Detecting phishing emails the natural language way R Verma, N Shashidhar, N Hossain Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 115 | 2012 |
Do Private and Portable Web Browsers Leave Incriminating Evidence? D Ohana, N Shashidhar The IEEE Computer Society's Security and Privacy Workshops (SPW 2013), 2013 | 93* | 2013 |
Automatic phishing email detection based on natural language processing techniques R Verma, NK Shashidhar, N Hossain US Patent App. 14/015,524, 2015 | 91 | 2015 |
Automatic phishing email detection based on natural language processing techniques R Verma, NK Shashidhar, N Hossain, N Rai US Patent 10,404,745, 2019 | 81 | 2019 |
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges L Chen, L Xu, X Yuan, N Shashidhar 2015 International Conference on Computing, Networking and Communications …, 2015 | 42 | 2015 |
Scalable secure MJPEG video streaming L Chen, N Shashidhar, Q Liu 2012 26th International Conference on Advanced Information Networking and …, 2012 | 35 | 2012 |
Digital forensic analysis on prefetch files N Shashidhar, D Novak International Journal of Information Security Science 4 (2), 39-49, 2015 | 29 | 2015 |
Tampering with special purpose trusted computing devices: A case study in optical scan e-voting A Kiayias, L Michel, A Russell, N Shashidhar, A See, A Shvartsman, ... Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 20 | 2007 |
An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal. A Kiayias, L Michel, A Russell, N Sashidar, A See, AA Shvartsman EVT, 2007 | 19 | 2007 |
Using ITIL 4 in security management D Berger, N Shashidhar, C Varol 2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020 | 18 | 2020 |
Ransomware analysis and defense-wannacry and the win32 environment J Jones International Journal of Information Security Science 6 (4), 57-69, 2017 | 16 | 2017 |
Security assessment of the Diebold optical scan voting terminal A Kiayias, L Michel, A Russell, AA Shvartsman, UCVTR Center, ... UConn Voting Technology Research (VoTeR) Center, 2006 | 16 | 2006 |
Two-pronged phish snagging R Verma, N Shashidhar, N Hossain 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 14 | 2012 |
Taking total control of voting systems: Firmware manipulations on an optical scan voting terminal S Davtyan, S Kentros, A Kiayias, L Michel, N Nicolaou, A Russell, A See, ... Proceedings of the 2009 ACM symposium on Applied Computing, 2049-2053, 2009 | 14 | 2009 |
Interplay of digital forensics in ediscovery S Krishnan, N Shashidhar International Journal of Computer Science and Security (IJCSS) 15 (2), 19, 2021 | 12 | 2021 |
Deception detection using machine learning AA Ceballos Delgado, W Glisson, N Shashidhar, J Mcdonald, G Grispos, ... | 12 | 2021 |
Forensic analysis of wear leveling on solid-state media A Neyaz, N Shashidhar, U Karabiyik 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 12 | 2018 |
Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console L Chen, N Shashidhar, D Rawat, M Yang, C Kadlec 2016 International Conference on Computing, Networking and Communications …, 2016 | 10 | 2016 |
A phishing model and its applications to evaluating phishing attacks N Shashidhar, L Chen School of Computer and Information Science, Security Research Centre, Edith …, 2011 | 9 | 2011 |
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards. S Davtyan, S Kentros, A Kiayias, L Michel, NC Nicolaou, A Russell, A See, ... EVT, 2008 | 9 | 2008 |