Detecting phishing emails the natural language way R Verma, N Shashidhar, N Hossain Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 122 | 2012 |
Automatic phishing email detection based on natural language processing techniques R Verma, NK Shashidhar, N Hossain US Patent App. 14/015,524, 2015 | 97 | 2015 |
Do Private and Portable Web Browsers Leave Incriminating Evidence? D Ohana, N Shashidhar The IEEE Computer Society's Security and Privacy Workshops (SPW 2013), 2013 | 93* | 2013 |
Automatic phishing email detection based on natural language processing techniques R Verma, NK Shashidhar, N Hossain, N Rai US Patent 10,404,745, 2019 | 92 | 2019 |
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges L Chen, L Xu, X Yuan, N Shashidhar 2015 International Conference on Computing, Networking and Communications …, 2015 | 43 | 2015 |
Scalable secure MJPEG video streaming L Chen, N Shashidhar, Q Liu 2012 26th International Conference on Advanced Information Networking and …, 2012 | 36 | 2012 |
Digital forensic analysis on prefetch files N Shashidhar, D Novak International Journal of Information Security Science 4 (2), 39-49, 2015 | 30 | 2015 |
Using ITIL 4 in security management D Berger, N Shashidhar, C Varol 2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020 | 20 | 2020 |
Tampering with special purpose trusted computing devices: A case study in optical scan e-voting A Kiayias, L Michel, A Russell, N Shashidhar, A See, A Shvartsman, ... Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 20 | 2007 |
An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal. A Kiayias, L Michel, A Russell, N Sashidar, A See, AA Shvartsman EVT, 2007 | 19 | 2007 |
Ransomware analysis and defense-wannacry and the win32 environment J Jones International Journal of Information Security Science 6 (4), 57-69, 2017 | 17 | 2017 |
Deception detection using machine learning AA Ceballos Delgado, W Glisson, N Shashidhar, J Mcdonald, G Grispos, ... | 16 | 2021 |
Security assessment of the Diebold optical scan voting terminal A Kiayias, L Michel, A Russell, AA Shvartsman, UCVTR Center, ... UConn Voting Technology Research (VoTeR) Center, 2006 | 16 | 2006 |
Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools A Neyaz, N Shashidhar, C Varol, A Rasheed 2022 10th International Symposium on Digital Forensics and Security (ISDFS …, 2022 | 15 | 2022 |
Two-pronged phish snagging R Verma, N Shashidhar, N Hossain 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 14 | 2012 |
Taking total control of voting systems: Firmware manipulations on an optical scan voting terminal S Davtyan, S Kentros, A Kiayias, L Michel, N Nicolaou, A Russell, A See, ... Proceedings of the 2009 ACM symposium on Applied Computing, 2049-2053, 2009 | 14 | 2009 |
Interplay of digital forensics in ediscovery S Krishnan, N Shashidhar International Journal of Computer Science and Security (IJCSS) 15 (2), 19, 2021 | 13 | 2021 |
Forensic analysis of wear leveling on solid-state media A Neyaz, N Shashidhar, U Karabiyik 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 12 | 2018 |
Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console L Chen, N Shashidhar, D Rawat, M Yang, C Kadlec 2016 International Conference on Computing, Networking and Communications …, 2016 | 11 | 2016 |
A phishing model and its applications to evaluating phishing attacks N Shashidhar, L Chen School of Computer and Information Science, Security Research Centre, Edith …, 2011 | 9 | 2011 |