|
Search the dblp DataBase
Ram Dantu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ram Dantu, João W. Cangussu
An Architecture for Network Security Using Feedback Control. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:636-637 [Conf]
- Ram Dantu, João W. Cangussu, Janos Turi
Sensitivity Analysis of an Attack Containment Model. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:127-138 [Conf]
- Ram Dantu, Prakash Kolan
Risk Management Using Behavior Based Bayesian Networks. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:115-126 [Conf]
- Ram Dantu, João W. Cangussu, Arun Yelimeli
Dynamic Control of Worm Propagation. [Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:419-423 [Conf]
- Ram Dantu, Sachin P. Joglekar
Collaborative Vision using Networked Sensors. [Citation Graph (0, 0)][DBLP] ITCC (2), 2004, pp:395-399 [Conf]
- Ram Dantu, Kall Loper, Prakash Kolan
Risk Management using Behavior based Attack Graphs. [Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:445-449 [Conf]
- Venkatesan Prasanna, Armin R. Mikler, Ram Dantu, Kaja Abbas
Dynamic resource management in QoS controlled networks. [Citation Graph (0, 0)][DBLP] Telecommunication Systems, 2006, v:32, n:1, pp:11-30 [Journal]
- Ram Dantu, Prakash Kolan, Robert Akl, Kall Loper
Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. [Citation Graph (0, 0)][DBLP] ISI, 2007, pp:71-74 [Conf]
- Santi Phithakkitnukoon, Ram Dantu
Predicting Calls - New Service for an Intelligent Phone. [Citation Graph (0, 0)][DBLP] MMNS, 2007, pp:26-37 [Conf]
- Ram Dantu, João W. Cangussu, Sudeep Patwardhan
Fast Worm Containment Using Feedback Control. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:2, pp:119-136 [Journal]
- Prakash Kolan, Ram Dantu
Socio-technical defense against voice spamming. [Citation Graph (0, 0)][DBLP] TAAS, 2007, v:2, n:1, pp:- [Journal]
Penetration Testing for Spam Filters. [Citation Graph (, )][DBLP]
Unwanted SMTP Paths and Relays. [Citation Graph (, )][DBLP]
Quantifying presence using calling patterns. [Citation Graph (, )][DBLP]
Automatic Calibration Using Receiver Operating Characteristics Curves. [Citation Graph (, )][DBLP]
Behavior analysis of spam botnets. [Citation Graph (, )][DBLP]
Privacy Management for Facebook. [Citation Graph (, )][DBLP]
Experiences in building a multi-university testbed for research in multimedia communications. [Citation Graph (, )][DBLP]
Group Recommendation System for Facebook. [Citation Graph (, )][DBLP]
Inferring Social Groups Using Call Logs. [Citation Graph (, )][DBLP]
CPL: Enhancing Mobile Phone Functionality by Call Predicted List. [Citation Graph (, )][DBLP]
Discovery of Social Groups Using Call Detail Records. [Citation Graph (, )][DBLP]
Email Shape Analysis. [Citation Graph (, )][DBLP]
Are You a Safe Driver? [Citation Graph (, )][DBLP]
iKnow Where You Are. [Citation Graph (, )][DBLP]
Quantifying Reciprocity in Social Networks. [Citation Graph (, )][DBLP]
Search in 0.129secs, Finished in 0.130secs
|