, G., Fazeen, M., Issadeen, M., Tanpure, S. (2015). Unintentional Bugs to Vulnerability Mapping in Android Applications. 176 - 178. Baltimore, MD, IEEE International Conference on Intelligent Security Informatics. http://ieeexplore.ieee.org/document/7165966/
  • Jaynes, M., Dantu, R. (2014). Tire-road friction estimation utilizing smartphones. Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on.
  • Dantu, R., M, F. (2014). Another free app: Does it have the right intentions?. 282-289. Toronto, ON, Twelfth Annual International Conference on Privacy, Security and Trust (PST). http://ieeexplore.ieee.org/document/6890950/
  • Dantu, R., Thiagraj, S., Vempati, J., Dantu, T., , S.D. (2014). Smart phone monitoring of second heart sound split. 2181-2184. Chicago, IL, Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology (EMBC). http://ieeexplore.ieee.org/document/6944050/
  • Dantu, R., Fazeen, M., Bajwa, G. (2014). Context-aware multimedia encryption in mobile platforms. 53-56. New York, NY, In Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14), Robert K. Abercrombie and J. Todd McDonald (Eds.), ACM. https://dl.acm.org/citation.cfm?doid=2602087.2602115
  • Dantu, R., Bajwa, G. (2013). Cerebral autoregulation assessment using electroencephalograms. 327-330. Boston, Massachusetts, BodyNets’13, Proceedings of the 8th International Conference on Body Area Networks. https://dl.acm.org/citation.cfm?id=2555319.2555393
  • Gupta, N., Dantu, R. (2013). Evaluation of Respiration Quality Using Smart Phone. Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments. New York, NY, USA, ACM. http://doi.acm.org/10.1145/2504335.2504364
  • Dantu, R., Thiagaraja, S. (2013). Finger blood flow monitoring using smart phones. 237-239. Boston, Massachusetts, Proceedings of the 8th International Conference on Body Area Networks. http://dx.doi.org/10.4108/icst.bodynets.2013.253704
  • Dantu, R., Bajwa, G., Fazeen, M., Joseph, R. (2013). Self-Tracking via Brain-Mobile-Cloud Interface. AAAI Spring Symposium: Data Driven Wellness.
  • Dantu, R., Claiborne, C., Fazeen, M. (2013). Android Sensor Data Anonymization. Rodney Bay, St. Lucia, 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013.
  • Dantu, R., Vempati, J., Bajwa, G. (2013). NFC Based Two-Pass Mobile Authentication. 467-468. Rodney Bay, St. Lucia, 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013. http://www.springer.com/us/book/9783642412837
  • Dantu, R., Bajwa, G. (2013). Cryptographic Key Generation using Electroencephalograms. Arlington, Virginia, USA, Learning From Authoritative Experimental Results, LASER’2013. http://2013.laser-workshop.org/program/wip
  • Dantu, R., Gupta, N. (2013). Quantifying cognitive impairment due to physical or mental stress. 6. Rhodes, Greece, PETRA. https://dl.acm.org/citation.cfm?id=2504335.2504384
  • Barthold, C., Subbu, K., Dantu, R. (2011). Evaluation of gyroscope-embedded mobile phones. Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on. Anchorage, AK,
  • Dantu, R., Subbu, P., , G.B. (2011). Indoor localization through dynamic time warping. 1639-1644. Anchorage, AK, IEEE International Conference on Systems, Man, and Cybernetics, (SMC) 2011. http://ieeexplore.ieee.org/document/6083906/
  • Dantu, R., , E.B. (2011). Current and Future Trends in Social Media. Boston, Massachusetts, The Third IEEE International Conference on Social Computing - International Workshop on Modeling Social Media: User Interface Modeling in Social Media (MSM11), MIT campus in Cambridge, MA. http://ieeexplore.ieee.org/document/6113312/
  • Dantu, R., C, B., K, P. (2011). Evaluation of gyroscope-embedded mobile phones. 1632-1638. Anchorage, AK, IEEE International Conference on Systems, Man, and Cybernetics, (SMC) 2011. http://ieeexplore.ieee.org/abstract/document/6083905/
  • Dantu, R., Baatarjav, E. (2011). Unveiling Hidden Patterns to Find Social Relevance. 242 - 249. Boston, MA, The Third IEEE International Conference on Social Computing, MIT campus in Cambridge, MA. http://ieeexplore.ieee.org/document/6113121/
  • Dantu, R., Baatarjav, E. (2011). Social Relevance. MIT campus in Cambridge, MA, Interdisciplinary Workshop on Information and Decision in Social Networks (WIDS 2010) Organized by Laboratory for Information and Decision Systems.
  • Chandrasekaran, V., Dantu, R., Gupta, N., Yang, X., Wijesekera, D. (2010). Efficiency of Social Connection-based Routing in P2P VoIP Networks. Proceedings of the 2Nd International Conference on COMmunication Systems and NETworks. Piscataway, NJ, USA, IEEE Press. http://dl.acm.org/citation.cfm?id=1831443.1831488
  • Sroufe, P., Phithakkitnukoon , S., Dantu, R., Cangussu, J. (2010). Email Shape Analysis. Lecture Notes in Computer Science book series (LNCS, volume 5935). 18-29. Springer, Berlin, Heidelberg, International Conference Distributed Computing and Networking (ICDCN'2010). https://link.springer.com/chapter/10.1007/978-3-642-11322-2_7
  • Phithakkitnukoon, S., Dantu, R. (2010). Mobile Social Closeness and Communication Patterns. Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference. Piscataway, NJ, USA, IEEE Press. http://dl.acm.org/citation.cfm?id=1834217.1834285
  • Zhang, H., Dantu, R. (2010). Smart Phone: Predicting the Next Call. 317-325. Springer, London, Proceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), June. https://link.springer.com/chapter/10.1007/978-1-4471-2969-1_20
  • Zhang, H., Dantu, R. (2010). Event Detection based on Call Detail Records. 305-316. Springer, London, Proceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), JuneProceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), Hyderabad, India. https://link.springer.com/chapter/10.1007/978-1-4471-2969-1_19
  • Zhang, H., Dantu, R. (2010). Predicting Social Ties in Mobile Phone Networks. 25 - 30. Vancouver, BC, Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2010),May. http://ieeexplore.ieee.org/document/5484780/
  • Chandrasekaran, V., Dantu, R., Gupta, N.K., Yang, X., Wijesekera, D. (2010). Efficiency of Social Connection-based Routing in P2P VoIP Networks. 1-6. Bangalore, Fourth Workshop on Intelligent Networks: Adaptation, Communication & Reconfiguration (part of COMSNETS'2010). http://ieeexplore.ieee.org/document/5431975/
  • Ram Dantu, Siva Dantu, and Priyanka Kadiyala. (2010). Social Aspects of Video Phones. 1-7. Bangalore, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010). http://ieeexplore.ieee.org/abstract/document/5431971/
  • Baatarjav, E., Amin, A., Dantu, R., Gupta, N.K. (2010). Are you My friend?. 1-5. Las Vegas, NV, Seventh IEEE Conference on Consumer Communications & Networking Conference (CCNC 2010), Special Session on Social Networking (SocNets). http://ieeexplore.ieee.org/abstract/document/5421732/
  • Phithakkitnukoon, S., Dantu, R. (2010). Mobile Social Closeness and Similarity in Calling Patterns. 1-5. Las Vegas, NV, Seventh IEEE Conference on Consumer Communications & Networking Conference (CCNC 2010), Special Session on Social Networking (SocNets). http://ieeexplore.ieee.org/document/5421787/
  • Yang, X., Stavrou, A., Dantu, R., Wijesekera, D. (2010). Small World VoIP. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 76). 137-155. Springer, Berlin, Heidelberg, International Conference on Mobile Computing, Applications, and Services. https://link.springer.com/chapter/10.1007/978-3-642-29336-8_8
  • Chandrasekaran, V., Dantu, S., Kadiyala, P., Dantu, R., Phithakkitnukoon, S. (2010). Socio-Technical Aspects of Video Phones. 1-7. Bangalore, Fourth Workshop on Intelligent Networks: Adaptation, Communication & Reconfiguration (part of COMSNETS'2010). http://ieeexplore.ieee.org/document/5431971/
  • Baatarjav, E., Dantu, R., Tang, Y., Cangussu, Jo\~ao. (2009). BBN-based Privacy Management System for Facebook. Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics. Piscataway, NJ, USA, IEEE Press. http://dl.acm.org/citation.cfm?id=1706428.1706467
  • Zhang, H., Dantu, R., Cangussu, Jo\~ao. (2009). Change Point Detection Based on Call Detail Records. Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics. Piscataway, NJ, USA, IEEE Press. http://dl.acm.org/citation.cfm?id=1706428.1706438
  • Phithakkitnukoon, S., Dantu, R. (2009). Defense Against SPIT Using Community Signals. Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics. Piscataway, NJ, USA, IEEE Press. http://dl.acm.org/citation.cfm?id=1706428.1706481
  • Zhang, H., Dantu, R. (2009). Opt-in Detection based on Call Detail Records. 607-608. Proceedings of the 6th Annual IEEE Consumer Communications & Networking Conference (CCNC 2009).
  • Madhavan, Y., Cangussu, Jo\~ao, Dantu, R. (2009). Penetration Testing for Spam Filters. Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02. Seattle, WA, IEEE Computer Society. http://dx.doi.org/10.1109/COMPSAC.2009.168
  • Zhang, H., Dantu, R., Cangussu, J. (2009). Quantifying reciprocity in Social Networks. 4 1031-1035. IEEE InternationalWorkshop on Social Mobile Web (SMW09), in conjunction with SocialCom-09.
  • Madhavan, Y., Cangussu , J., Dantu, R. (2009). Spam Penetration Testing. 6. 1st IEEE International Workshop on Computer Forensics in Software Engineering (CFSE'2009), in conjunction with COMPSAC 2009, Seattle, Washington.
  • Langle, L., Dantu, R. (2009). Are you A Safe Driver. 502-507. Vancouver, BC, IEEE International Conference on Embedded and Pervasive Systems, EAP-09. http://ieeexplore.ieee.org/document/5284183/
  • Subbu,, K., Xu, N., Dantu, R. (2009). iKnow Where You Are. 469-474. Vancouver, BC, In Proceedings of the IEEE International Symposium on Social Intelligence and Networking (SIN09), in conjunction with SocialCom. http://ieeexplore.ieee.org/document/5284201/
  • Baatarjav, E., Dantu, R., Tang, Y., Cangussu, J. (2009). BBN-based Privacy Management System for Facebook. 194 - 196. Dallas, TX, Proc. of IEEE Inter. Conf. on Intelligence and Security Informatics, Dallas, TX. http://ieeexplore.ieee.org/abstract/document/5137300/
  • Zhang, H., Dantu, R., Cangussu, J. (2009). Change Point Detection based on Call Detail Records. 55 - 60. Dallas, Texas, Proc. of IEEE Inter. Conf. on Intelligence and Security Informatics, Dallas, TX. http://ieeexplore.ieee.org/document/5137271/
  • Baatarjav, E., Phithakkitnukoon , S., Dantu, R. (2009). Defense Against SPIT Using Community Signals. 232 - 232. Dallas, TX, Proc. of IEEE Inter. Conf. on Intelligence and Security Informatics, Dallas, TX. http://ieeexplore.ieee.org/abstract/document/5137314/
  • Yang, X., Dantu, R., Wijesekera, D. (2009). A society-integrated testbed architecture for peer-to-peer telecommunications. Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009. TridentCom 2009. 5th International Conference on.
  • Alazzawe, A., Alazzawe, A., Wijesekera, D., Dantu, R. (2009). A testbed for mobile social computing. Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009. TridentCom 2009. 5th International Conference on.
  • Yang, X., Dantu, R., Wijesekera, D. (2009). Achieving Peer-to-Peer Telecommunication Services through Social Hashing. 1-2. Las Vegas, NV, The 6th Annual IEEE Conference on Consumer Communications & Networking Conference (CCNC 2009). http://ieeexplore.ieee.org/document/4784812/
  • Sroufe, P., Phithakkitnukoon, S., Dantu, R. (2009). Email Shape Analysis for Spam Botnet Detection. 1-2. Las Vegas, NV, The 6th Annual IEEE Conference on Consumer Communications & Networking Conference (CCNC 2009). http://ieeexplore.ieee.org/abstract/document/4784781/
  • Baatarjav, E., Dantu, R., Phithakkitnukoon, S. (2008). Privacy Management for Facebook. 273 - 286. Springer-Verlag Berlin, Heidelberg, The International Conference on Information Systems Security (ICISS 2008), Hyderabad, India. https://dl.acm.org/citation.cfm?id=1496288
  • Phithakkitnukoon , S., Dantu, R. (2008). Adequacy of Data for Characterizing Caller Behavior. 9. Las Vegas, NV, The 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - The 2nd Workshop on Social Network Mining and Analysis (SNA-KDD 2008). https://pdfs.semanticscholar.org/dd5c/e102bbbd565c17fa5bcaf62e183d23b23f60.pdf?_ga=2.246883718.382614901.1517971822-1402626469.1517971822
  • Husna, H., Phithakkitnukoon, S., Palla, S., Dantu, R. (2008). Behavior Analysis of Spam Botnets. 246-253. Bangalore, The 3rd Annual IEEE International Conference on Communication System Software and Middleware (COMSWARE 2008), Bangalore, India. http://ieeexplore.ieee.org/abstract/document/4554418/
  • Phithakkitnukoon, S., Husna, H., Dantu, R. (2008). Behavioral Entropy of a Cellular Phone User. 160-167. Springer, Boston, MA, The 1st International Workshop on Social Computing, Behavioral Modeling, and Prediction (SBP 2008), Springer Lecture Notes in Computer Science (LNCS). https://link.springer.com/chapter/10.1007/978-0-387-77672-9_18#citeas
  • Phithakkitnukoon , S., Dantu, R. (2008). CPL: Enhancing Mobile Phone Functionality by Call Predicted List. 571-581. Springer, Berlin, Heidelberg, OnTheMove Federated Conference (OTM 2008) - The 3rd International Workshop on MObile and NEtworking Technologies for social applications (MONET'08), LNCS 5333, Monterrey, Mexico. https://link.springer.com/chapter/10.1007/978-3-540-88875-8_80
  • Phithakkitnukoon, S., Dantu, R. (2008). CPL: Enhancing Mobile Phone Functionality by Call Predicted List. Proceedings of the OTM Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: 2008 Workshops: ADI, AWeSoMe, COMBEK, EI2N, IWSSA, MONET, OnToContent + QSI, ORM, PerSys, RDDS, SEMELS, and SWWS. Berlin, Heidelberg, Springer-Verlag. http://dx.doi.org/10.1007/978-3-540-88875-8_80
  • Zhang, H., Dantu, R. (2008). Discovery of Social groups using Call Detail Records. 489-498. Springer, Berlin, Heidelberg, OnTheMove Federated Conference (OTM 2008) - The 3rd International Workshop on MObile and NEtworking Technologies for social applications (MONET'08), LNCS 5333, Monterrey, Mexico, November. https://link.springer.com/chapter/10.1007/978-3-540-88875-8_72
  • Baatarjav, E., Phithakkitnukoon, S., Dantu, R. (2008). Group Recommendation System for Facebook. 211-219. Springer, Berlin, Heidelberg, On The Move Federated Conference (OTM 2008) - The First International Workshop on Community-Based Evolution of Knowledge-Intensive Systems (COMBEK'08), LNCS 5333, Monterrey, Mexico. https://link.springer.com/chapter/10.1007/978-3-540-88875-8_41
  • Phithakkitnukoon, S., Dantu, R. (2008). Inferring Social Groups using Call Logs. 200-210. Springer, Berlin, Heidelberg, OnTheMove Federated Conference (OTM 2008) - The International Workshop on Community-Based Evolution of Knowledge-Intensive Systems (COMBEK'08), LNCS 5333, Monterrey, Mexico. https://link.springer.com/chapter/10.1007/978-3-540-88875-8_40
  • Sroufe, P., Dantu, R. (2008). Experiences in Building a Multi-University Testbed for Research in Multimedia Communications. 1-5. Miami, FL, ACM International Parallel & Distributed Processing Symposium, Miami, FL. http://ieeexplore.ieee.org/document/4536392/
  • Kolan, P., Dantu, R. (2008). Call Algebra. 2008 5th IEEE Consumer Communications and Networking Conference.
  • Phithakkitnukoon, S., Husna, H., Baatarjav, E., Dantu, R. (2008). Quantifying Presence using Calling Patterns. 184 - 187. Bangalore, The 3rd Annual IEEE International Conference on Communication System Software and Middleware (COMSWARE 2008), Bangalore, India. http://ieeexplore.ieee.org/document/4554403/
  • Zhang, H., Dantu, R. (2008). Quantifying the presence of Phone users. 883-887. Las Vegas, NV, The 5th Annual IEEE Conference on Consumer Communications and Networking Conference (CCNC 2008), Las Vegas, NV. http://ieeexplore.ieee.org/document/4446504/
  • Husna, H., Phithakkitnukoon, S., Dantu, R. (2008). Traffic Shaping of Spam Botnets. 786-787. Las Vegas, NV, The 5th Annual IEEE Conference on Consumer Communications and Networking Conference (CCNC 2008), Las Vegas, NV. http://ieeexplore.ieee.org/document/4446479/
  • Phithakkitnukoon, S., Dantu, R. (2007). Predicting Calls: New Service for an Intelligent Phone. 4787 27-36. Springer, Berlin, Heidelberg, IFIP/IEEE International Conference on Multimedia, and Mobile Networks (MMNC). https://link.springer.com/chapter/10.1007/978-3-540-75869-3_3
  • Dantu, R., Kolan, P., Akl, R. (2007). Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. 71-74. New Brunswick, NJ, IEEE International Conference on Security Informatics (ISI), New Jersey. http://ieeexplore.ieee.org/document/4258676/
  • Fagen, W., Canussu, J., Dantu, R. (2007). Goliath: A Configurable Approach for Network Testing. 1-9. Lake Buena Vista, FL, 2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities. http://ieeexplore.ieee.org/document/4444667/
  • Kolan, P., Vaithialingam, R., Dantu, R. (2007). Automatic Calibration Using Receiver Operating Characteristics Curves. 1-8. Bangalore, IEEE First Workshop on Information Assurance Middleware for COMmunications (IAMCOM). http://ieeexplore.ieee.org/abstract/document/4268127/
  • Palla, S., Dantu, R. (2007). Unwanted SMTP Paths and Relays. Bangalore, IEEE 2nd International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007). http://ieeexplore.ieee.org/document/4268083/
  • Palla, S., Dantu, R. (2006). Detecting phishing in emails. Proceedings of MIT Spam Conference.
  • Sengar, H., Dantu, R., Wijesekera, D. (2006). Securing VoIP and PSTN from Integrated Signaling Network Vulnerabilities. 1-7. Vancouver, BC, 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE). http://ieeexplore.ieee.org/document/1638116/
  • Palla, P., Dantu, R. (2006). Detecting Phishing in E-mails. 6. Boston, Massachusetts, MIT Spam Conference.
  • Dantu, R., Cangussu, Jo\~ao. (2005). An Architecture for Network Security Using Feedback Control. Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics. Atlanta, GA, Springer-Verlag. http://dx.doi.org/10.1007/11427995_84
  • Dantu, R., Kolan, P. (2005). Risk Management Using Behavior Based Bayesian Networks. Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics. Atlanta, GA, Springer-Verlag. http://dx.doi.org/10.1007/11427995_10
  • Dantu, R., Cangussu, Jo\~ao, Turi, J. (2005). Sensitivity Analysis of an Attack Containment Model. Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics. Atlanta, GA, Springer-Verlag. http://dx.doi.org/10.1007/11427995_11
  • Dantu, R., Kolan, P. (2005). Detecting Spam in VoIP Networks. 31-38. Berkeley, CA, Proceedings of USENIX, SRUTI'05. https://dl.acm.org/citation.cfm?id=1251287
  • Dantu, R., Cangussu, J. (2005). An architecture for Network Security Using Feedback Control. 636-637. Springer, Berlin, Heidelberg, IEEE International Conference on Intelligence and Security Informatics, ISI 2005,Lecture Notes in Computer Science , Springer Verlag. https://link.springer.com/chapter/10.1007/11427995_84
  • Dantu, R., Kolan, P. (2005). Risk Management using Behavior based Bayesian Networks. 115-126. Springer, Berlin, Heidelberg, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Lecture Notes in Computer Science. https://link.springer.com/chapter/10.1007/11427995_10
  • Dantu, R., Cangussu, J., Turi, J. (2005). Sensitivity Analysis of an Attack Containment Model. 127-138. Springer, Berlin, Heidelberg, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Lecture Notes in Computer Science. https://link.springer.com/chapter/10.1007/11427995_11
  • Dantu, R., Abbas, K., O'Neill, M., Mikler, A. (2004). Data centric modeling of environmental sensor networks. 447-452. Dallas, TX, IEEE GLOBECOM Workshop on Adaptive Wireless Networks, IEEE GLOBECOM 2004, Dallas, USA. http://ieeexplore.ieee.org/abstract/document/1417621/
  • Dantu, R., Abbas, K., O'Neill II, M., Mikler, A.R. (2004). Data Modeling of Environmental Sensor Networks. EEE GLOBECOM Workshop on Adaptive Wireless Networks.
  • Dantu, R., Abbas, K., O’Neill, M., Mikler, A.R., others. (2004). Data centric modeling of environmental sensor networks. Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004. IEEE. 447–452.
  • Dantu, R., Kolan, P. (2004). Detecting Spam in VoIP Networks. 5-5. Berkeley, CA, IEEE GLOBECOM workshop on VoIP Security, GLOBECOM 2004, Dallas, USA. https://dl.acm.org/citation.cfm?id=1251287
  • Dantu, R., Joglekar, S. (2004). Collaborative Vision using Networked Sensors. 305-399. Las Vegas, NV, IEEE International Conference on Information Technology, special track on sensor networks, ITCC 2004. http://ieeexplore.ieee.org/abstract/document/1286673/
  • Dantu, R., Cangussu, J., Yelimeli, A. (2004). Dynamic Control of Worm Propagation. 419-423. Las Vegas, NV, IEEE International Conference on Information Technology, ITCC 2004, special track on information assurance and security. http://ieeexplore.ieee.org/document/1286491/
  • Dantu, R., Loper, K., Kolan, P. (2004). Risk Management using Behavior based Attack Graphs. 445-449. Las Vegas, NV, IEEE International Conference on Information Technology, special track on information assurance and security, ITCC 2004. http://ieeexplore.ieee.org/abstract/document/1286496/
  • Dantu, R. (2002). An Architecture of Security Engineering. Boston, Massachusetts, ACSA Workshop on Application of Engineering Principals for Security System Design.
  • Dantu, R. (2001). IP in Radio Access Networks. Dallas, Texas, 19th IEEE Annual CVT Symposium.
  • Khasnabish, B., Dantu, R. (1996). Traffic Management in an Enterprise Networking Switch, Few Case Studies. 1-10. Dallas, Texas, First International Workshop on Enterprise Networking (part of ICC '96).
  • Dantu, R., Dimopolous, N.J., Patel, R.V., Al-Khalili, A.J. (1990). Micro-manipulators for Wafer Probing. 711-722. Proceedings of SPIE Conference on Application of Artificial Intelligence. http://dx.doi.org/10.1117/12.21121
  • Dantu, R., Patel, R.V., Dimopolous, N.J., Al-Khalili, A.J. (1989). Vision Algorithms for VLSI Wafer Probing. 54-65. Philadelphia, PA, Proc. SPIE 1197, Automated Inspection and High-Speed Vision Architectures III. http://dx.doi.org/10.1117/12.969934
  • Dantu, R., Dimopolous, N.J., Patel, R.V., Al-Khalili, A.J. (1988). A micro-manipulator vision in IC manufacturing. 1455-1460. Philadelphia, PA, Proceedings of the 1988 IEEE International Conference on Robotics and Automation, USA. http://ieeexplore.ieee.org/document/12271/
  • Dimopolous, N.J., Li, K.F., Wang, E.C., Dantu, R. (1987). The Homogeneous Multiprocessor System – An Overview. 592-599. Raleigh, NC, Proceedings of the 1987 IEEE International Conference on Parallel Processing.
  • Dantu, R., Dimopolous, N.J., Li, K.F., Patel, R.V., Al-Khalili, A.J. (1986). Parallel Algorithms for Low-level Vision on the Homogeneous Multiprocessor. 421-423. Proceedings of IEEE International Conference on Computer Vision (CVPR'86), Miami. https://www.sciencedirect.com/science/article/pii/004579069490006X
  • Dantu, R., Dimopolous, N.J., Patel, R.V., Al-Khalili, A.J. (1986). An Integrated Micro-manipulator System for Integrated Circuit Manufacturing. Montreal, Proceedings of the 1986 Canadian Conference on Industrial Computer Systems.
  • Dantu, R., Rao, N.V. (1982). Teaching Aids for Microprocessor Interfacing Devices. International Conference on Teaching Aids in Physics Education (TAPE), National University of Singapore.
  • Journal Article

  • Thiyagaraja, S., Dantu, R., Shrestha, P.L., Chitnis, A., Thompson, M.A., Anumandla, P., Sarma, T., Dantu, S. (2018). A novel heart-mobile interface for detection and classification of heart sounds. Other. 45 313 - 324. Elsavier. https://www.sciencedirect.com/science/article/pii/S1746809418301101
  • Sarma, S., Bucuti, H., Chitnis, A., Klacman, A., Dantu, R. (2017). Real-Time Mobile Device-Assisted Chest Compression During Cardiopulmonary Resuscitation. American Journal of Cardiology. 120 196 - 200. http://dx.doi.org/10.1016/j.amjcard.2017.04.007
  • Dantu, R., Sarma, T., Chitnis, A., Bucuti, T., Klacman, A. (2017). Real Time Mobile Device Assisted Cardiopulmonary Resuscitation. 120 (2) 196-200. American Journal of Cardiology. https://www.ncbi.nlm.nih.gov/pubmed/28550930
  • Dantu, R., Chandrasekaran, V., Gupta, N. (2016). 911 services and vital sign measurement utilizing mobile phone sensors and applications. US, University of North Texas. https://patents.google.com/patent/US9485345/en
  • Hashem, Y., Takabi, H., GhasemiGol, M., Dantu, R. (2016). Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals. Other. 6 (1) 20--36.
  • Dantu, R., , G.B. (2016). Neurokey: Towards a New Paradigm of Cancelable Biometrics based Key Generation using Electroencephalograms. 62 93-115. Computer & Security, Elsevier Publications. https://www.sciencedirect.com/science/article/pii/S0167404816300669
  • Dantu, R., Gupta, N., Dantu, V., Morgan, Z. (2015). Effective CPR Procedure With Real-Time Evaluation and Feedback Using Smartphones. (US20150351647A1)
  • Dantu, R., Takabi, H., Hashem, Y. (2015). Towards Insider Threat Detection Using Psychophysiological Signals. 71-74. New York, NY, Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, Boulder, Colarado. https://dl.acm.org/citation.cfm?id=2808792
  • Dantu, R., , G.B. (2015). Detecting on-road driver distraction events using a single channel dry sensor EEG. Other.
  • Dantu, R., Gupta, N. (2014). Effective CPR Procedure with Real Time Evaluation and Feedback Using Smartphone. 2 2800111. IEEE Journal on Journal of Translational Engineering in Health and Medicine. http://ieeexplore.ieee.org/document/6823662/
  • Dantu, R., Chandrasekaran, V., Subbu, K., Jonnada, S., Thiyagaraja, S. (2013). Cuffless Differential Blood Pressure Estimation Using Smart Phones. 60 (4) 1080-1089. IEEE Trans. Biomed. Engineering. http://ieeexplore.ieee.org/abstract/document/6256704/
  • Dantu, R., Chandrasekaran, V., Subbu, K. (2013). Socio-technical aspects of remote media control for a NG9-1-1 system. Multimedia Tools and Applications. 62 (3) 733-759. Hingham, MA, https://dl.acm.org/citation.cfm?id=2440692
  • Dantu, R., Gozick, B., Subbu, K. (2013). LocateMe: Magnetic-fields-based indoor localization using smartphones. 4 73. New York, NY, ACM Transactions on Intelligent System Technology. https://dl.acm.org/citation.cfm?id=2508054
  • Dantu, R., M, F., Bhukhiya, M., B, G. (2013). Safe Driving Using Mobile Phones. 13 (2) 1462-1468. IEEE Transactions on Intelligent Transportation Systems.
  • Phithakkitnukoon, S., Dantu, R., Claxton, R., Eagle, N. (2012). Behavior Based Call predictor for a Smart Phone. 180-185. Springer, Berlin, Heidelberg, ACM Transactions on Autonomous and Adaptive Systems. https://link.springer.com/chapter/10.1007/978-3-642-32692-9_24
  • Dantu, R., Yang, X., Wijasekara, D., Kant, K., Zhang (Eds.), N., Das, S. (2012). Security Issues in VoIP Telecommunication Networks. 2 763–789. Wyman Street, Waltham, MA 02451, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges.
  • Subbu, K.P., Dantu, R., Gozick, B., Maeshiro, T. (2011). Magnetic Maps for Indoor Navigation. 60 (12) 3883 - 3891. IEEE Transactions on Instrumentation and Measurement. http://ieeexplore.ieee.org/document/5773083/
  • Phithakkitnukoon, S., Dantu, R., Claxton, R., Eagle, N. (2011). Behavior-based Adaptive Call Predictor. Other. 6 21:1\textendash21:28. http://doi.acm.org/10.1145/2019583.2019588
  • Phithakkitnukoon, S., Dantu, R. (2011). Mobile Social Group Sizes and Scaling Ratio. Other. 26 71\textendash85. http://dx.doi.org/10.1007/s00146-009-0230-5
  • Phithakkitnukoon, S., Dantu, R. (2011). Towards Ubiquitous Computing with Call Prediction. Other. 15 52\textendash64. http://doi.acm.org/10.1145/1978622.1978628
  • Dantu, R., Subbu, K., Chandrasekaran, V. (2011). Socio-technical Aspects of Remote Media Control for a NG9-1-1 System. 62 (3) 733–759. Hingham, MA, Multimedia Tools and Applications. https://dl.acm.org/citation.cfm?id=2440692
  • Zhang, H., Dantu, R., W. Cangussu, J. (2011). Socioscope: Human Relationship and Behavior Analysis in Social Networks. 41 (6) 1122-1143. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans. http://ieeexplore.ieee.org/document/5732708/
  • Ram Dantu, Mohamed Fazeen. (2011). Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. 1 (3) 241–254. Social Network Analysis and Mining. https://link.springer.com/article/10.1007/s13278-011-0017-9
  • Alazzawe, A., Alazzawe, A., Wijesekera, D., Dantu, R. (2010). A Testbed for Large Mobile Social Computing Experiments. 8 (2) 89–97. International Journal of Sensor Networks. http://www.inderscience.com/offer.php?id=34618
  • Palla, S., Dantu, R., Cangussu, Jo\~ao. (2010). Spam Classification Based on E-Mail Path Analysis. Other. 332.
  • Phithakkitnukoon, S., Dantu, R. (2010). ContextAlert: Context-aware alert mode for a mobile phone. International Journal of Pervasive Computing and Communications. 6 1\textendash23.
  • Phithakkitnukoon, S., Dantu, R. (2010). ContextAlert: Context-Aware Alert Mode Control for a Mobile Phone. 6 (3) 25. International Journal of Pervasive Computing and Communications, Emerald Publishers. http://www.emeraldinsight.com/doi/abs/10.1108/17427371011084266?journalCode=ijpcc
  • Sroufe, P., Tate, S., Dantu, R., Celikel, E. (2010). Experiences During a Collegiate Cyber Defense Competition. 5 (3) 382–396. Journal of Applied Security Research, Taylor & Francis Publications. https://libres.uncg.edu/ir/uncg/f/S_Tate_Experiences_2010.pdf
  • Fazen, M., Bhukari, M., Dantu, R. (2010). Safe Driving Using Mobile Phones. 13 (2) 1462 - 1468. IEEE Transactions on Vehicular Technology. http://ieeexplore.ieee.org/document/6171850/
  • Gupta, N., Dantu, R., Schulzrinne, H., Magnussen, W. (2010). Next Generation 9-1-1: Architecture and challenges in realizing an IP-multimedia-based emergency service. 7 (1) 12. Journal of Homeland Security and Emergency Management. https://www.degruyter.com/view/j/jhsem.2010.7.1/jhsem.2010.7.1.1657/jhsem.2010.7.1.1657.xml
  • Fagen, W., Cangussu, J., Dantu, R. (2009). A Virtual Environment for Network Testing. Journal of Networking and Computer Applications (JNCA). 32 (1) 184-214. Elsevier.
  • Dantu, R., Schulzrinne, H., Fahmy, S., Cangussu, J. (2009). Issues and Challenges in Securing VoIP. Journal of Computers and Security. 743-753. Elsevier.
  • Holur, B., Dantu, R., Derrick, C. (2009). Method and system for managing wireless bandwidth resources. US, Cisco Technology Inc. https://patents.google.com/patent/US7539499B2/en
  • Dantu, R., Chiang, S., Yin, H., Kachhla, R. (2009). Method and system for providing wireless-specific services for a wireless access network. US, Cisco Technology Inc. https://patents.google.com/patent/US7639647/en
  • Phithakkitnukoon , S., Dantu, R. (2009). Mobile Social Group Sizes and Scaling Ratio. Journal of AI and Society. 15. Springer Verlag.
  • Dantu, R., Kolan, P., Cangussu, J. (2009). Network Risk Management using Attacker Profiling. Journal of Security and Communication Networks. 83-96. John Wiley and Sons.
  • Phithakkitnukoon, S., Dantu, R. (2009). Towards Ubiquitous Computing with Call Prediction. ACM SIGMOBILE Mobile Computing and Communications Review. 12.
  • Kolan, P., Dantu, R., Cangussu, J. (2009). Nuisance Level of a Voice Call. 5 (1) 30. New York, NY, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM). https://dl.acm.org/citation.cfm?id=1404886
  • Ram Dantu, Prakash Kolan, and Joao Cangussu. (2009). Network Risk Management using Attacker Profiling. 2 (1) 83–96. Security and Communication Networks.
  • Dantu, R., Chiang, S., Yin, H., Kachhla, R. (2008). Method and system for providing supplementary services for a wireless access network. US, Cisco Technology Inc. https://patents.google.com/patent/US7444151/en
  • Dantu, R., Chiang, S., Yin, H., Kachhla, R. (2008). Method and system of control signaling for a wireless access network. US, Cisco Technology Inc. https://patents.google.com/patent/US7471674/en
  • Phithakkitnukoon, S., Dantu, R., Baatarjav, E. (2008). VoIP Security - Attacks and Solutions. 17 (3) 114-123. The Information Security Journal: A Global Perspective. http://www.tandfonline.com/doi/abs/10.1080/19393550802308618
  • Guturu, P., Dantu, R. (2008). An Impatient Evolutionary Algorithm with Probabilistic Tabu Search for Unified Solution of Some NP Hard Problems in Graph and Set Theory via Clique Finding. 38 (3) 645 - 666. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics). http://ieeexplore.ieee.org/document/4459184/
  • Palla, S., Dantu, R. (2008). Classification of Phishers. 5 (1) 1-10. Journal of Homeland Security and Emergency Management. https://www.degruyter.com/view/j/jhsem.2008.5.1/jhsem.2008.5.1.1393/jhsem.2008.5.1.1393.xml
  • Palla, S., Dantu, R., Cangussu, Jo\~ao. (2008). Spam Classification Based on E-Mail Path Analysis. Other. 2 46-69. https://ideas.repec.org/a/igg/jisp00/v2y2008i2p46-69.html
  • Palla, S., Dantu, R., Cangussu, J. (2008). Spam Classification Based on Email Path Analysis. 2 (2) 46-69. New York, International Journal of Information Security and Privacy, IGN Publishing. https://www.igi-global.com/article/spam-classification-based-mail-path/2481
  • Haider, S.W., Cangussu, J., Cooper, K., Dantu, R. (2008). Estimation of Defects based on Defect Decay Model: ED3M. 34 (3) 336 - 356. IEEE Transactions on Software Engineering. http://ieeexplore.ieee.org/document/4492790/
  • Dantu, R., Oosterwijk, H., Kolan, P., Husna, H. (2007). HIPAA: Securing Medical Networks. Network Security. 2007 13\textendash16. http://dx.doi.org/10.1016/S1353-4858(07)70055-7
  • Dantu, R., Patel, P., Patel, P., Garbuz, A., Miernik, J., Patel, A., Holur, B. (2007). Method and system for providing services for wireless data calls. US, Cisco Technology Inc. https://patents.google.com/patent/US7225238/en
  • Dantu, R., Ester, G., O\textquoterightConnell, Pete. (2007). System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network. US, Alcatel SA. https://patents.google.com/patent/US7167443/en
  • Dantu, R., Cangussu, J. (2007). An Architecture for Automatic and Adaptive Defense. 3 (2) 37-55. Georgia, USA, Journal of Information Security and Privacy, Ivy League Publishing. http://www.tandfonline.com/doi/abs/10.1080/15536548.2007.10855815
  • Ram Dantu, Herman Oosterwijk, Prakash Kolan, and Husain Hasna. (2007). Securing Medical Networks. (11) 13-16. Network Security. https://www.sciencedirect.com/science/article/pii/S1353485807700557
  • Ram Dantu, Joao W. Cangussu, and Sudeep Patwardhan. (2007). Fast Worm Containment using Feedback Control. 4 (2) 119-136. IEEE Transactions on Dependability and Secure Computing, Vol.5, No.2, pp. 119-136, April-June 2007; You do not have access to modify this field.IEEE Transactions on Dependability and Secure Computing. http://ieeexplore.ieee.org/document/4198177/
  • Dantu, R., Clothier, G., Atri, A. (2007). EAP Methods for Wireless Networks. 29 (3) 289-301. International Journal of Computer Standards and Interfaces, Elsevier. https://www.sciencedirect.com/science/article/pii/S092054890600050X
  • Prakash Kolan, and Ram Dantu. (2007). Socio-Technical Defense Against Voice Spamming. New York, NY, ACM Transactions on Autonomous and Adaptive Systems (TAAS). https://dl.acm.org/citation.cfm?id=1216897
  • Dantu, R. (2006). A Testbed for Research and Development For Securing Multimedia Communication Services. Snowbird, Utah, NSF Workshop on Computing Research Infrastructure.
  • Dantu, R. (2006). CISE and Global Implications. Snowbird, Utah, NSF Workshop on Computing Research Infrastructure.
  • Prasanna, V.I., Mikler, A.R., Dantu, R., Abbas, K. (2006). Dynamic resource management in QoS controlled networks. Telecommunications Systems. 32 (1) 11–30. Springer Netherlands.
  • Patel, P., Choksi, O., Davidson, K., Dantu, R. (2006). Method and system for configuring wireless routers and networks. US, Cisco Technology Inc. https://patents.google.com/patent/US7031266/en
  • Alam, M., Dantu, R., Holur, B., Eyceoz, T. (2006). Quality indicator and method for frame selection in wireless network. US, Cisco Technology Inc. https://patents.google.com/patent/US7079512/en
  • Dantu, R., Davis, R., George, T. (2006). System and method for transporting in/ain signaling over an internet protocol (IP) network. US, Alcatel USA Sourcing LP. https://patents.google.com/patent/US7006433B1/en?oq=US7006433
  • Dantu, R. (2006). Top 3 challenges in VoIP Security and Management. Vancouver, BC, Canada, 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE).
  • Dantu, R., Patel, P., Choksi, O., Patel, A., Ali, M., Miernik, J., Holur, B. (2006). Wireless router and method for processing traffic in a wireless communications network. US, Cisco Technology Inc. https://patents.google.com/patent/US7068624B1/en
  • Sengar, H., Dantu, R., Wijesekera, D., Jajodia, S. (2006). SS7 Over IP: Signaling Interworking Vulnerabilities. 20 (6) 32-41. IEEE Network. http://ieeexplore.ieee.org/document/4050028/
  • Dantu, R., Ghosal, D., Schulzrinne, H. (2006). Securing Voice over IP. 20 (5) 4-5. IEEE Network. http://ieeexplore.ieee.org/document/1705876/
  • Dantu, R. (2005). Method and system of integrated rate control for a traffic flow across wireline and wireless networks. US, Cisco Technology Inc. https://patents.google.com/patent/US6904286B1/en
  • George, T., Bidulock, B., Dantu, R., Kalla, M., Schwarzbauer, H., Sidebottom, G., Morneault, K. (2005). Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) User Peer-to-Peer Adaptation Layer (M2PA). 1-52. IETF RFC 4165 (Internet Engineering Task Force). https://www.ietf.org/rfc/rfc4165.txt
  • Dantu, R., Oosterwijk, H. (2005). To Patch or Not to Patch. 48-49. Health Imaging and Technology News Magazine.
  • Herman Oosterwijk and Ram Dantu. (2005). Top Ten Recommendations for PACS Security Implementation. 1. Health Imaging & IT Magazine. http://www.healthimaging.com/topics/managing-technology
  • Yang, L., Dantu, R., Anderson, T., Gopal, R. (2004). Forwarding and Control Element Separation (ForCES) Framework. RFC Editor.
  • Yang, L., Dantu, R., Anderson, T. (2004). Framework and Architecture for separation of IP control and data elements. 40. IETF RFC 3746 (Internet Engineering Task Force). https://tools.ietf.org/html/rfc3746
  • Anderson, T., Bowen, E., Dantu, R., Doria, A., Gopal, R., Salim, J., Khosravi, H., Minhazuddin, M., Wasserman, M. (2003). Requirements for Separation of IP Control and Forwarding. RFC Editor.
  • Anderson, T., Bowen, E., Dantu, R., Doria, A., Gopal, R., Salim, J., Khosravi, H., Wasserman, M. (2003). Requirements for separation of IP control and data elements. 18. IETF RFC 365 (Internet Engineering Task Force). https://tools.ietf.org/html/rfc3654
  • Morneault, K., Dantu, R., Sidebottom, G., Bidulock, B., Heitz, J. (2002). Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Adaptation Layer. https://tools.ietf.org/html/rfc3331
  • Morneault, K., Dantu, R., Sidebottom, G., George, T., Bidulock, B., Heitz, J. (2002). M2PA: MTP2 User Adaptation Layer. Other. 94. https://www.ietf.org/rfc/rfc4165.txt
  • Jamoussi, B., Andersson, L., Callon, R., Dantu, R., Wu, L., Doolan, P., Worster, T., Feldman, N., Fredette, A., Girish, M., Gray, E., Heinanen, J., Kilt, T. (2002). Constraint-Based Label Switched Path Setup using Label Distribution Protocol. 42. IETF RFC 3212 (Internet Engineering Task Force). https://tools.ietf.org/html/rfc3212
  • Dantu, R., O\textquoterightConnell, Pete. (2001). System and method for packet level distributed routing in fiber optic rings. Alcatel USA Sourcing LP. https://worldwide.espacenet.com/publicationDetails/biblio?FT=D\&date=20010314\&DB=\&locale=en_EP\&CC=EP\&NR=1083696A2\&KC=A2\&ND=4
  • Dantu, R. (1998). ATM Forum Draft on OC-48c Physical Layer Specification.
  • Knitl, W., Dantu, R. (1998). ATM Forum Draft on QOS in MPOA, Multiprotocol Over ATM.
  • Dantu, R. (1997). ATM Forum Draft on I-PNNI Requirements.
  • Kumar, S., Dantu, R. (1997). The Era of Full Service Network. America's Network. 10-16.
  • Dantu, R., Dimopolous, N.J., Patel, R.V., Al-Khalili, A.J. (1994). Parallel Algorithms for Low Level Vision on the Homogeneous Multiprocessor. 20 (1) 51-60. Journal of Computer & Electrical Engineering. https://www.sciencedirect.com/science/article/pii/004579069490006X?via%3Dihub
  • Dantu, R., Dimopolous, N.J., Patel, R.V., Al-Khalili, A.J. (1992). Depth perception using blurring and its application in VLSI wafer probing. 5 (1) 35-45. Springer-Verlag, Journal of Machine Vision and Application. https://link.springer.com/article/10.1007%2FBF01213528
  • Dimopolous, N.J., Li, K.F., Wong, E.C., Dantu, R., Atwood, A.J. (1989). Homogeneous multiprocessor system: a status report. Journal of Computer Systems Science, and Engineering. 4 (4) 227-239.
  • R. V. Dantu, N. J. Dimopolous, R. V. Patel, and A. J. Al-Khalili. (1989). Micro-manipulator Vision for Wafer Probing. 2 (3) 114 - 117. IEEE Transactions on Semiconductor Manufacturing. http://ieeexplore.ieee.org/document/29680/
  • Master's Thesis

  • Zhang, H., Dantu, R. (2010). Socioscope: Human Relationship and Behavior Analysis in Mobile Social Networks. Denton, TX, USA, University of North Texas.
  • Patents

  • Dantu, R. (2016). Method and Systems for Remote Expert Assistance(Principal Inventor). Provisional Application UNTD-0099PRO (122302.222), Application No. 62437182.
  • Dantu, R. (2016). Methods and Systems for Mobile CPR Assistance(Principal Inventor). Provisional 62/420,888 Patent Application UNTD-0096PRO (122302.00217), Application No. 62420,888.
  • Dantu, R. (2016). Methods and Systems for Mobile Monitoring and Analysis of Heart Sounds(Principal Inventor). Provisional Application UNTD-0097PRO(122302.218), Application No. 62420,912.
  • Dantu, R., Gupta , N., Chandrasekharan, V. (2016). 911 Services and Vital Sign Measurement Utilizing Mobile Phone Sensors and Applications(Principal Inventor). US Patent 9,485,345 granted.
  • Dantu, R., Gupta , N., Chandrasekharan, V. (2016). 911 Services and Vital Sign Measurement Utilizing Mobile Phone Sensors and Applications(Principal Inventor). Provisional patent for adding claims for the chest sounds for the U.S. Patent Application Serial No. 13/623,273, (Dantu_R03(b)- UNTD-0063D1 (122302.213),.
  • Dantu, R., Gupta , N., Dantu, V., Morgan, Z. (2014). Effective CPR Procedure with Real Time Evaluation & Feedback(Principal Inventor). UNTD-0085PRO (122302.188).
  • Dantu, R. (2011). System and Method for Measuring Heart Rate, Respiratory Rate, Blood Pressure and CPR (Principal Inventor). US patent.
  • Dantu, R. (2011). System and Method for alerts during Unsafe Driving and a Data Recorder (Black Box) for Automobiles (Principal Inventor). US patent.
  • Dantu, R. (2011). System and Method for Navigation and Location Finding for Blind and Visually Impaired Using Mobile Phones (Principal Inventor). US patent.
  • Dantu, R. (2010). Method and system for configuring wireless routers and networks, Application, Co-Inventor. US Patent 7,826,463.
  • Dantu, R. (2009). Method and system for providing wireless-specific services for a wireless access network, Principal Inventor. US Patent 7,639,647.
  • Dantu, R. (2009). Method and system for managing wireless bandwidth resources, Co-Inventor. US Patent 7,539,499.
  • Dantu, R. (2008). Method and system of control signaling for a wireless access network, Principal Inventor. US Patent 7,471,674.
  • Dantu, R. (2008). Method and system for providing supplementary services for a wireless access network, Principal Inventor. US Patent, 7,444,151.
  • Dantu, R. (2007). Method and system for redundancy scheme for Network Processor Systems, Co-Inventor. US Patent, 7,272,746.
  • Dantu, R. (2007). Method and system for providing services for wireless data calls, Principal Inventor. US Patent, 7,225,238.
  • Dantu, R. (2007). Method and system of control signaling for a wireless access network, Principal Inventor. US Patent 7,173,925.
  • Dantu, R. (2007). System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network, Principal Inventor. US Patent 7,167,443.
  • Dantu, R. (2007). Method and system for providing supplementary services for a wireless access network, Principal Inventor. US Patent 7,164,913.
  • Dantu, R. (2006). Quality indicator and method for frame selection in wireless network, Co-Inventor. US Patent, 7,079,512.
  • Dantu, R. (2006). Wireless router and method for processing traffic in a wireless communications network, Principal Inventor. US Patent, 7,068,624.
  • Dantu, R. (2006). Method and system for providing wireless-specific services for a wireless access network, Principal Inventor. US Patent, 7, 058, 033.
  • Dantu, R. (2006). Method and system for configuring wireless routers and networks, Co-Inventor. US Patent, 7,031,266.
  • Dantu, R. (2006). System and method for transporting in/ain signaling over an internet protocol (IP) network, Principal Inventor. US Patent, 7,006,433.
  • Dantu, R. (2005). Method and system for managing wireless bandwidth resources, Co-Inventor. US Patent, 6,957,071.
  • Dantu, R. (2005). Method and system of integrated rate control for a traffic flow across wireline and wireless networks, Principal Inventor. US Patent, 6,904,286.
  • Dantu, R. (2003). System and Method for Packet Level Distributed Routing in Fiber Optic Rings, Principal Inventor. US Patent 6,532,088.
  • Dantu, R. (2001). Method and Apparatus for Transport of SS7 Messages Over IP Network, Principal Inventor. European Patent, EP1089575.
  • Dantu, R. (2001). System and Method for Packet Level Distributed Routing in Fiber Optic Rings, Principal Inventor. European Patent, EP1083696.
  • Dantu, R. (2001). System and Method for Packet Level Restoration of IP Traffic Using Overhead Signaling in a Fiber Optic Ring Network, Principal Inventor. European Patent, EP1083706.
  • Poster

  • Dantu, R., Smatresk, S. (2023). Making Smart Contracts Predict and Scale. Maryland, NSA Hot Topics in Science of Security.
  • Technical Report

  • Jonnada, S., Dantu, R., Ranasinghe, I., Widick, L., Thompson, M.A., Hauge, J.A. (2020). Cyber-Human System for Remote Collaborators. (arXiv:2009.03143) 38. New York, Cornell University arXivLabs.
  • Zaccagni, Z., Dantu, R. (2020). A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews. 50. International Journal of Cryptographic Research.
  • Dantu, R., Bajwa, G., Mohammed, F. (2019). Detecting driver distraction using stimuli-response EEG analysis. Computer Report. abs/1904.09100 40 pages. New York, Cornell University.

Contracts, Grants and Sponsored Research

    Contract

  • Dantu, R. (Principal), Thompson, M.A. (Co-Principal), "2020 Center of Academic Excellence in Cybersecurity Program: Flowthrough Grant from National Security Agency/Fordham University for Enhancing Diversity in Cybersecurity Education," sponsored by National Security Agency (NSA), Federal, Funded. (2020 - 2022).
  • Dantu, R. (Principal), Thompson, M.A. (Co-Principal), ": 2020 Center for Academic Excellence in Cybersecurity Program: Flowthrough Grant from National Security Agency/Fordham for Mentoring PhD Students and Professors of Practice," sponsored by National Security Agency (NSA), Federal, Funded. (2020 - 2020).
  • Grant - Research

  • Dantu, R., "Research and Development of a Platform for the Cybersecurity Career Preparation," sponsored by National Security Agency Flow through Grant, Federal, $751111 Funded. (2022 - 2025).
  • Dantu, R. (Principal), Morozov, K. (Co-Principal), Dantu, S. (Co-Principal), "PrivacyPreserving Analytics on a Data Cooperative for Comprehensive Threat Prevention," sponsored by National Security Agency, Federal, $750000 Funded. (2021 - 2024).
  • Dantu, R. (Principal), Morozov, K., Bhowmick, S. (Co-Principal), "Locating Super-Spreaders Through Partnership of Anonymization and Encryption," sponsored by NSA, Federal, $299944 Funded. (2020 - 2023).
  • Dantu, R. (Principal), ": 2020 Center for Academic Excellence in Cybersecurity Program: Flowthrough Grant from National Security Agency/Fordham for Mentoring PhD Students and Professors of Practice," sponsored by National Security Agency (NSA), Federal, $235558 Funded. (2020 - 2023).
  • Dantu, R., "2020 Department of Defense Cyber Scholarship Grant: Development of Competency Tools for Work-Skill-Readiness in Cybersecurity," sponsored by National Security Agency (NSA), Federal, $200000 Funded. (2020 - 2022).
  • Dantu, P., "The Cybersecurity Talent Pipeline Program," sponsored by State Farm Inc, University of North Texas, $6500 Funded. (2021 - 2022).
  • Dantu, P., "Inspiring and Preparing Texas for Cybersecurity Workforce," sponsored by State Farm Inc, University of North Texas, $5000 Funded. (2020 - 2021).
  • Dantu, R. (Principal), "NSF: CNS: Transformative Emergency Dispatch Protocols for a Sixty Second Response," sponsored by NSF Research Grant (PI: Ram Dantu), Federal, $250002 Funded. (2016 - 2018).
  • Tam, N.D. (Co-Principal), Dantu, R. (Principal), "MRI: CloudCar: Development of a Diverse Distributed Instrument for Vehicles in the Cloud," sponsored by NSF, Federal, $500000 Funded. (2012 - 2018).
  • Dantu, R. (Principal), "SFS-NEW: Advancing Learning and Leadership Through an Integrated Multidisciplinary Doctoral Program in Information Assurance," sponsored by NSF Research Grant (PI: Ram Dantu, Co-PIs: Suliman Hawamdeh and Dan Kim), Federal, $1200070 Funded. (2012 - 2018).
  • Dantu, P. (Principal), Thompson, M. (Co-Principal), "Multifaceted Outreach Program for Students Teachers, and Professionals," sponsored by State Farm Inc, Other, $25000 Funded. (2017 - 2018).
  • Dantu, R. (Principal), "EAGER: Mobile Solutions for Multifold Increase of Survival Rates Through High Quality Chest Compressions," sponsored by NSF Research Grant, Federal, $140845 Funded. (2015 - 2017).
  • Dantu, R. (Principal), "CloudCar: Development of a Diverse Distributed Instrument for Vehicles in the Cloud," sponsored by NSF Research Grant (PI: Ram Dantu, Co-PIs: Sanjay Sarma of MIT and David Tam of UNT), Federal, $500000 Funded. (2012 - 2017).
  • Thompson, M.A., Dantu, R., "SFS-NEW: Advancing Learning and Leadership Through an Integrated Multidisciplinary Doctoral Program in Information Assurance," sponsored by NSF, Federal, $16000 Funded. (2016 - 2017).
  • Dantu, R. (Principal), "Hot Topics in Network Security," sponsored by Industry Gift for Research, International, $3000 Funded. ( - 2015).
  • Guturu, P. (Co-Principal), Dantu, R. (Principal), Kavi, K.M. (Co-Principal), "Collaborative Research: CRI: IAD: A Testbed for Research and Development of Next Generation 9-1-1 Services," sponsored by NSF, Federal, $385000 Funded. (2008 - 2014).
  • Guturu, P. (Co-Principal), Dantu, R. (Principal), Kavi, K.M. (Co-Principal), "MRI: Development of a Flexible Instrument and Tools for Experimental Research in Next-Generation 9-1-1 Services," sponsored by NSF, Federal, $400000 Funded. (2008 - 2013).
  • Dantu, R. (Principal), "I-Corps: Mobile Life Guard," sponsored by NSF Research Grant (PI: Ram Dantu, sole PI), Federal, $50000 Funded. (2011 - 2012).
  • Dantu, R. (Principal), "RET: Development of Next Generation 9-1-1 Services," sponsored by NSF Research Grant, International, $24000 Funded. (2010 - 2012).
  • Dantu, R. (Principal), "NSF: CNS: A Testbed for Research and Development of Next Generation 9-1-1 Services (Collaborative research with Columbia University and Texas A & M)," sponsored by NSF Research Grant (PI: Ram Dantu, Co-PIs: Henning Schulzrinne, Walt Magnussen, Ana Goulart, and Guy Almes, Parthasarathy Guturu, and Krishna Kavi), State, $1342000 Funded. (2008 - 2012).
  • Dantu, R. (Principal), "NSF: CNS: MRI: Development of a Flexible Instrument and Tools for Experimental Research in Next-Generation 9-1-1 Services (PI: Ram Dantu, Co-PIs: Parthasarthy Guturu and Krishna Kavi)," sponsored by NSF Research Grant, State, $500000 Funded. (2008 - 2011).
  • Dantu, R. (Principal), "Collaborative Research: CRI: A Testbed for Research and Development of Secure IP Multimedia Communication Services (collaborative proposal with Columbia University, Purdue University, and University of California at Davis)," sponsored by NSF Research Grant, State, $600000 Funded. (2006 - 2010).
  • Dantu, R. (Principal), "CT-ER: Collaborative Research: Detecting Spam in IP Multimedia Communication Services (in collaboration with Columbia University)," sponsored by NSF Research Grant, State, $253516 Funded. (2006 - 2009).
  • Dantu, R. (Principal), "MRI: Development of a Flexible Platform for Experimental Research in Secure IP Multimedia Communication Services," sponsored by NSF Research Grant, State, $300000 Funded. (2006 - 2009).
  • Dantu, R. (Principal), "SGER: Preventing Voice Spamming," sponsored by Cyber Trust: NSF Research Grant, State, $60150 Funded. (2005 - 2006).
  • Dantu, R. (Principal), "Building Network Security through Feedback Control," sponsored by Faculty Research Grant, State, $5000 Funded. (2005 - 2005).
  • Dantu, R. (Other), "Detecting Phishing in E-mails," sponsored by Faculty Research Grant, State, $5000 Funded. (2005 - 2005).
  • Dantu, R. (Principal), "Gift for research in VoIP Security," sponsored by Industry Research Grant: Lucent, TekVizion, Nexttone Communication, Juniper Networks, Kayote Networks, VoIP Shield, BearingPoint, and Qovia Solutions Group, Other, $18000 Funded. (2005 - 2005).
  • Dantu, R. (Principal), "Attack Containment using Feedback Control," sponsored by Faculty Research Grant (for new faculty), State, $5000 Funded. (2004 - 2004).
  • Dantu, R. (Other), "Dynamic Control of Worm Propagation," sponsored by Faculty Research Grant (for new faculty), State, $2000 Funded. (2004 - 2004).
  • Dantu, R. (Other), "Hospital Network Security," sponsored by Industry Research Grant, OTech Inc., Other, $10000 Funded. (2004 - 2004).
  • Dantu, R. (Principal), "Building Network Security through Feedback Control," sponsored by Faculty Research Grant (for new faculty), State, $5000 Funded. (2003 - 2003).
  • Dantu, R. (Principal), "Collaborative Image Composition in Environmental Engineering," sponsored by Faculty Research Grant (for new faculty), State, $2500 Funded. (2003 - 2003).
  • Morozov, K. (Co-Principal), Dantu, R. (Principal), Bhowmick, S. (Co-Principal), "2021 NCAE-C-002- University of North Texas," sponsored by National Security Agency, FED, Funded. (2021 - 2024).
  • Bhowmick, S. (Co-Principal), Dantu, R. (Principal), Morozov, K., "Locating Super-Spreaders Through Partnership of Anonymization and Encryption," sponsored by NSA, Federal, Funded. (2020 - 2022).
  • Morozov, K. (Co-Principal), Dantu, R. (Principal), Bhowmick, S. (Co-Principal), "2020 University of North Texas NCAE- C Research Grant," sponsored by National Security Agency, FED, Funded. (2020 - 2022).
  • Dantu, R., Thompson, M.A. (Co-Principal), "2020 Department of Defense Cyber Scholarship Grant: Development of Competency Tools for Work-Skill-Readiness in Cybersecurity," sponsored by National Security Agency (NSA), Federal, Funded. (2020 - 2021).
  • Thompson, M.A. (Co-Principal), Dantu, R. (Principal), "2020 University of North Texas DoD CySP Grant," sponsored by National Security Agency, FED, Funded. (2020 - 2021).
  • Dantu, R. (Principal), "EAGER: Transformative Emergency Dispatch Protocols for a Sixty Second Response," sponsored by National Science Foundation, FED, Funded. (2016 - 2020).
  • Tam, N.D. (Co-Principal), Dantu, R. (Principal), "MRI: CloudCar: Development of a Diverse Distributed Instrument for Vehicles in the Cloud," sponsored by National Science Foundation, FED, Funded. (2012 - 2018).
  • Dantu, R. (Principal), "EAGER: Mobile Solutions for Multifold Increase of Survival Rates Through High Quality Chest Compressions," sponsored by National Science Foundation, FED, Funded. (2015 - 2018).
  • Guturu, P. (Co-Principal), Dantu, R. (Principal), Kavi, K.M. (Co-Principal), "Collaborative Research: CRI: IAD: A Testbed for Research and Development of Next Generation 9-1-1 Services," sponsored by NSF, Federal, Funded. (2008 - 2014).
  • Guturu, P. (Co-Principal), Dantu, R. (Principal), Kavi, K.M. (Co-Principal), "MRI: Development of a Flexible Instrument and Tools for Experimental Research in Next-Generation 9-1-1 Services," sponsored by NSF, Federal, Funded. (2008 - 2013).
  • Grant - Teaching

  • Dantu, R. (Principal), "2020 Center of Academic Excellence in Cybersecurity Program: Flowthrough Grant from National Security Agency/Fordham University for Enhancing Diversity in Cybersecurity Education," sponsored by National Security Agency (NSA), Federal, $221387 Funded. (2020 - 2023).
  • Dantu, R., "Soft Skill and Career Readiness for Students," sponsored by State Farm Insurance Company, National, $16000 Funded. (2019 - 2020).
  • Dantu, R. (Co-Principal), Do, H. (Co-Principal), Keathly, D.M. (Co-Principal), Sweany, P.H. (Co-Principal), Thompson, M.A. (Co-Principal), "Multifaceted Outreach Program for Students, Teachers, and Professionals," sponsored by StateFarm, University of North Texas, $24000 Funded. (2017 - 2018).
  • Dantu, R. (Principal), "Collaborative Project: A Regional Partnership to Build and Strengthen IA in North Texas," sponsored by NSF Educational Grant, State, $247183 Funded. (2006 - 2008).
  • Dantu, R. (Co-Principal), "Kits for DSP Lab (TMS 3200-6411hardware + software)," sponsored by TI DSP University Program. Equipment Donation Program, State, $60000 Funded. (2003 - 2003).
  • Thompson, M.A. (Co-Principal), Dantu, R. (Principal), "2020 CAE Fordham University Grant," sponsored by Fordham University, NFP, Funded. (2020 - 2022).
  • Thompson, M.A. (Co-Principal), Dantu, R. (Principal), "Centers of Academic Excellence in Cybersecurity program: Dakota State University," sponsored by Dakota State University, NFP, Funded. (2020 - 2022).
  • Kim, D. (Principal), Dantu, R. (Principal), Hawamdeh, S.M. (Principal), "SFS-NEW: Advancing Learning and Leadership Through an Integrated Multidisciplinary Doctoral Program in Information Assurance," sponsored by National Science Foundation, FED, Funded. (2012 - 2021).
  • Dantu, R., "Soft Skill and Career Readiness for Students," sponsored by State Farm Insurance Company, National, Funded. (2019 - 2020).
,
Overall
Summative Rating
Challenge and
Engagement Index
Response Rate

out of 5

out of 7
%
of
students responded
  • Overall Summative Rating (median):
    This rating represents the combined responses of students to the four global summative items and is presented to provide an overall index of the class’s quality. Overall summative statements include the following (response options include a Likert scale ranging from 5 = Excellent, 3 = Good, and 1= Very poor):
    • The course as a whole was
    • The course content was
    • The instructor’s contribution to the course was
    • The instructor’s effectiveness in teaching the subject matter was
  • Challenge and Engagement Index:
    This rating combines student responses to several SPOT items relating to how academically challenging students found the course to be and how engaged they were. Challenge and Engagement Index items include the following (response options include a Likert scale ranging from 7 = Much higher, 4 = Average, and 1 = Much lower):
    • Do you expect your grade in this course to be
    • The intellectual challenge presented was
    • The amount of effort you put into this course was
    • The amount of effort to succeed in this course was
    • Your involvement in course (doing assignments, attending classes, etc.) was
CLOSE