Faculty Profile

Ram Dantu

Title
Professor
Department
Computer Science and Engineering
College
College of Engineering

    

Education

PhD, Concordia University, Montreal, Canada, 1990.
Major: Computer Engineering (GPA 4.0/4.0)
MENG, Madras University, India, 1979.
Major: University first rank, Applied Electronics Engineering
BE, Madras Institute of Technology, Madras, India, 1977.
Major: Electronics Engineering
BS, Andhra University, India, 1974.
Major: Physics

Current Scheduled Teaching*

CSCE 6940.744, Individual Research, Summer 2021

* Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.

Previous Scheduled Teaching*

CSCE 6950.744, Doctoral Dissertation, Spring 2021
CSCE 6940.744, Individual Research, Spring 2021
CSCE 5585.001, Advanced Network Security, Fall 2020 Syllabus SPOT
CSCE 6585.001, Advanced Topics in Network Security, Fall 2020 SPOT
CSCE 4575.001, Blockchain and Applications, Fall 2020 Syllabus SPOT
CSCE 6950.744, Doctoral Dissertation, Fall 2020
CSCE 6940.744, Individual Research, Fall 2020
CSCE 4520.001, Wireless Networks and Protocols, Fall 2020 Syllabus SPOT
CSCE 5520.001, Wireless Networks and Protocols, Fall 2020 SPOT
CSCE 5934.744, Directed Study, Summer 10W 2020
CSCE 4890.744, Directed Study, Spring 2020
CSCE 5934.744, Directed Study, Spring 2020
CSCE 6950.744, Doctoral Dissertation, Spring 2020
CSCE 6940.744, Individual Research, Spring 2020
CSCE 6585.001, Advanced Topics in Network Security, Fall 2019 SPOT
CSCE 6950.744, Doctoral Dissertation, Fall 2019
CSCE 6940.744, Individual Research, Fall 2019
CSCE 5950.744, Master's Thesis, Fall 2019
CSCE 4520.001, Wireless Networks and Protocols, Fall 2019 Syllabus SPOT
CSCE 5520.001, Wireless Networks and Protocols, Fall 2019 SPOT
CSCE 6585.001, Advanced Topics in Network Security, Summer 2019
CSCE 4890.744, Directed Study, Summer 10W 2019
CSCE 6950.744, Doctoral Dissertation, Summer 10W 2019
CSCE 5950.744, Master's Thesis, Summer 10W 2019
CSCE 6950.744, Doctoral Dissertation, Spring 2019
CSCE 6940.744, Individual Research, Spring 2019
CSCE 5950.744, Master's Thesis, Spring 2019
CSCE 5585.001, Advanced Network Security, Fall 2018 SPOT
CSCE 6581.001, Advanced Topics in Computer Networks, Fall 2018 SPOT
CSCE 6950.744, Doctoral Dissertation, Fall 2018
CSCE 6940.744, Individual Research, Fall 2018
CSCE 5950.744, Master's Thesis, Fall 2018
CSCE 4999.744, Senior Thesis, Fall 2018
CSCE 4930.001, Topics in Computer Science and Engineering, Fall 2018 Syllabus SPOT
CSCE 4520.001, Wireless Networks and Protocols, Fall 2018 Syllabus SPOT
CSCE 5520.001, Wireless Networks and Protocols, Fall 2018 SPOT
CSCE 5520.600, Wireless Networks and Protocols, Fall 2018 SPOT
CSCE 6950.744, Doctoral Dissertation, Summer 10W 2018
CSCE 5934.744, Directed Study, Spring 2018
CSCE 6950.744, Doctoral Dissertation, Spring 2018
CSCE 6940.744, Individual Research, Spring 2018
CSCE 5950.744, Master's Thesis, Spring 2018
CSCE 4999.744, Senior Thesis, Spring 2018
CSCE 5934.744, Directed Study, Fall 2017
CSCE 6950.744, Doctoral Dissertation, Fall 2017
CSCE 6940.744, Individual Research, Fall 2017
CSCE 5950.744, Master's Thesis, Fall 2017
CSCE 5950.744, Master's Thesis, Summer 10W 2017
CSCE 4890.744, Directed Study, Spring 2017
CSCE 5934.744, Directed Study, Spring 2017
CSCE 6950.744, Doctoral Dissertation, Spring 2017
CSCE 6940.744, Individual Research, Spring 2017
CSCE 5950.744, Master's Thesis, Spring 2017
CSCE 6581.001, Advanced Topics in Computer Networks, Fall 2016 SPOT
CSCE 6950.744, Doctoral Dissertation, Fall 2016
CSCE 6940.744, Individual Research, Fall 2016
CSCE 5950.744, Master's Thesis, Fall 2016
CSCE 4520.001, Wireless Networks and Protocols, Fall 2016 Syllabus SPOT
CSCE 5520.001, Wireless Networks and Protocols, Fall 2016 SPOT
CSCE 6950.744, Doctoral Dissertation, Summer 10W 2016
CSCE 5934.744, Directed Study, Spring 2016
CSCE 6950.744, Doctoral Dissertation, Spring 2016
CSCE 6940.744, Individual Research, Spring 2016
CSCE 5950.744, Master's Thesis, Spring 2016
CSCE 4950.744, Special Problems in Computer Science and Engineering, Spring 2016
CSCE 6581.001, Advanced Topics in Computer Networks, Fall 2015 SPOT
CSCE 5934.744, Directed Study, Fall 2015
CSCE 6950.744, Doctoral Dissertation, Fall 2015
CSCE 6940.744, Individual Research, Fall 2015
CSCE 5950.744, Master's Thesis, Fall 2015
CSCE 5900.744, Special Problems, Fall 2015
CSCE 4520.001, Wireless Networks and Protocols, Fall 2015 Syllabus SPOT
CSCE 5520.001, Wireless Networks and Protocols, Fall 2015 SPOT
CSCE 5934.744, Directed Study, Summer 10W 2015
CSCE 5934.744, Directed Study, Spring 2015
CSCE 6950.744, Doctoral Dissertation, Spring 2015
CSCE 6940.744, Individual Research, Spring 2015
CSCE 5950.744, Master's Thesis, Spring 2015
CSCE 6581.001, Advanced Topics in Computer Networks, Fall 2014
CSCE 5934.744, Directed Study, Fall 2014
CSCE 6950.744, Doctoral Dissertation, Fall 2014
CSCE 6940.744, Individual Research, Fall 2014
CSCE 5950.744, Master's Thesis, Fall 2014
CSCE 4520.001, Wireless Networks and Protocols, Fall 2014 Syllabus
CSCE 5520.001, Wireless Networks and Protocols, Fall 2014
CSCE 6940.744, Individual Research, Summer 10W 2014
CSCE 5934.744, Directed Study, Spring 2014
CSCE 6950.744, Doctoral Dissertation, Spring 2014
CSCE 6940.744, Individual Research, Spring 2014
CSCE 5950.744, Master's Thesis, Spring 2014
CSCE 5934.744, Directed Study, Fall 2013
CSCE 6950.744, Doctoral Dissertation, Fall 2013
CSCE 6940.744, Individual Research, Fall 2013
CSCE 3530.001, Introduction to Computer Networks, Fall 2013 Syllabus
SLIS 6900.701, Special Problems, Fall 2013
CSCE 4520.001, Wireless Networks and Protocols, Fall 2013 Syllabus
CSCE 5520.001, Wireless Networks and Protocols, Fall 2013
CSCE 5934.744, Directed Study, Summer 10W 2013
CSCE 6950.744, Doctoral Dissertation, Summer 10W 2013
SLIS 6900.709, Special Problems, Summer 10W 2013
CSCE 6581.001, Advanced Computer Networks, Spring 2013
CSCE 4890.744, Directed Study, Spring 2013
CSCE 5934.744, Directed Study, Spring 2013
CSCE 6950.744, Doctoral Dissertation, Spring 2013
CSCE 6940.744, Individual Research, Spring 2013
CSCE 5950.744, Master's Thesis, Spring 2013
CSCE 5934.744, Directed Study, Fall 2012
CSCE 6950.744, Doctoral Dissertation, Fall 2012
CSCE 6940.744, Individual Research, Fall 2012
CSCE 5950.744, Master's Thesis, Fall 2012
CSCE 4520.001, Wireless Networks and Protocols, Fall 2012 Syllabus
CSCE 5520.001, Wireless Networks and Protocols, Fall 2012
CSCE 5934.744, Directed Study, Summer 10W 2012
CSCE 6581.001, Advanced Computer Networks, Spring 2012
CSCE 5580.001, Computer Networks, Spring 2012
CSCE 4890.744, Directed Study, Spring 2012
CSCE 5934.744, Directed Study, Spring 2012
CSCE 6950.744, Doctoral Dissertation, Spring 2012
CSCE 6940.744, Individual Research, Spring 2012
CSCE 5950.744, Master's Thesis, Spring 2012
CSCE 5934.744, Directed Study, Fall 2011
CSCE 6950.744, Doctoral Dissertation, Fall 2011
CSCE 6940.744, Individual Research, Fall 2011
CSCE 5950.744, Master's Thesis, Fall 2011
CSCE 5910.744, Special Problems, Fall 2011
CSCE 4520.001, Wireless Networks and Protocols, Fall 2011 Syllabus
CSCE 5520.001, Wireless Networks and Protocols, Fall 2011
CSCE 5934.744, Directed Study, Spring 2011
CSCE 6950.744, Doctoral Dissertation, Spring 2011
CSCE 6940.744, Individual Research, Spring 2011
CSCE 5950.744, Master's Thesis, Spring 2011
CSCE 5934.744, Directed Study, Fall 2010
CSCE 6950.744, Doctoral Dissertation, Fall 2010
CSCE 6940.744, Individual Research, Fall 2010
CSCE 5950.744, Master's Thesis, Fall 2010
CSCE 4950.744, Special Problems in Computer Science and Engineering, Fall 2010
CSCE 4520.001, Wireless Networks and Protocols, Fall 2010 Syllabus
CSCE 5520.001, Wireless Networks and Protocols, Fall 2010
CSCE 4890.744, Directed Study, Summer 10W 2010
CSCE 5934.744, Directed Study, Summer 10W 2010
CSCE 6950.744, Doctoral Dissertation, Summer 10W 2010
CSCE 6940.744, Individual Research, Summer 10W 2010
CSCE 5950.744, Master's Thesis, Summer 10W 2010
CSCE 6581.001, Advanced Computer Networks, Spring 2010
CSCE 4890.744, Directed Study, Spring 2010
CSCE 5934.744, Directed Study, Spring 2010
CSCE 6950.744, Doctoral Dissertation, Spring 2010
CSCE 6940.744, Individual Research, Spring 2010
CSCE 5950.744, Master's Thesis, Spring 2010
CSCE 5934.744, Directed Study, Fall 2009
CSCE 6950.744, Doctoral Dissertation, Fall 2009
CSCE 6940.744, Individual Research, Fall 2009
CSCE 5950.744, Master's Thesis, Fall 2009
CSCE 4520.001, Wireless Networks and Protocols, Fall 2009
CSCE 5520.001, Wireless Networks and Protocols, Fall 2009
CSCE 5934.744, Directed Study, Summer 10W 2009
CSCE 5950.744, Master's Thesis, Summer 10W 2009
CSCE 6590.001, Advanced Topics in Wireless Communications and Networks, Spring 2009
CSCE 5934.744, Directed Study, Spring 2009
CSCE 6950.744, Doctoral Dissertation, Spring 2009
CSCE 6940.744, Individual Research, Spring 2009
CSCE 5934.744, Directed Study, Fall 2008
CSCE 6950.744, Doctoral Dissertation, Fall 2008
CSCE 6940.744, Individual Research, Fall 2008
CSCE 4520.001, Wireless Networks and Protocols, Fall 2008
CSCE 5520.001, Wireless Networks and Protocols, Fall 2008
CSCE 5934.744, Directed Study, Summer 10W 2008
CSCE 6940.744, Individual Research, Summer 10W 2008
CSCE 6581.001, Advanced Computer Networks, Spring 2008
CSCE 5580.001, Computer Networks, Spring 2008
CSCE 5934.744, Directed Study, Spring 2008
CSCE 6950.744, Doctoral Dissertation, Spring 2008
CSCE 6940.744, Individual Research, Spring 2008
CSCE 5950.744, Master's Thesis, Spring 2008
CSCE 4950.744, Special Problems in Computer Science and Engineering, Spring 2008
CSCE 5934.744, Directed Study, Fall 2007
CSCE 6950.744, Doctoral Dissertation, Fall 2007
CSCE 6940.744, Individual Research, Fall 2007
CSCE 5950.744, Master's Thesis, Fall 2007
CSCE 4520.001, Wireless Networks and Protocols, Fall 2007
CSCE 5520.001, Wireless Networks and Protocols, Fall 2007
CSCE 5934.744, Directed Study, Summer 10W 2007
CSCE 6950.744, Doctoral Dissertation, Summer 10W 2007
CSCE 6940.744, Individual Research, Summer 10W 2007
CSCE 5950.744, Master's Thesis, Summer 10W 2007
CSCE 6590.001, Advanced Topics in Wireless Communications and Networks, Spring 2007
CSCE 5580.001, Computer Networks, Spring 2007
CSCE 6950.744, Doctoral Dissertation, Spring 2007
CSCE 6940.744, Individual Research, Spring 2007
CSCE 5934.744, Directed Study, Fall 2006
CSCE 6950.744, Doctoral Dissertation, Fall 2006
CSCE 6940.744, Individual Research, Fall 2006
CSCE 5950.744, Master's Thesis, Fall 2006
CSCE 4520.001, Wireless Networks and Protocols, Fall 2006
CSCE 5520.001, Wireless Networks and Protocols, Fall 2006
CSCE 5934.744, Directed Study, Summer 10W 2006
CSCE 6950.744, Doctoral Dissertation, Summer 10W 2006
CSCE 6940.744, Individual Research, Summer 10W 2006
CSCE 6590.002, Advanced Topics in Wireless Communications and Networks, Spring 2006
CSCE 5580.003, Computer Networks, Spring 2006
CSCE 6950.744, Doctoral Dissertation, Spring 2006
CSCE 6940.744, Individual Research, Spring 2006
CSCE 5950.744, Master's Thesis, Spring 2006
CSCE 6581.001, Advanced Computer Networks, Fall 2005
CSCE 4890.744, Directed Study, Fall 2005
CSCE 5934.744, Directed Study, Fall 2005
CSCE 6950.744, Doctoral Dissertation, Fall 2005
CSCE 6940.744, Individual Research, Fall 2005
CSCE 5950.744, Master's Thesis, Fall 2005
CSCE 5520.001, Wireless Networks and Protocols, Fall 2005
CSCI 5890.744, Directed Study, Summer 10W 2005
CSCI 6940.744, Individual Research, Summer 10W 2005
CSCI 5900.744, Special Problems, Summer 10W 2005
CSCI 5780.001, Computer Networks, Spring 2005
CSCI 5890.744, Directed Study, Spring 2005
CSCI 6940.744, Individual Research, Spring 2005
CSCI 5950.744, Master's Thesis, Spring 2005
CSCI 5900.744, Special Problems, Spring 2005
CSCI 4330.008, Topics in Computer Science, Spring 2005
CSCI 5330.008, Topics in Computer Science, Spring 2005
CSCI 6781.001, Advanced Computer Networks, Fall 2004
CSCI 6940.744, Individual Research, Fall 2004
CSCI 5950.744, Master's Thesis, Fall 2004
CSCI 4330.003, Topics in Computer Science, Fall 2004

* Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.

Published Publications

Published Intellectual Contributions

Book Chapter
Zhang, H., Dantu, R. (2011). Event Detection based on Call Detail Records. Behavior Computing: Modeling, Analysis, Mining and Decision. 305–316. Springer London: Proceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), June. http://dx.doi.org/10.1007/978-1-4471-2969-1_19
Zhang, H., Dantu, R. (2011). Smart Phone: Predicting the Next Call. Behavior Computing: Modeling, Analysis, Mining and Decision. 317-325. Springer London: Proceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), June. https://link.springer.com/chapter/10.1007/978-1-4471-2969-1_20
Dantu, R., Guturu, P. (2010). An Architecture for IP-based Next Generation Radio Access network. Fourth-Generation Wireless Networks: Applications and Innovations. 61-76. IGI Global Publications. https://www.igi-global.com/chapter/architecture-based-next-generation-radio/40697
Dantu, R., Guturu, P. (2009). An Architecture for IP-based Next Generation Radio Access network, book chapter. 16. IGI Global Publications, Fourth-Generation Wireless Networks: Applications and Innovations. https://www.igi-global.com/chapter/architecture-based-next-generation-radio/40697
Conference Proceeding
Talkington, J., Dantu, R., Morozov, K. (2020). Detecting Devices and Protocols on VPN-Encrypted Networks. Other. 8. IEEE.
Talkington, J., Morozov, K., Dantu, R. (2020). Why Protocols Fail to Transition to Mobile Domains. Other. 12. IEEE. https://ieeexplore.ieee.org/document/9042951
Sen, N., Dantu, R., Morozov, K. (2020). EW256357 : A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications’ Security. 291-310. Springer. https://link.springer.com/chapter/10.1007%2F978-3-030-63095-9_19
Ganduri,, Dantu, R., Thompson, M. A., Evans, S., Widick, L. (2020). A Human-Network-Security-Interface for an Average Joe. 1-6. Virginia: 18th Annual IEEE International Conference on Intelligence and Security Informatics.
Vempati, J., Dantu, R., Badruddoja, S., Thompson, M. A. (2020). Adaptive and Predictive SDN Control During DDoS Attacks. 1-6. Arlington, Virgina: 18th Annual IEEE International Conference on Intelligence and Security Informatics.
Sen, N., Dantu, R., Thompson, R. A. (2020). Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves. 1-7. Arlington, Virginia:.
Badruddoja, S., Dantu, R., Widick, L., Zaccagni, Z., Upadhyay, K. (2020). Integrating DOTS With Blockchain Can Secure Massive IoT Sensors. 937-946. New Orleans, LA: IEEE IPDPS.
Upadhyaya, K., Dantu, R., Zaccagni, Z., Dantu, R. Is Your Legal Contract Ambiguous? Convert to a Smart Legal Contract. 273-280. New York: IEEE.
Sen, N., Dantu, R., Thompson, M. A. (2020). Performance Analysis of Elliptic Curves for VoIP Audio Encryption using a Softphone. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST). 335, 503-508. Springer.
Ranasinghe, I., Jayaraman, A., Xiao, T., Dantu, R., Thompson, M. A., Albert, M. (2020). Home Care Robotic Assistant Prototype for Remote Human Supervision: Development and Pilot Analysis of Exercise Repetition Counting over Multiple Viewing Angles. 1. ARCM: Archives of Physical Medicine and Rehabilitation.
Claiborne, C., Dantu, R., Ncube, K. (2020). Guarding Sensitive Sensor Data against Malicious Mobile Applications. 1-6. Florida: 2020 Sixth International Conference on Mobile And Secure Services (MobiSecServ),.
Bucuti, T. H., Dantu, R., Morozov, K. (2019). CMCAP: Ephemeral Sandboxes for Adaptive Access Control. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19. ACM Press. http://dx.doi.org/10.1145/3322431.3325414
Dantu, R., Zaccagni, Z., Paul, A. (2019). Micro-Accreditation for Matching Employer E-Hire Needs. 347-352. Atlanta, GA: IEEE.
Dantu, R. (2019). Blockchain Based Authentication and Authorization Framework for Remote Collaboration Systems. 3 Biotech. 1-7. Washington DC: IEEE.
Muttavarapu, A. S., Dantu, R., Thompson, M. A. (2019). A Distributed Ledger for Spammers' Resume. Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS).
Talkington, J., Dantu, R., Morozov, K. (2019). Verifying OAuth Implementations Through Encrypted Network Analysis. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19. ACM Press. http://dx.doi.org/10.1145/3322431.3326449
Ranganthan, V. P., Dantu, R., Paul, A., Mears, P., Morozov, K. (2018). A Decentralized Marketplace Application on the Ethereum Blockchain. 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). IEEE. http://dx.doi.org/10.1109/cic.2018.00023
Vempati, J. A., Dantu, R. (2018). Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an Attack. 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). 80-89. Philadelphia, PA:.
Jonnada, S., Dantu, R., Ranasinghe, I. (2018). Cyber Handyman and Nursing for Humanitarian Services and Disaster Relief. 2018 IEEE International Symposium on Technologies for Homeland Security (HST). 1-6. Woburn, MA:.
Vempati, J. A., Dantu, R., Thompson, M. A. (2018). Uninterrupted Video Surveillance in the Face of an Attack. 843-848. New York: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
Sen, N., Dantu, R., Vempati, J. A., Thompson, M. A. (2018). Performance Analysis of Elliptic Curves for Real-Time Video Encryption. 2018 National Cyber Summit (NCS). 64-71.
Jonnada, S., Dantu, R., Shrestha, P. L., Ranasinghe, I., Widick, L. (2018). An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems. 38-44. IEEE National Cybersecurity Summit.
Vempati, J., Thompson, M. A., Dantu, R. (2017). Feedback control for resiliency in face of an attack. Proceedings of the 12th Annual Conference on Cyber and Information Security Research. 17.
Hashem, Y., Takabi, H., Dantu, R. (2017). Insider Threat Detection Based on Users' Mouse Movements and Keystrokes Behavior. Secure Knowledge Management Conference 2017 (SKM 2017).
Thiyagaraja, S., Dantu, R., Shrestha, P. L., Thompson, M. A., Smith, C. (2017). Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices. Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017 IEEE/ACM International Conference on. 25--30.
Hashem, Y., Takabi, H., Dantu, R., Nielsen, R. D. (2017). A multi-modal neuro-physiological study of malicious insider threats. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS) International Workshop on Managing Insider Security Threats. 33--44. New York, New York: Association for Computing Machinery (ACM). http://doi.acm.org/10.1145/3139923.3139930
Dantu, R., Jonnada, S. (2017). Cyber Handyman: Bridging the gap between rural and urban communities. Charlottesville, Virginia: National Workshop on Developing the Research Agenda for Connected Rural Communities (CRC17).
Dantu, R., Talkington, J. (2017). Realizing Optimal Chest Compression Fraction During Cardiopulmonary Resuscitation. 347-349. Washington,DC: 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE). http://ieeexplore.ieee.org/document/7545860/
Vempati, J., Dantu, R., Thompson, M. (2017). Feedback control for resiliency in face of an attack. 7. Oak Ridge, Tennessee: The 12th Annual Cyber and Information Security Research (CISR) Conference, Oak Ridge National Laboratory, Oak Ridge, Tennessee. https://dl.acm.org/citation.cfm?id=3064815
Dantu, R., Jaynes, M. (2017). Automating ECU Identification for Vehicle Security. 632-635. Anaheim, CA: IEEE Workshop on Machine Learning in Security of Cyber-Physical Systems, as part of the 2016 IEEE International Conference on Machine Learning Applications. http://ieeexplore.ieee.org/document/7838215/
Mayo, Q. R., Bryce, R., Dantu, R. (2015). PhD Forum: A System Identification Approach to Monitoring Network Traffic Security. Cyber Security and Cloud Computing (CSCloud), 2015 IEEE 2nd International Conference on. 509--511.
Dantu, R., Quentin, M., Bryce, R. (2015). A System Identification Approach to Monitoring Network Traffic Security. 509 - 511. New York, NY: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York. http://ieeexplore.ieee.org/document/7371530/
Dantu, R., Gupta, N., Dantu, S., Nana, A. (2015). Fitts Law Extensions for Multiple Joint Movements. 96(10), e61. Dallas, Texas: American Congress on Rehabilitation Medicine. http://www.archives-pmr.org/article/S0003-9993(15)00860-6/abstract
Dantu, R., Bajwa, G., Nana, A. (2015). Quantifying Dynamic Cerebral Autoregulation using Electroencephalograms. 96(10), e69. Dallas, Texas: American Congress on Rehabilitation Medicine. http://www.archives-pmr.org/article/S0003-9993(15)00886-2/abstract
Dantu, R., Widick, L., Talkington, J., Bajwa, G. (2015). A Framework for Secured Collaboration in mHealth. 364 - 369. Atlanta, GA: Fifth International Symposium on Security in Collaboration Technologies and Systems (SECOTS). http://ieeexplore.ieee.org/document/7210450/
Dantu, R., Bucuti, T. (2015). An opportunistic encryption extension for the DNS protocol. 194 - 194. Baltimore, MD: IEEE International Conference on Intelligent Security Informatics. http://ieeexplore.ieee.org/document/7165976/
Dantu, R., Bajwa, G., Aldridge, R. (2015). Pass-Pic: A Mobile User Authentication. 195 - 195. Baltimore, MD: International Conference on Intelligent Security Informatics. http://ieeexplore.ieee.org/document/7165977/
Dantu, R., Claiborne, C., Ncube, C. (2015). Random Anonymization of Mobile Sensor Data -Modified Android Framework. 182 - 184. Baltimore, MD: IEEE International Conference on Intelligent Security Informatics. http://ieeexplore.ieee.org/document/7165968/
Dantu, R., Bajwa, G., Fazeen, M., Issadeen, M., Tanpure, S. (2015). Unintentional Bugs to Vulnerability Mapping in Android Applications. 176 - 178. Baltimore, MD: IEEE International Conference on Intelligent Security Informatics. http://ieeexplore.ieee.org/document/7165966/
Jaynes, M., Dantu, R. (2014). Tire-road friction estimation utilizing smartphones. Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on.
Dantu, R., M, F. (2014). Another free app: Does it have the right intentions?. 282-289. Toronto, ON: Twelfth Annual International Conference on Privacy, Security and Trust (PST). http://ieeexplore.ieee.org/document/6890950/
Dantu, R., Thiagraj, S., Vempati, J., Dantu, T., S. D. (2014). Smart phone monitoring of second heart sound split. 2181-2184. Chicago, IL: Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology (EMBC). http://ieeexplore.ieee.org/document/6944050/
Dantu, R., Fazeen, M., Bajwa, G. (2014). Context-aware multimedia encryption in mobile platforms. 53-56. New York, NY: In Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14), Robert K. Abercrombie and J. Todd McDonald (Eds.), ACM. https://dl.acm.org/citation.cfm?doid=2602087.2602115
Dantu, R., Bajwa, G. (2013). Cerebral autoregulation assessment using electroencephalograms. 327-330. Boston, Massachusetts: BodyNets’13, Proceedings of the 8th International Conference on Body Area Networks. https://dl.acm.org/citation.cfm?id=2555319.2555393
Gupta, N., Dantu, R. (2013). Evaluation of Respiration Quality Using Smart Phone. Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments. New York, NY, USA: ACM. http://doi.acm.org/10.1145/2504335.2504364
Dantu, R., Thiagaraja, S. (2013). Finger blood flow monitoring using smart phones. 237-239. Boston, Massachusetts: Proceedings of the 8th International Conference on Body Area Networks. http://dx.doi.org/10.4108/icst.bodynets.2013.253704
Dantu, R., Bajwa, G., Fazeen, M., Joseph, R. (2013). Self-Tracking via Brain-Mobile-Cloud Interface. AAAI Spring Symposium: Data Driven Wellness.
Dantu, R., Claiborne, C., Fazeen, M. (2013). Android Sensor Data Anonymization. Rodney Bay, St. Lucia: 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013.
Dantu, R., Vempati, J., Bajwa, G. (2013). NFC Based Two-Pass Mobile Authentication. 467-468. Rodney Bay, St. Lucia: 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013. http://www.springer.com/us/book/9783642412837
Dantu, R., Bajwa, G. (2013). Cryptographic Key Generation using Electroencephalograms. Arlington, Virginia, USA: Learning From Authoritative Experimental Results, LASER’2013. http://2013.laser-workshop.org/program/wip
Dantu, R., Gupta, N. (2013). Quantifying cognitive impairment due to physical or mental stress. 6. Rhodes, Greece: PETRA. https://dl.acm.org/citation.cfm?id=2504335.2504384
Barthold, C., Subbu, K., Dantu, R. (2011). Evaluation of gyroscope-embedded mobile phones. Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on. Anchorage, AK:.
Dantu, R., Subbu, P., G. B. (2011). Indoor localization through dynamic time warping. 1639-1644. Anchorage, AK: IEEE International Conference on Systems, Man, and Cybernetics, (SMC) 2011. http://ieeexplore.ieee.org/document/6083906/
Dantu, R., E. B. (2011). Current and Future Trends in Social Media. Boston, Massachusetts: The Third IEEE International Conference on Social Computing - International Workshop on Modeling Social Media: User Interface Modeling in Social Media (MSM11), MIT campus in Cambridge, MA. http://ieeexplore.ieee.org/document/6113312/
Dantu, R., C, B., K, P. (2011). Evaluation of gyroscope-embedded mobile phones. 1632-1638. Anchorage, AK: IEEE International Conference on Systems, Man, and Cybernetics, (SMC) 2011. http://ieeexplore.ieee.org/abstract/document/6083905/
Dantu, R., Baatarjav, . (2011). Unveiling Hidden Patterns to Find Social Relevance. 242 - 249. Boston, MA: The Third IEEE International Conference on Social Computing, MIT campus in Cambridge, MA. http://ieeexplore.ieee.org/document/6113121/
Dantu, R., Baatarjav, E. (2011). Social Relevance. MIT campus in Cambridge, MA: Interdisciplinary Workshop on Information and Decision in Social Networks (WIDS 2010) Organized by Laboratory for Information and Decision Systems.
Chandrasekaran, V., Dantu, R., Gupta, N., Yang, X., Wijesekera, D. (2010). Efficiency of Social Connection-based Routing in P2P VoIP Networks. Proceedings of the 2Nd International Conference on COMmunication Systems and NETworks. Piscataway, NJ, USA: IEEE Press. http://dl.acm.org/citation.cfm?id=1831443.1831488
Sroufe, P., Phithakkitnukoon, S., Dantu, R., Cangussu, J. (2010). Email Shape Analysis. Lecture Notes in Computer Science book series (LNCS, volume 5935). 18-29. Springer, Berlin, Heidelberg: International Conference Distributed Computing and Networking (ICDCN'2010). https://link.springer.com/chapter/10.1007/978-3-642-11322-2_7
Phithakkitnukoon, S., Dantu, R. (2010). Mobile Social Closeness and Communication Patterns. Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference. Piscataway, NJ, USA: IEEE Press. http://dl.acm.org/citation.cfm?id=1834217.1834285
Zhang, H., Dantu, R. (2010). Smart Phone: Predicting the Next Call. 317-325. Springer, London: Proceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), June. https://link.springer.com/chapter/10.1007/978-1-4471-2969-1_20
Zhang, H., Dantu, R. (2010). Event Detection based on Call Detail Records. 305-316. Springer, London: Proceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), JuneProceedings of the IEEE Workshop on Behavior Informatics (BI2010) conjunction with the 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010), Hyderabad, India. https://link.springer.com/chapter/10.1007/978-1-4471-2969-1_19
Zhang, H., Dantu, R. (2010). Predicting Social Ties in Mobile Phone Networks. 25 - 30. Vancouver, BC: Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2010),May. http://ieeexplore.ieee.org/document/5484780/
Chandrasekaran, V., Dantu, R., Gupta, N. K., Yang, X., Wijesekera, D. (2010). Efficiency of Social Connection-based Routing in P2P VoIP Networks. 1-6. Bangalore: Fourth Workshop on Intelligent Networks: Adaptation, Communication & Reconfiguration (part of COMSNETS'2010). http://ieeexplore.ieee.org/document/5431975/
Dantu, R. (2010). Social Aspects of Video Phones. 1-7. Bangalore: 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010). http://ieeexplore.ieee.org/abstract/document/5431971/
Baatarjav, E., Amin, A., Dantu, R., Gupta, N. K. (2010). Are you My friend?. 1-5. Las Vegas, NV: Seventh IEEE Conference on Consumer Communications & Networking Conference (CCNC 2010), Special Session on Social Networking (SocNets). http://ieeexplore.ieee.org/abstract/document/5421732/
Phithakkitnukoon, S., Dantu, R. (2010). Mobile Social Closeness and Similarity in Calling Patterns. 1-5. Las Vegas, NV: Seventh IEEE Conference on Consumer Communications & Networking Conference (CCNC 2010), Special Session on Social Networking (SocNets). http://ieeexplore.ieee.org/document/5421787/
Yang, X., Stavrou, A., Dantu, R., Wijesekera, D. (2010). Small World VoIP. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 76). 137-155. Springer, Berlin, Heidelberg: International Conference on Mobile Computing, Applications, and Services. https://link.springer.com/chapter/10.1007/978-3-642-29336-8_8
Chandrasekaran, V., Dantu, S., Kadiyala, P., Dantu, R., Phithakkitnukoon, S. (2010). Socio-Technical Aspects of Video Phones. 1-7. Bangalore: Fourth Workshop on Intelligent Networks: Adaptation, Communication & Reconfiguration (part of COMSNETS'2010). http://ieeexplore.ieee.org/document/5431971/
Baatarjav, E., Dantu, R., Tang, Y., Cangussu, Jo\~ao, (2009). BBN-based Privacy Management System for Facebook. Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics. Piscataway, NJ, USA: IEEE Press. http://dl.acm.org/citation.cfm?id=1706428.1706467
Zhang, H., Dantu, R., Cangussu, Jo\~ao, (2009). Change Point Detection Based on Call Detail Records. Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics. Piscataway, NJ, USA: IEEE Press. http://dl.acm.org/citation.cfm?id=1706428.1706438
Phithakkitnukoon, S., Dantu, R. (2009). Defense Against SPIT Using Community Signals. Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics. Piscataway, NJ, USA: IEEE Press. http://dl.acm.org/citation.cfm?id=1706428.1706481
Zhang, H., Dantu, R. (2009). Opt-in Detection based on Call Detail Records. 607-608. Proceedings of the 6th Annual IEEE Consumer Communications & Networking Conference (CCNC 2009).
Madhavan, Y., Cangussu, Jo\~ao,, Dantu, R. (2009). Penetration Testing for Spam Filters. Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02. Seattle, WA: IEEE Computer Society. http://dx.doi.org/10.1109/COMPSAC.2009.168
Zhang, H., Dantu, R., Cangussu, J. (2009). Quantifying reciprocity in Social Networks. 4, 1031-1035. IEEE InternationalWorkshop on Social Mobile Web (SMW09), in conjunction with SocialCom-09.
Madhavan, Y., Cangussu, J., Dantu, R. (2009). Spam Penetration Testing. 6. 1st IEEE International Workshop on Computer Forensics in Software Engineering (CFSE'2009), in conjunction with COMPSAC 2009, Seattle, Washington.
Langle, L., Dantu, R. (2009). Are you A Safe Driver. 502-507. Vancouver, BC: IEEE International Conference on Embedded and Pervasive Systems, EAP-09. http://ieeexplore.ieee.org/document/5284183/
Subbu,, K., Xu, N., Dantu, R. (2009). iKnow Where You Are. 469-474. Vancouver, BC: In Proceedings of the IEEE International Symposium on Social Intelligence and Networking (SIN09), in conjunction with SocialCom. http://ieeexplore.ieee.org/document/5284201/
Baatarjav, E., Dantu, R., Tang, Y., Cangussu, J. (2009). BBN-based Privacy Management System for Facebook. 194 - 196. Dallas, TX: Proc. of IEEE Inter. Conf. on Intelligence and Security Informatics, Dallas, TX. http://ieeexplore.ieee.org/abstract/document/5137300/
Zhang, H., Dantu, R., Cangussu, J. (2009). Change Point Detection based on Call Detail Records. 55 - 60. Dallas, Texas: Proc. of IEEE Inter. Conf. on Intelligence and Security Informatics, Dallas, TX. http://ieeexplore.ieee.org/document/5137271/
Baatarjav, E., Phithakkitnukoon, S., Dantu, R. (2009). Defense Against SPIT Using Community Signals. 232 - 232. Dallas, TX: Proc. of IEEE Inter. Conf. on Intelligence and Security Informatics, Dallas, TX. http://ieeexplore.ieee.org/abstract/document/5137314/
Yang, X., Dantu, R., Wijesekera, D. (2009). A society-integrated testbed architecture for peer-to-peer telecommunications. Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009. TridentCom 2009. 5th International Conference on.
Alazzawe, A., Alazzawe, A., Wijesekera, D., Dantu, R. (2009). A testbed for mobile social computing. Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009. TridentCom 2009. 5th International Conference on.
Yang, X., Dantu, R., Wijesekera, D. (2009). Achieving Peer-to-Peer Telecommunication Services through Social Hashing. 1-2. Las Vegas, NV: The 6th Annual IEEE Conference on Consumer Communications & Networking Conference (CCNC 2009). http://ieeexplore.ieee.org/document/4784812/
Sroufe, P., Phithakkitnukoon, S., Dantu, R. (2009). Email Shape Analysis for Spam Botnet Detection. 1-2. Las Vegas, NV: The 6th Annual IEEE Conference on Consumer Communications & Networking Conference (CCNC 2009). http://ieeexplore.ieee.org/abstract/document/4784781/
Baatarjav, E., Dantu, R., Phithakkitnukoon, S. (2008). Privacy Management for Facebook. 273 - 286. Springer-Verlag Berlin, Heidelberg: The International Conference on Information Systems Security (ICISS 2008), Hyderabad, India. https://dl.acm.org/citation.cfm?id=1496288
Phithakkitnukoon, S., Dantu, R. (2008). Adequacy of Data for Characterizing Caller Behavior. 9. Las Vegas, NV: The 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - The 2nd Workshop on Social Network Mining and Analysis (SNA-KDD 2008). https://pdfs.semanticscholar.org/dd5c/e102bbbd565c17fa5bcaf62e183d23b23f60.pdf?_ga=2.246883718.382614901.1517971822-1402626469.1517971822
Husna, H., Phithakkitnukoon, S., Palla, S., Dantu, R. (2008). Behavior Analysis of Spam Botnets. 246-253. Bangalore: The 3rd Annual IEEE International Conference on Communication System Software and Middleware (COMSWARE 2008), Bangalore, India. http://ieeexplore.ieee.org/abstract/document/4554418/
Phithakkitnukoon, S., Husna, H., Dantu, R. (2008). Behavioral Entropy of a Cellular Phone User. 160-167. Springer, Boston, MA: The 1st International Workshop on Social Computing, Behavioral Modeling, and Prediction (SBP 2008), Springer Lecture Notes in Computer Science (LNCS). https://link.springer.com/chapter/10.1007/978-0-387-77672-9_18#citeas
Phithakkitnukoon, S., Dantu, R. (2008). CPL: Enhancing Mobile Phone Functionality by Call Predicted List. Proceedings of the OTM Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: 2008 Workshops: ADI, AWeSoMe, COMBEK, EI2N, IWSSA, MONET, OnToContent + QSI, ORM, PerSys, RDDS, SEMELS, and SWWS. Berlin, Heidelberg: Springer-Verlag. http://dx.doi.org/10.1007/978-3-540-88875-8_80
Phithakkitnukoon, S., Dantu, R. (2008). CPL: Enhancing Mobile Phone Functionality by Call Predicted List. 571-581. Springer, Berlin, Heidelberg: OnTheMove Federated Conference (OTM 2008) - The 3rd International Workshop on MObile and NEtworking Technologies for social applications (MONET'08), LNCS 5333, Monterrey, Mexico. https://link.springer.com/chapter/10.1007/978-3-540-88875-8_80
Zhang, H., Dantu, R. (2008). Discovery of Social groups using Call Detail Records. 489-498. Springer, Berlin, Heidelberg: OnTheMove Federated Conference (OTM 2008) - The 3rd International Workshop on MObile and NEtworking Technologies for social applications (MONET'08), LNCS 5333, Monterrey, Mexico, November. https://link.springer.com/chapter/10.1007/978-3-540-88875-8_72
Baatarjav, E., Phithakkitnukoon, S., Dantu, R. (2008). Group Recommendation System for Facebook. 211-219. Springer, Berlin, Heidelberg: On The Move Federated Conference (OTM 2008) - The First International Workshop on Community-Based Evolution of Knowledge-Intensive Systems (COMBEK'08), LNCS 5333, Monterrey, Mexico. https://link.springer.com/chapter/10.1007/978-3-540-88875-8_41
Phithakkitnukoon, S., Dantu, R. (2008). Inferring Social Groups using Call Logs. 200-210. Springer, Berlin, Heidelberg: OnTheMove Federated Conference (OTM 2008) - The International Workshop on Community-Based Evolution of Knowledge-Intensive Systems (COMBEK'08), LNCS 5333, Monterrey, Mexico. https://link.springer.com/chapter/10.1007/978-3-540-88875-8_40
Sroufe, P., Dantu, R. (2008). Experiences in Building a Multi-University Testbed for Research in Multimedia Communications. 1-5. Miami, FL: ACM International Parallel & Distributed Processing Symposium, Miami, FL. http://ieeexplore.ieee.org/document/4536392/
Kolan, P., Dantu, R. (2008). Call Algebra. 2008 5th IEEE Consumer Communications and Networking Conference.
Phithakkitnukoon, S., Husna, H., Baatarjav, E., Dantu, R. (2008). Quantifying Presence using Calling Patterns. 184 - 187. Bangalore: The 3rd Annual IEEE International Conference on Communication System Software and Middleware (COMSWARE 2008), Bangalore, India. http://ieeexplore.ieee.org/document/4554403/
Zhang, H., Dantu, R. (2008). Quantifying the presence of Phone users. 883-887. Las Vegas, NV: The 5th Annual IEEE Conference on Consumer Communications and Networking Conference (CCNC 2008), Las Vegas, NV. http://ieeexplore.ieee.org/document/4446504/
Husna, H., Phithakkitnukoon, S., Dantu, R. (2008). Traffic Shaping of Spam Botnets. 786-787. Las Vegas, NV: The 5th Annual IEEE Conference on Consumer Communications and Networking Conference (CCNC 2008), Las Vegas, NV. http://ieeexplore.ieee.org/document/4446479/
Phithakkitnukoon, S., Dantu, R. (2007). Predicting Calls: New Service for an Intelligent Phone. 4787, 27-36. Springer, Berlin, Heidelberg: IFIP/IEEE International Conference on Multimedia, and Mobile Networks (MMNC). https://link.springer.com/chapter/10.1007/978-3-540-75869-3_3
Dantu, R., Kolan, P., Akl, R. (2007). Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. 71-74. New Brunswick, NJ: IEEE International Conference on Security Informatics (ISI), New Jersey. http://ieeexplore.ieee.org/document/4258676/
Fagen, W., Canussu, J., Dantu, R. (2007). Goliath: A Configurable Approach for Network Testing. 1-9. Lake Buena Vista, FL: 2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities. http://ieeexplore.ieee.org/document/4444667/
Kolan, P., Vaithialingam, R., Dantu, R. (2007). Automatic Calibration Using Receiver Operating Characteristics Curves. 1-8. Bangalore: IEEE First Workshop on Information Assurance Middleware for COMmunications (IAMCOM). http://ieeexplore.ieee.org/abstract/document/4268127/
Palla, S., Dantu, R. (2007). Unwanted SMTP Paths and Relays. Bangalore: IEEE 2nd International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007). http://ieeexplore.ieee.org/document/4268083/
Palla, S., Dantu, R. (2006). Detecting phishing in emails. Proceedings of MIT Spam Conference.
Sengar, H., Dantu, R., Wijesekera, D. (2006). Securing VoIP and PSTN from Integrated Signaling Network Vulnerabilities. 1-7. Vancouver, BC: 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE). http://ieeexplore.ieee.org/document/1638116/
Palla, P., Dantu, R. (2006). Detecting Phishing in E-mails. 6. Boston, Massachusetts: MIT Spam Conference.
Dantu, R., Cangussu, Jo\~ao, (2005). An Architecture for Network Security Using Feedback Control. Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics. Atlanta, GA: Springer-Verlag. http://dx.doi.org/10.1007/11427995_84
Dantu, R., Kolan, P. (2005). Risk Management Using Behavior Based Bayesian Networks. Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics. Atlanta, GA: Springer-Verlag. http://dx.doi.org/10.1007/11427995_10
Dantu, R., Cangussu, Jo\~ao,, Turi, J. (2005). Sensitivity Analysis of an Attack Containment Model. Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics. Atlanta, GA: Springer-Verlag. http://dx.doi.org/10.1007/11427995_11
Dantu, R., Kolan, P. (2005). Detecting Spam in VoIP Networks. 31-38. Berkeley, CA: Proceedings of USENIX, SRUTI'05. https://dl.acm.org/citation.cfm?id=1251287
Dantu, R., Cangussu, J. (2005). An architecture for Network Security Using Feedback Control. 636-637. Springer, Berlin, Heidelberg: IEEE International Conference on Intelligence and Security Informatics, ISI 2005,Lecture Notes in Computer Science, Springer Verlag. https://link.springer.com/chapter/10.1007/11427995_84
Dantu, R., Kolan, P. (2005). Risk Management using Behavior based Bayesian Networks. 115-126. Springer, Berlin, Heidelberg: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Lecture Notes in Computer Science. https://link.springer.com/chapter/10.1007/11427995_10
Dantu, R., Cangussu, J., Turi, J. (2005). Sensitivity Analysis of an Attack Containment Model. 127-138. Springer, Berlin, Heidelberg: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Lecture Notes in Computer Science. https://link.springer.com/chapter/10.1007/11427995_11
Dantu, R., Abbas, K., O'Neill, M., Mikler, A. (2004). Data centric modeling of environmental sensor networks. 447-452. Dallas, TX: IEEE GLOBECOM Workshop on Adaptive Wireless Networks, IEEE GLOBECOM 2004, Dallas, USA. http://ieeexplore.ieee.org/abstract/document/1417621/
Dantu, R., Abbas, K., O'Neill II, M., Mikler, A. R. (2004). Data Modeling of Environmental Sensor Networks. EEE GLOBECOM Workshop on Adaptive Wireless Networks.
Dantu, R., Abbas, K., O’Neill, M., Mikler, A. R., others, (2004). Data centric modeling of environmental sensor networks. Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004. IEEE. 447–452.
Dantu, R., Kolan, P. (2004). Detecting Spam in VoIP Networks. 5-5. Berkeley, CA: IEEE GLOBECOM workshop on VoIP Security, GLOBECOM 2004, Dallas, USA. https://dl.acm.org/citation.cfm?id=1251287
Dantu, R., Joglekar, S. (2004). Collaborative Vision using Networked Sensors. 305-399. Las Vegas, NV: IEEE International Conference on Information Technology, special track on sensor networks, ITCC 2004. http://ieeexplore.ieee.org/abstract/document/1286673/
Dantu, R., Cangussu, J., Yelimeli, A. (2004). Dynamic Control of Worm Propagation. 419-423. Las Vegas, NV: IEEE International Conference on Information Technology, ITCC 2004, special track on information assurance and security. http://ieeexplore.ieee.org/document/1286491/
Dantu, R., Loper, K., Kolan, P. (2004). Risk Management using Behavior based Attack Graphs. 445-449. Las Vegas, NV: IEEE International Conference on Information Technology, special track on information assurance and security, ITCC 2004. http://ieeexplore.ieee.org/abstract/document/1286496/
Dantu, R. (2002). An Architecture of Security Engineering. Boston, Massachusetts: ACSA Workshop on Application of Engineering Principals for Security System Design.
Dantu, R. (2001). IP in Radio Access Networks. Dallas, Texas: 19th IEEE Annual CVT Symposium.
Khasnabish, B., Dantu, R. (1996). Traffic Management in an Enterprise Networking Switch, Few Case Studies. 1-10. Dallas, Texas: First International Workshop on Enterprise Networking (part of ICC '96).
Dantu, R., Dimopolous, N. J., Patel, R. V., Al-Khalili, A. J. (1990). Micro-manipulators for Wafer Probing. 711-722. Proceedings of SPIE Conference on Application of Artificial Intelligence. http://dx.doi.org/10.1117/12.21121
Dantu, R., Patel, R. V., Dimopolous, N. J., Al-Khalili, A. J. (1989). Vision Algorithms for VLSI Wafer Probing. 54-65. Philadelphia, PA: Proc. SPIE 1197, Automated Inspection and High-Speed Vision Architectures III. http://dx.doi.org/10.1117/12.969934
Dantu, R., Dimopolous, N. J., Patel, R. V., Al-Khalili, A. J. (1988). A micro-manipulator vision in IC manufacturing. 1455-1460. Philadelphia, PA: Proceedings of the 1988 IEEE International Conference on Robotics and Automation, USA. http://ieeexplore.ieee.org/document/12271/
Dimopolous, N. J., Li, K. F., Wang, E. C., Dantu, R. (1987). The Homogeneous Multiprocessor System – An Overview. 592-599. Raleigh, NC: Proceedings of the 1987 IEEE International Conference on Parallel Processing.
Dantu, R., Dimopolous, N. J., Li, K. F., Patel, R. V., Al-Khalili, A. J. (1986). Parallel Algorithms for Low-level Vision on the Homogeneous Multiprocessor. 421-423. Proceedings of IEEE International Conference on Computer Vision (CVPR'86), Miami. https://www.sciencedirect.com/science/article/pii/004579069490006X
Dantu, R., Dimopolous, N. J., Patel, R. V., Al-Khalili, A. J. (1986). An Integrated Micro-manipulator System for Integrated Circuit Manufacturing. Montreal: Proceedings of the 1986 Canadian Conference on Industrial Computer Systems.
Dantu, R., Rao, N. V. (1982). Teaching Aids for Microprocessor Interfacing Devices. International Conference on Teaching Aids in Physics Education (TAPE), National University of Singapore.
Journal Article
Thiyagaraja, S., Dantu, R., Shrestha, P. L., Chitnis, A., Thompson, M. A., Anumandla, P., Sarma, T., Dantu, S. (2018). A novel heart-mobile interface for detection and classification of heart sounds. Other. 45, 313 - 324. Elsavier. https://www.sciencedirect.com/science/article/pii/S1746809418301101
Sarma, S., Bucuti, H., Chitnis, A., Klacman, A., Dantu, R. (2017). Real-Time Mobile Device-Assisted Chest Compression During Cardiopulmonary Resuscitation. American Journal of Cardiology. 120, 196 - 200. http://dx.doi.org/10.1016/j.amjcard.2017.04.007
Dantu, R., Sarma, T., Chitnis, A., Bucuti, T., Klacman, A. (2017). Real Time Mobile Device Assisted Cardiopulmonary Resuscitation. 120(2), 196-200. American Journal of Cardiology. https://www.ncbi.nlm.nih.gov/pubmed/28550930
Dantu, R., Chandrasekaran, V., Gupta, N. (2016). 911 services and vital sign measurement utilizing mobile phone sensors and applications. US: University of North Texas. https://patents.google.com/patent/US9485345/en
Hashem, Y., Takabi, H., GhasemiGol, M., Dantu, R. (2016). Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals. Other. 6(1), 20--36.
Dantu, R., G. B. (2016). Neurokey: Towards a New Paradigm of Cancelable Biometrics based Key Generation using Electroencephalograms. 62, 93-115. Computer & Security, Elsevier Publications. https://www.sciencedirect.com/science/article/pii/S0167404816300669
Dantu, R., Gupta, N., Dantu, V., Morgan, Z. (2015). Effective CPR Procedure With Real-Time Evaluation and Feedback Using Smartphones. (US20150351647A1), .
Dantu, R., Takabi, H., Hashem, Y. (2015). Towards Insider Threat Detection Using Psychophysiological Signals. 71-74. New York, NY: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, Boulder, Colarado. https://dl.acm.org/citation.cfm?id=2808792
Dantu, R., G. B. (2015). Detecting on-road driver distraction events using a single channel dry sensor EEG. Other.
Dantu, R., Gupta, N. (2014). Effective CPR Procedure with Real Time Evaluation and Feedback Using Smartphone. 2, 2800111. IEEE Journal on Journal of Translational Engineering in Health and Medicine. http://ieeexplore.ieee.org/document/6823662/
Dantu, R., Chandrasekaran, V., Subbu, K., Jonnada, S., Thiyagaraja, S. (2013). Cuffless Differential Blood Pressure Estimation Using Smart Phones. 60(4), 1080-1089. IEEE Trans. Biomed. Engineering. http://ieeexplore.ieee.org/abstract/document/6256704/
Dantu, R., Chandrasekaran, V., Subbu, K. (2013). Socio-technical aspects of remote media control for a NG9-1-1 system. Multimedia Tools and Applications. 62(3), 733-759. Hingham, MA:. https://dl.acm.org/citation.cfm?id=2440692
Dantu, R., Gozick, B., Subbu, K. (2013). LocateMe: Magnetic-fields-based indoor localization using smartphones. 4, 73. New York, NY: ACM Transactions on Intelligent System Technology. https://dl.acm.org/citation.cfm?id=2508054
Dantu, R., M, F., Bhukhiya, M., B, G. (2013). Safe Driving Using Mobile Phones. 13(2), 1462-1468. IEEE Transactions on Intelligent Transportation Systems.
Phithakkitnukoon, S., Dantu, R., Claxton, R., Eagle, N. (2012). Behavior Based Call predictor for a Smart Phone. 180-185. Springer, Berlin, Heidelberg: ACM Transactions on Autonomous and Adaptive Systems. https://link.springer.com/chapter/10.1007/978-3-642-32692-9_24
Dantu, R., Yang, X., Wijasekara, D., Kant, K., Zhang (Eds.), N., Das, S. (2012). Security Issues in VoIP Telecommunication Networks. 2, 763–789. Wyman Street, Waltham, MA 02451: Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges.
Subbu, K. P., Dantu, R., Gozick, B., Maeshiro, T. (2011). Magnetic Maps for Indoor Navigation. 60(12), 3883 - 3891. IEEE Transactions on Instrumentation and Measurement. http://ieeexplore.ieee.org/document/5773083/
Phithakkitnukoon, S., Dantu, R., Claxton, R., Eagle, N. (2011). Behavior-based Adaptive Call Predictor. Other. 6, 21:1\textendash21:28. http://doi.acm.org/10.1145/2019583.2019588
Phithakkitnukoon, S., Dantu, R. (2011). Mobile Social Group Sizes and Scaling Ratio. Other. 26, 71\textendash85. http://dx.doi.org/10.1007/s00146-009-0230-5
Phithakkitnukoon, S., Dantu, R. (2011). Towards Ubiquitous Computing with Call Prediction. Other. 15, 52\textendash64. http://doi.acm.org/10.1145/1978622.1978628
Dantu, R., Subbu, K., Chandrasekaran, V. (2011). Socio-technical Aspects of Remote Media Control for a NG9-1-1 System. 62(3), 733–759. Hingham, MA: Multimedia Tools and Applications. https://dl.acm.org/citation.cfm?id=2440692
Zhang, H., Dantu, R., W. Cangussu, J. (2011). Socioscope: Human Relationship and Behavior Analysis in Social Networks. 41(6), 1122-1143. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans. http://ieeexplore.ieee.org/document/5732708/
Dantu, R., Guturu, P. (2011). Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. 1(3), 241–254. Social Network Analysis and Mining. https://link.springer.com/article/10.1007/s13278-011-0017-9
Alazzawe, A., Alazzawe, A., Wijesekera, D., Dantu, R. (2010). A Testbed for Large Mobile Social Computing Experiments. 8(2), 89–97. International Journal of Sensor Networks. http://www.inderscience.com/offer.php?id=34618
Palla, S., Dantu, R., Cangussu, Jo\~ao, (2010). Spam Classification Based on E-Mail Path Analysis. Other. 332.
Phithakkitnukoon, S., Dantu, R. (2010). ContextAlert: Context-aware alert mode for a mobile phone. International Journal of Pervasive Computing and Communications. 6, 1\textendash23.
Phithakkitnukoon, S., Dantu, R. (2010). ContextAlert: Context-Aware Alert Mode Control for a Mobile Phone. 6(3), 25. International Journal of Pervasive Computing and Communications, Emerald Publishers. http://www.emeraldinsight.com/doi/abs/10.1108/17427371011084266?journalCode=ijpcc
Sroufe, P., Tate, S., Dantu, R., Celikel, E. (2010). Experiences During a Collegiate Cyber Defense Competition. 5(3), 382–396. Journal of Applied Security Research, Taylor & Francis Publications. https://libres.uncg.edu/ir/uncg/f/S_Tate_Experiences_2010.pdf
Fazen, M., Bhukari, M., Dantu, R. (2010). Safe Driving Using Mobile Phones. 13(2), 1462 - 1468. IEEE Transactions on Vehicular Technology. http://ieeexplore.ieee.org/document/6171850/
Gupta, N., Dantu, R., Schulzrinne, H., Magnussen, W. (2010). Next Generation 9-1-1: Architecture and challenges in realizing an IP-multimedia-based emergency service. 7(1), 12. Journal of Homeland Security and Emergency Management. https://www.degruyter.com/view/j/jhsem.2010.7.1/jhsem.2010.7.1.1657/jhsem.2010.7.1.1657.xml
Fagen, W., Cangussu, J., Dantu, R. (2009). A Virtual Environment for Network Testing. Journal of Networking and Computer Applications (JNCA). 32(1), 184-214. Elsevier.
Dantu, R., Schulzrinne, H., Fahmy, S., Cangussu, J. (2009). Issues and Challenges in Securing VoIP. Journal of Computers and Security. 743-753. Elsevier.
Holur, B., Dantu, R., Derrick, C. (2009). Method and system for managing wireless bandwidth resources. US: Cisco Technology Inc. https://patents.google.com/patent/US7539499B2/en
Dantu, R., Chiang, S., Yin, H., Kachhla, R. (2009). Method and system for providing wireless-specific services for a wireless access network. US: Cisco Technology Inc. https://patents.google.com/patent/US7639647/en
Phithakkitnukoon, S., Dantu, R. (2009). Mobile Social Group Sizes and Scaling Ratio. Journal of AI and Society. 15. Springer Verlag.
Dantu, R., Kolan, P., Cangussu, J. (2009). Network Risk Management using Attacker Profiling. Journal of Security and Communication Networks. 83-96. John Wiley and Sons.
Phithakkitnukoon, S., Dantu, R. (2009). Towards Ubiquitous Computing with Call Prediction. ACM SIGMOBILE Mobile Computing and Communications Review. 12.
Kolan, P., Dantu, R., Cangussu, J. (2009). Nuisance Level of a Voice Call. 5(1), 30. New York, NY: ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM). https://dl.acm.org/citation.cfm?id=1404886
Dantu, R. (2009). Network Risk Management using Attacker Profiling. 2(1), 83–96. Security and Communication Networks.
Dantu, R., Chiang, S., Yin, H., Kachhla, R. (2008). Method and system for providing supplementary services for a wireless access network. US: Cisco Technology Inc. https://patents.google.com/patent/US7444151/en
Dantu, R., Chiang, S., Yin, H., Kachhla, R. (2008). Method and system of control signaling for a wireless access network. US: Cisco Technology Inc. https://patents.google.com/patent/US7471674/en
Phithakkitnukoon, S., Dantu, R., Baatarjav, E. (2008). VoIP Security - Attacks and Solutions. 17(3), 114-123. The Information Security Journal: A Global Perspective. http://www.tandfonline.com/doi/abs/10.1080/19393550802308618
Guturu, P., Dantu, R. (2008). An Impatient Evolutionary Algorithm with Probabilistic Tabu Search for Unified Solution of Some NP Hard Problems in Graph and Set Theory via Clique Finding. 38(3), 645 - 666. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics). http://ieeexplore.ieee.org/document/4459184/
Palla, S., Dantu, R. (2008). Classification of Phishers. 5(1), 1-10. Journal of Homeland Security and Emergency Management. https://www.degruyter.com/view/j/jhsem.2008.5.1/jhsem.2008.5.1.1393/jhsem.2008.5.1.1393.xml
Palla, S., Dantu, R., Cangussu, Jo\~ao, (2008). Spam Classification Based on E-Mail Path Analysis. Other. 2, 46-69. https://ideas.repec.org/a/igg/jisp00/v2y2008i2p46-69.html
Palla, S., Dantu, R., Cangussu, J. (2008). Spam Classification Based on Email Path Analysis. 2(2), 46-69. New York: International Journal of Information Security and Privacy, IGN Publishing. https://www.igi-global.com/article/spam-classification-based-mail-path/2481
Haider, S. W., Cangussu, J., Cooper, K., Dantu, R. (2008). Estimation of Defects based on Defect Decay Model: ED3M. 34(3), 336 - 356. IEEE Transactions on Software Engineering. http://ieeexplore.ieee.org/document/4492790/
Dantu, R., Oosterwijk, H., Kolan, P., Husna, H. (2007). HIPAA: Securing Medical Networks. Network Security. 2007, 13\textendash16. http://dx.doi.org/10.1016/S1353-4858(07)70055-7
Dantu, R., Patel, P., Patel, P., Garbuz, A., Miernik, J., Patel, A., Holur, B. (2007). Method and system for providing services for wireless data calls. US: Cisco Technology Inc. https://patents.google.com/patent/US7225238/en
Dantu, R., Ester, G., O\textquoterightConnell, Pete, (2007). System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network. US: Alcatel SA. https://patents.google.com/patent/US7167443/en
Dantu, R., Cangussu, J. (2007). An Architecture for Automatic and Adaptive Defense. 3(2), 37-55. Georgia, USA: Journal of Information Security and Privacy, Ivy League Publishing. http://www.tandfonline.com/doi/abs/10.1080/15536548.2007.10855815
Dantu, R. (2007). Securing Medical Networks. (11), 13-16. Network Security. https://www.sciencedirect.com/science/article/pii/S1353485807700557
Dantu, R. (2007). Fast Worm Containment using Feedback Control. 4(2), 119-136. IEEE Transactions on Dependability and Secure Computing, Vol.5, No.2, pp. 119-136, April-June 2007; You do not have access to modify this field.IEEE Transactions on Dependability and Secure Computing. http://ieeexplore.ieee.org/document/4198177/
Dantu, R., Clothier, G., Atri, A. (2007). EAP Methods for Wireless Networks. 29(3), 289-301. International Journal of Computer Standards and Interfaces, Elsevier. https://www.sciencedirect.com/science/article/pii/S092054890600050X
Dantu, R. (2007). Socio-Technical Defense Against Voice Spamming. New York, NY: ACM Transactions on Autonomous and Adaptive Systems (TAAS). https://dl.acm.org/citation.cfm?id=1216897
Dantu, R. (2006). A Testbed for Research and Development For Securing Multimedia Communication Services. Snowbird, Utah: NSF Workshop on Computing Research Infrastructure.
Dantu, R. (2006). CISE and Global Implications. Snowbird, Utah: NSF Workshop on Computing Research Infrastructure.
Prasanna, V. I., Mikler, A. R., Dantu, R., Abbas, K. (2006). Dynamic resource management in QoS controlled networks. Telecommunications Systems. 32(1), 11–30. Springer Netherlands.
Patel, P., Choksi, O., Davidson, K., Dantu, R. (2006). Method and system for configuring wireless routers and networks. US: Cisco Technology Inc. https://patents.google.com/patent/US7031266/en
Alam, M., Dantu, R., Holur, B., Eyceoz, T. (2006). Quality indicator and method for frame selection in wireless network. US: Cisco Technology Inc. https://patents.google.com/patent/US7079512/en
Dantu, R., Davis, R., George, T. (2006). System and method for transporting in/ain signaling over an internet protocol (IP) network. US: Alcatel USA Sourcing LP. https://patents.google.com/patent/US7006433B1/en?oq=US7006433
Dantu, R. (2006). Top 3 challenges in VoIP Security and Management. Vancouver, BC, Canada: 1st IEEE International Workshop on VoIP Security and Management (VoIPMaSE).
Dantu, R., Patel, P., Choksi, O., Patel, A., Ali, M., Miernik, J., Holur, B. (2006). Wireless router and method for processing traffic in a wireless communications network. US: Cisco Technology Inc. https://patents.google.com/patent/US7068624B1/en
Sengar, H., Dantu, R., Wijesekera, D., Jajodia, S. (2006). SS7 Over IP: Signaling Interworking Vulnerabilities. 20(6), 32-41. IEEE Network. http://ieeexplore.ieee.org/document/4050028/
Dantu, R., Ghosal, D., Schulzrinne, H. (2006). Securing Voice over IP. 20(5), 4-5. IEEE Network. http://ieeexplore.ieee.org/document/1705876/
Dantu, R. (2005). Method and system of integrated rate control for a traffic flow across wireline and wireless networks. US: Cisco Technology Inc. https://patents.google.com/patent/US6904286B1/en
George, T., Bidulock, B., Dantu, R., Kalla, M., Schwarzbauer, H., Sidebottom, G., Morneault, K. (2005). Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) User Peer-to-Peer Adaptation Layer (M2PA). 1-52. IETF RFC 4165 (Internet Engineering Task Force). https://www.ietf.org/rfc/rfc4165.txt
Dantu, R., Oosterwijk, H. (2005). To Patch or Not to Patch. 48-49. Health Imaging and Technology News Magazine.
Dantu, R. (2005). Top Ten Recommendations for PACS Security Implementation. 1. Health Imaging & IT Magazine. http://www.healthimaging.com/topics/managing-technology
Yang, L., Dantu, R., Anderson, T., Gopal, R. (2004). Forwarding and Control Element Separation (ForCES) Framework. RFC Editor.
Yang, L., Dantu, R., Anderson, T. (2004). Framework and Architecture for separation of IP control and data elements. 40. IETF RFC 3746 (Internet Engineering Task Force). https://tools.ietf.org/html/rfc3746
Anderson, T., Bowen, E., Dantu, R., Doria, A., Gopal, R., Salim, J., Khosravi, H., Minhazuddin, M., Wasserman, M. (2003). Requirements for Separation of IP Control and Forwarding. RFC Editor.
Anderson, T., Bowen, E., Dantu, R., Doria, A., Gopal, R., Salim, J., Khosravi, H., Wasserman, M. (2003). Requirements for separation of IP control and data elements. 18. IETF RFC 365 (Internet Engineering Task Force). https://tools.ietf.org/html/rfc3654
Morneault, K., Dantu, R., Sidebottom, G., Bidulock, B., Heitz, J. (2002). Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Adaptation Layer. https://tools.ietf.org/html/rfc3331
Morneault, K., Dantu, R., Sidebottom, G., George, T., Bidulock, B., Heitz, J. (2002). M2PA: MTP2 User Adaptation Layer. Other. 94. https://www.ietf.org/rfc/rfc4165.txt
Jamoussi, B., Andersson, L., Callon, R., Dantu, R., Wu, L., Doolan, P., Worster, T., Feldman, N., Fredette, A., Girish, M., Gray, E., Heinanen, J., Kilt, T. (2002). Constraint-Based Label Switched Path Setup using Label Distribution Protocol. 42. IETF RFC 3212 (Internet Engineering Task Force). https://tools.ietf.org/html/rfc3212
Dantu, R., O\textquoterightConnell, Pete, (2001). System and method for packet level distributed routing in fiber optic rings. Alcatel USA Sourcing LP. https://worldwide.espacenet.com/publicationDetails/biblio?FT=D\&date=20010314\&DB=\&locale=en_EP\&CC=EP\&NR=1083696A2\&KC=A2\&ND=4
Dantu, R. (1998). ATM Forum Draft on OC-48c Physical Layer Specification.
Knitl, W., Dantu, R. (1998). ATM Forum Draft on QOS in MPOA, Multiprotocol Over ATM.
Dantu, R. (1997). ATM Forum Draft on I-PNNI Requirements.
Kumar, S., Dantu, R. (1997). The Era of Full Service Network. America's Network. 10-16.
Dantu, R., Dimopolous, N. J., Patel, R. V., Al-Khalili, A. J. (1994). Parallel Algorithms for Low Level Vision on the Homogeneous Multiprocessor. 20(1), 51-60. Journal of Computer & Electrical Engineering. https://www.sciencedirect.com/science/article/pii/004579069490006X?via%3Dihub
Dantu, R., Dimopolous, N. J., Patel, R. V., Al-Khalili, A. J. (1992). Depth perception using blurring and its application in VLSI wafer probing. 5(1), 35-45. Springer-Verlag: Journal of Machine Vision and Application. https://link.springer.com/article/10.1007%2FBF01213528
Dimopolous, N. J., Li, K. F., Wong, E. C., Dantu, R., Atwood, A. J. (1989). Homogeneous multiprocessor system: a status report. Journal of Computer Systems Science, and Engineering. 4(4), 227-239.
Dantu, R. (1989). Micro-manipulator Vision for Wafer Probing. 2(3), 114 - 117. IEEE Transactions on Semiconductor Manufacturing. http://ieeexplore.ieee.org/document/29680/
Master's Thesis
Zhang, H., Dantu, R. (2010). Socioscope: Human Relationship and Behavior Analysis in Mobile Social Networks. Denton, TX, USA: University of North Texas.
Patents
Dantu, R. (2016). Method and Systems for Remote Expert Assistance(Principal Inventor). Provisional Application UNTD-0099PRO (122302.222), Application No. 62437182.
Dantu, R. (2016). Methods and Systems for Mobile CPR Assistance(Principal Inventor). Provisional 62/420,888 Patent Application UNTD-0096PRO (122302.00217), Application No. 62420,888.
Dantu, R. (2016). Methods and Systems for Mobile Monitoring and Analysis of Heart Sounds(Principal Inventor). Provisional Application UNTD-0097PRO(122302.218), Application No. 62420,912.
Dantu, R., Gupta, N., Chandrasekharan, V. (2016). 911 Services and Vital Sign Measurement Utilizing Mobile Phone Sensors and Applications(Principal Inventor). US Patent 9,485,345 granted.
Dantu, R., Gupta, N., Chandrasekharan, V. (2016). 911 Services and Vital Sign Measurement Utilizing Mobile Phone Sensors and Applications(Principal Inventor). Provisional patent for adding claims for the chest sounds for the U.S. Patent Application Serial No. 13/623,273, (Dantu_R03(b)- UNTD-0063D1 (122302.213),.
Dantu, R., Gupta, N., Dantu, V., Morgan, Z. (2014). Effective CPR Procedure with Real Time Evaluation & Feedback(Principal Inventor). UNTD-0085PRO (122302.188).
Dantu, R. (2011). System and Method for Measuring Heart Rate, Respiratory Rate, Blood Pressure and CPR (Principal Inventor). US patent.
Dantu, R. (2011). System and Method for alerts during Unsafe Driving and a Data Recorder (Black Box) for Automobiles (Principal Inventor). US patent.
Dantu, R. (2011). System and Method for Navigation and Location Finding for Blind and Visually Impaired Using Mobile Phones (Principal Inventor). US patent.
Dantu, R. (2010). Method and system for configuring wireless routers and networks, Application, Co-Inventor. US Patent 7,826,463.
Dantu, R. (2009). Method and system for providing wireless-specific services for a wireless access network, Principal Inventor. US Patent 7,639,647.
Dantu, R. (2009). Method and system for managing wireless bandwidth resources, Co-Inventor. US Patent 7,539,499.
Dantu, R. (2008). Method and system of control signaling for a wireless access network, Principal Inventor. US Patent 7,471,674.
Dantu, R. (2008). Method and system for providing supplementary services for a wireless access network, Principal Inventor. US Patent, 7,444,151.
Dantu, R. (2007). Method and system for redundancy scheme for Network Processor Systems, Co-Inventor. US Patent, 7,272,746.
Dantu, R. (2007). Method and system for providing services for wireless data calls, Principal Inventor. US Patent, 7,225,238.
Dantu, R. (2007). Method and system of control signaling for a wireless access network, Principal Inventor. US Patent 7,173,925.
Dantu, R. (2007). System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network, Principal Inventor. US Patent 7,167,443.
Dantu, R. (2007). Method and system for providing supplementary services for a wireless access network, Principal Inventor. US Patent 7,164,913.
Dantu, R. (2006). Quality indicator and method for frame selection in wireless network, Co-Inventor. US Patent, 7,079,512.
Dantu, R. (2006). Wireless router and method for processing traffic in a wireless communications network, Principal Inventor. US Patent, 7,068,624.
Dantu, R. (2006). Method and system for providing wireless-specific services for a wireless access network, Principal Inventor. US Patent, 7, 058, 033.
Dantu, R. (2006). Method and system for configuring wireless routers and networks, Co-Inventor. US Patent, 7,031,266.
Dantu, R. (2006). System and method for transporting in/ain signaling over an internet protocol (IP) network, Principal Inventor. US Patent, 7,006,433.
Dantu, R. (2005). Method and system for managing wireless bandwidth resources, Co-Inventor. US Patent, 6,957,071.
Dantu, R. (2005). Method and system of integrated rate control for a traffic flow across wireline and wireless networks, Principal Inventor. US Patent, 6,904,286.
Dantu, R. (2003). System and Method for Packet Level Distributed Routing in Fiber Optic Rings, Principal Inventor. US Patent 6,532,088.
Dantu, R. (2001). Method and Apparatus for Transport of SS7 Messages Over IP Network, Principal Inventor. European Patent, EP1089575.
Dantu, R. (2001). System and Method for Packet Level Distributed Routing in Fiber Optic Rings, Principal Inventor. European Patent, EP1083696.
Dantu, R. (2001). System and Method for Packet Level Restoration of IP Traffic Using Overhead Signaling in a Fiber Optic Ring Network, Principal Inventor. European Patent, EP1083706.
Technical Report
Jonnada, S., Dantu, R., Ranasinghe, I., Widick, L., Thompson, M. A., Hauge, J. A. (2020). Cyber-Human System for Remote Collaborators. (arXiv:2009.03143), 38. New York: Cornell University arXivLabs.
Zaccagni, Z., Dantu, R. (2020). A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews. 50. International Journal of Cryptographic Research.
Dantu, R., Bajwa, G., Mohammed, F. (2019). Detecting driver distraction using stimuli-response EEG analysis. Computer Report. abs/1904.09100, 40 pages. New York: Cornell University.

Awarded Grants

Contracts, Grants and Sponsored Research

Contract
Dantu, R. (Principal), Thompson, M. A. (Co-Principal), "2020 Center of Academic Excellence in Cybersecurity Program: Flowthrough Grant from National Security Agency/Fordham University for Enhancing Diversity in Cybersecurity Education," Sponsored by National Security Agency (NSA), Federal, $221387 Funded. (September 18, 2020September 30, 2022).
Dantu, R. (Principal), Thompson, M. A. (Co-Principal), ": 2020 Center for Academic Excellence in Cybersecurity Program: Flowthrough Grant from National Security Agency/Fordham for Mentoring PhD Students and Professors of Practice," Sponsored by National Security Agency (NSA), Federal, $235558 Funded. (September 30, 2020September 29, 2020).
Grant - Research
Bhowmick, S. (Co-Principal), Dantu, R. (Principal), Morozov, K., "Locating Super-Spreaders Through Partnership of Anonymization and Encryption," Sponsored by NSA, Federal, $299944 Funded. (20202022).
Dantu, R., Thompson, M. A. (Co-Principal), "2020 Department of Defense Cyber Scholarship Grant: Development of Competency Tools for Work-Skill-Readiness in Cybersecurity," Sponsored by National Security Agency (NSA), Federal, $200000 Funded. (September 16, 2020December 30, 2021).
Dantu, R. (Principal), "NSF: CNS: Transformative Emergency Dispatch Protocols for a Sixty Second Response," Sponsored by NSF Research Grant (PI: Ram Dantu), Federal, $250002 Funded. (September 01, 2016August 31, 2018).
Tam, N. D. (Co-Principal), Dantu, R. (Principal), "MRI: CloudCar: Development of a Diverse Distributed Instrument for Vehicles in the Cloud," Sponsored by NSF, Federal, $500000 Funded. (September 1, 2012August 31, 2018).
Dantu, R. (Principal), "SFS-NEW: Advancing Learning and Leadership Through an Integrated Multidisciplinary Doctoral Program in Information Assurance," Sponsored by NSF Research Grant (PI: Ram Dantu, Co-PIs: Suliman Hawamdeh and Dan Kim), Federal, $1200070 Funded. (September 01, 2012August 31, 2018).
Dantu, R. (Principal), "EAGER: Mobile Solutions for Multifold Increase of Survival Rates Through High Quality Chest Compressions," Sponsored by NSF Research Grant, Federal, $140845 Funded. (September 01, 2015August 31, 2017).
Dantu, R. (Principal), "CloudCar: Development of a Diverse Distributed Instrument for Vehicles in the Cloud," Sponsored by NSF Research Grant (PI: Ram Dantu, Co-PIs: Sanjay Sarma of MIT and David Tam of UNT), Federal, $500000 Funded. (September 01, 2012August 31, 2017).
Thompson, M. A., Dantu, R., "SFS-NEW: Advancing Learning and Leadership Through an Integrated Multidisciplinary Doctoral Program in Information Assurance," Sponsored by NSF, Federal, $16000 Funded. (July 2016June 2017).
Dantu, R. (Principal), "Hot Topics in Network Security," Sponsored by Industry Gift for Research, International, $3000 Funded. (March 2015).
Guturu, P. (Co-Principal), Dantu, R. (Principal), Kavi, K. M. (Co-Principal), "Collaborative Research: CRI: IAD: A Testbed for Research and Development of Next Generation 9-1-1 Services," Sponsored by NSF, Federal, $385000 Funded. (September 01, 2008August 31, 2014).
Guturu, P. (Co-Principal), Dantu, R. (Principal), Kavi, K. M. (Co-Principal), "MRI: Development of a Flexible Instrument and Tools for Experimental Research in Next-Generation 9-1-1 Services," Sponsored by NSF, Federal, $400000 Funded. (August 1, 2008July 31, 2013).
Dantu, R. (Principal), "I-Corps: Mobile Life Guard," Sponsored by NSF Research Grant (PI: Ram Dantu, sole PI), Federal, $50000 Funded. (20112012).
Dantu, R. (Principal), "RET: Development of Next Generation 9-1-1 Services," Sponsored by NSF Research Grant, International, $24000 Funded. (20102012).
Dantu, R. (Principal), "NSF: CNS: A Testbed for Research and Development of Next Generation 9-1-1 Services (Collaborative research with Columbia University and Texas A & M)," Sponsored by NSF Research Grant (PI: Ram Dantu, Co-PIs: Henning Schulzrinne, Walt Magnussen, Ana Goulart, and Guy Almes, Parthasarathy Guturu, and Krishna Kavi), State, $1342000 Funded. (20082012).
Dantu, R. (Principal), "NSF: CNS: MRI: Development of a Flexible Instrument and Tools for Experimental Research in Next-Generation 9-1-1 Services (PI: Ram Dantu, Co-PIs: Parthasarthy Guturu and Krishna Kavi)," Sponsored by NSF Research Grant, State, $500000 Funded. (20082011).
Dantu, R. (Principal), "Collaborative Research: CRI: A Testbed for Research and Development of Secure IP Multimedia Communication Services (collaborative proposal with Columbia University, Purdue University, and University of California at Davis)," Sponsored by NSF Research Grant, State, $600000 Funded. (20062010).
Dantu, R. (Principal), "CT-ER: Collaborative Research: Detecting Spam in IP Multimedia Communication Services (in collaboration with Columbia University)," Sponsored by NSF Research Grant, State, $253516 Funded. (20062009).
Dantu, R. (Principal), "MRI: Development of a Flexible Platform for Experimental Research in Secure IP Multimedia Communication Services," Sponsored by NSF Research Grant, State, $300000 Funded. (20062009).
Dantu, R. (Principal), "SGER: Preventing Voice Spamming," Sponsored by Cyber Trust: NSF Research Grant, State, $60150 Funded. (20052006).
Dantu, R. (Principal), "Building Network Security through Feedback Control," Sponsored by Faculty Research Grant, State, $5000 Funded. (20052005).
Dantu, R. (Other), "Detecting Phishing in E-mails," Sponsored by Faculty Research Grant, State, $5000 Funded. (20052005).
Dantu, R. (Principal), "Gift for research in VoIP Security," Sponsored by Industry Research Grant: Lucent, TekVizion, Nexttone Communication, Juniper Networks, Kayote Networks, VoIP Shield, BearingPoint, and Qovia Solutions Group, Other, $18000 Funded. (20052005).
Dantu, R. (Principal), "Attack Containment using Feedback Control," Sponsored by Faculty Research Grant (for new faculty), State, $5000 Funded. (20042004).
Dantu, R. (Other), "Dynamic Control of Worm Propagation," Sponsored by Faculty Research Grant (for new faculty), State, $2000 Funded. (20042004).
Dantu, R. (Other), "Hospital Network Security," Sponsored by Industry Research Grant, OTech Inc., Other, $10000 Funded. (20042004).
Dantu, R. (Principal), "Building Network Security through Feedback Control," Sponsored by Faculty Research Grant (for new faculty), State, $5000 Funded. (20032003).
Dantu, R. (Principal), "Collaborative Image Composition in Environmental Engineering," Sponsored by Faculty Research Grant (for new faculty), State, $2500 Funded. (20032003).
Grant - Teaching
Dantu, R., "Soft Skill and Career Readiness for Students," Sponsored by State Farm Insurance Company, National, $16000 Funded. (August 2019August 2020).
Dantu, R. (Co-Principal), Do, H. (Co-Principal), Keathly, D. (Co-Principal), Sweany, P. H. (Co-Principal), Thompson, M. A. (Co-Principal), "Multifaceted Outreach Program for Students, Teachers, and Professionals," Sponsored by StateFarm, University of North Texas, $24000 Funded. (September 2017August 2018).
Dantu, R. (Principal), "Collaborative Project: A Regional Partnership to Build and Strengthen IA in North Texas," Sponsored by NSF Educational Grant, State, $247183 Funded. (20062008).
Dantu, R. (Co-Principal), "Kits for DSP Lab (TMS 3200-6411hardware + software)," Sponsored by TI DSP University Program. Equipment Donation Program, State, $60000 Funded. (20032003).
,
Overall
Summative Rating
Challenge and
Engagement Index
Response Rate

out of 5

out of 7
%
of
students responded
  • Overall Summative Rating (median):
    This rating represents the combined responses of students to the four global summative items and is presented to provide an overall index of the class’s quality. Overall summative statements include the following (response options include a Likert scale ranging from 5 = Excellent, 3 = Good, and 1= Very poor):
    • The course as a whole was
    • The course content was
    • The instructor’s contribution to the course was
    • The instructor’s effectiveness in teaching the subject matter was
  • Challenge and Engagement Index:
    This rating combines student responses to several SPOT items relating to how academically challenging students found the course to be and how engaged they were. Challenge and Engagement Index items include the following (response options include a Likert scale ranging from 7 = Much higher, 4 = Average, and 1 = Much lower):
    • Do you expect your grade in this course to be
    • The intellectual challenge presented was
    • The amount of effort you put into this course was
    • The amount of effort to succeed in this course was
    • Your involvement in course (doing assignments, attending classes, etc.) was
CLOSE