The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ram Dantu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ram Dantu, João W. Cangussu
    An Architecture for Network Security Using Feedback Control. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:636-637 [Conf]
  2. Ram Dantu, João W. Cangussu, Janos Turi
    Sensitivity Analysis of an Attack Containment Model. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:127-138 [Conf]
  3. Ram Dantu, Prakash Kolan
    Risk Management Using Behavior Based Bayesian Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:115-126 [Conf]
  4. Ram Dantu, João W. Cangussu, Arun Yelimeli
    Dynamic Control of Worm Propagation. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:419-423 [Conf]
  5. Ram Dantu, Sachin P. Joglekar
    Collaborative Vision using Networked Sensors. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:395-399 [Conf]
  6. Ram Dantu, Kall Loper, Prakash Kolan
    Risk Management using Behavior based Attack Graphs. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:445-449 [Conf]
  7. Venkatesan Prasanna, Armin R. Mikler, Ram Dantu, Kaja Abbas
    Dynamic resource management in QoS controlled networks. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2006, v:32, n:1, pp:11-30 [Journal]
  8. Ram Dantu, Prakash Kolan, Robert Akl, Kall Loper
    Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:71-74 [Conf]
  9. Santi Phithakkitnukoon, Ram Dantu
    Predicting Calls - New Service for an Intelligent Phone. [Citation Graph (0, 0)][DBLP]
    MMNS, 2007, pp:26-37 [Conf]
  10. Ram Dantu, João W. Cangussu, Sudeep Patwardhan
    Fast Worm Containment Using Feedback Control. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:2, pp:119-136 [Journal]
  11. Prakash Kolan, Ram Dantu
    Socio-technical defense against voice spamming. [Citation Graph (0, 0)][DBLP]
    TAAS, 2007, v:2, n:1, pp:- [Journal]

  12. Penetration Testing for Spam Filters. [Citation Graph (, )][DBLP]


  13. Unwanted SMTP Paths and Relays. [Citation Graph (, )][DBLP]


  14. Quantifying presence using calling patterns. [Citation Graph (, )][DBLP]


  15. Automatic Calibration Using Receiver Operating Characteristics Curves. [Citation Graph (, )][DBLP]


  16. Behavior analysis of spam botnets. [Citation Graph (, )][DBLP]


  17. Privacy Management for Facebook. [Citation Graph (, )][DBLP]


  18. Experiences in building a multi-university testbed for research in multimedia communications. [Citation Graph (, )][DBLP]


  19. Group Recommendation System for Facebook. [Citation Graph (, )][DBLP]


  20. Inferring Social Groups Using Call Logs. [Citation Graph (, )][DBLP]


  21. CPL: Enhancing Mobile Phone Functionality by Call Predicted List. [Citation Graph (, )][DBLP]


  22. Discovery of Social Groups Using Call Detail Records. [Citation Graph (, )][DBLP]


  23. Email Shape Analysis. [Citation Graph (, )][DBLP]


  24. Are You a Safe Driver? [Citation Graph (, )][DBLP]


  25. iKnow Where You Are. [Citation Graph (, )][DBLP]


  26. Quantifying Reciprocity in Social Networks. [Citation Graph (, )][DBLP]


Search in 0.129secs, Finished in 0.130secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002