SoK: a comprehensive reexamination of phishing research from the security perspective A Das, S Baki, A El Aassal, R Verma, A Dunbar IEEE Communications Surveys & Tutorials 22 (1), 671-708, 2019 | 150 | 2019 |
An in-depth benchmarking and evaluation of phishing detection research for security needs A El Aassal, S Baki, A Das, RM Verma Ieee Access 8, 22170-22192, 2020 | 117 | 2020 |
Scaling and effectiveness of email masquerade attacks: Exploiting natural language generation S Baki, R Verma, A Mukherjee, O Gnawali Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 54 | 2017 |
Sixteen years of phishing user studies: What have we learned? S Baki, RM Verma IEEE Transactions on Dependable and Secure Computing 20 (2), 1200-1212, 2022 | 44 | 2022 |
University of Houston at CL-SciSumm 2016: SVMs with tree kernels and Sentence Similarity L Moraes, S Baki, R Verma, D Lee proceedings of the joint workshop on bibliometric-enhanced information …, 2016 | 27 | 2016 |
Anti-Phishing Pilot at ACM IWSPA 2018 Evaluating Performance with New Metrics for Unbalanced Datasets A El Aassal, L Moraes, S Baki, A Das, R Verma Proceedings of the 1st AntiPhishing Shared Pilot at 4th ACM International …, 2018 | 26 | 2018 |
Diverse datasets and a customizable benchmarking framework for phishing V Zeng, S Baki, AE Aassal, R Verma, LFT De Moraes, A Das Proceedings of the Sixth International Workshop on Security and Privacy …, 2020 | 20 | 2020 |
Avisha Das, and Rakesh M A El Aassal, S Baki Verma." An in-depth benchmarking and evaluation of phishing detection …, 2020 | 11 | 2020 |
IWSPA-AP: Anti-phising Shared Task at ACM International Workshop on Security and Privacy Analytics A Elaassal, A Das, S Baki, L De Moraes, R Verma In Proceedings of the 1st IWSPA Anti-Phishing Shared Task. CEUR, 2018 | 10* | 2018 |
Scam augmentation and customization: Identifying vulnerable users and arming defenders S Baki, RM Verma, O Gnawali Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 7 | 2020 |
PhishBench 2.0: a versatile and extendable benchmarking framework for phishing V Zeng, X Zhou, S Baki, RM Verma Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 6 | 2020 |
Identifying reference spans: topic modeling and word embeddings help IR L Moraes, S Baki, R Verma, D Lee International Journal on Digital Libraries 19, 191-202, 2018 | 6 | 2018 |
Avisha Das, and Rakesh Verma. 2020. An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs A El Aassal, S Baki IEEE Access, 2020 | 5 | 2020 |
Mining the Web for Collocations: IR Models of Term Associations R Verma, V Vuppuluri, A Nguyen, A Mukherjee, G Mammar, S Baki, ... International Conference on Intelligent Text Processing and Computational …, 2016 | 5 | 2016 |
Less is more: Exploiting social trust to increase the effectiveness of a deception attack S Baki, RM Verma, A Mukherjee, O Gnawali arXiv preprint arXiv:2006.13499, 2020 | 3 | 2020 |
ICE: Idiom and collocation extractor for research and education V Vuppuluri, S Baki, A Nguyen, R Verma Proceedings of the Software Demonstrations of the 15th Conference of the …, 2017 | 2 | 2017 |
You Are Not Alone: Helping Users Not to Fall For Phishing S Baki | 1 | 2020 |
Real-Time, Evidence-Based Alerts for Protection from Phishing Attacks S Baki, FZ Qachfar, RM Verma, R Kennedy, DN Jones IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |