关注
Shahryar Baki
Shahryar Baki
Research Assistant, University of Houston
在 uh.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
SoK: a comprehensive reexamination of phishing research from the security perspective
A Das, S Baki, A El Aassal, R Verma, A Dunbar
IEEE Communications Surveys & Tutorials 22 (1), 671-708, 2019
1502019
An in-depth benchmarking and evaluation of phishing detection research for security needs
A El Aassal, S Baki, A Das, RM Verma
Ieee Access 8, 22170-22192, 2020
1172020
Scaling and effectiveness of email masquerade attacks: Exploiting natural language generation
S Baki, R Verma, A Mukherjee, O Gnawali
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
542017
Sixteen years of phishing user studies: What have we learned?
S Baki, RM Verma
IEEE Transactions on Dependable and Secure Computing 20 (2), 1200-1212, 2022
442022
University of Houston at CL-SciSumm 2016: SVMs with tree kernels and Sentence Similarity
L Moraes, S Baki, R Verma, D Lee
proceedings of the joint workshop on bibliometric-enhanced information …, 2016
272016
Anti-Phishing Pilot at ACM IWSPA 2018 Evaluating Performance with New Metrics for Unbalanced Datasets
A El Aassal, L Moraes, S Baki, A Das, R Verma
Proceedings of the 1st AntiPhishing Shared Pilot at 4th ACM International …, 2018
262018
Diverse datasets and a customizable benchmarking framework for phishing
V Zeng, S Baki, AE Aassal, R Verma, LFT De Moraes, A Das
Proceedings of the Sixth International Workshop on Security and Privacy …, 2020
202020
Avisha Das, and Rakesh M
A El Aassal, S Baki
Verma." An in-depth benchmarking and evaluation of phishing detection …, 2020
112020
IWSPA-AP: Anti-phising Shared Task at ACM International Workshop on Security and Privacy Analytics
A Elaassal, A Das, S Baki, L De Moraes, R Verma
In Proceedings of the 1st IWSPA Anti-Phishing Shared Task. CEUR, 2018
10*2018
Scam augmentation and customization: Identifying vulnerable users and arming defenders
S Baki, RM Verma, O Gnawali
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
72020
PhishBench 2.0: a versatile and extendable benchmarking framework for phishing
V Zeng, X Zhou, S Baki, RM Verma
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
62020
Identifying reference spans: topic modeling and word embeddings help IR
L Moraes, S Baki, R Verma, D Lee
International Journal on Digital Libraries 19, 191-202, 2018
62018
Avisha Das, and Rakesh Verma. 2020. An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs
A El Aassal, S Baki
IEEE Access, 2020
52020
Mining the Web for Collocations: IR Models of Term Associations
R Verma, V Vuppuluri, A Nguyen, A Mukherjee, G Mammar, S Baki, ...
International Conference on Intelligent Text Processing and Computational …, 2016
52016
Less is more: Exploiting social trust to increase the effectiveness of a deception attack
S Baki, RM Verma, A Mukherjee, O Gnawali
arXiv preprint arXiv:2006.13499, 2020
32020
ICE: Idiom and collocation extractor for research and education
V Vuppuluri, S Baki, A Nguyen, R Verma
Proceedings of the Software Demonstrations of the 15th Conference of the …, 2017
22017
You Are Not Alone: Helping Users Not to Fall For Phishing
S Baki
12020
Real-Time, Evidence-Based Alerts for Protection from Phishing Attacks
S Baki, FZ Qachfar, RM Verma, R Kennedy, DN Jones
IEEE Transactions on Dependable and Secure Computing, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–18