An efficient multiversion access structure PJ Varman, RM Verma Knowledge and Data Engineering, IEEE Transactions on 9 (3), 391-409, 1997 | 177 | 1997 |
SoK: a comprehensive reexamination of phishing research from the security perspective A Das, S Baki, A El Aassal, R Verma, A Dunbar IEEE Communications Surveys & Tutorials 22 (1), 671-708, 2019 | 157 | 2019 |
Detecting Phishing Emails the Natural Language Way R Verma, N Shashidhar, N Hossain European Symp. on Research in Computer Security, 824-841, 2012 | 125 | 2012 |
On the character of phishing URLs: Accurate and robust statistical learning classifiers R Verma, K Dyer Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 124 | 2015 |
An in-depth benchmarking and evaluation of phishing detection research for security needs A El Aassal, S Baki, A Das, RM Verma IEEE Access 8, 22170-22192, 2020 | 121 | 2020 |
What's in a URL: Fast Feature Extraction and Malicious URL Detection R Verma, A Das IWSPA, 2017 | 111 | 2017 |
Automatic phishing email detection based on natural language processing techniques R Verma, NK Shashidhar, N Hossain US Patent App. 14/015,524, 2015 | 94 | 2015 |
Machine Learning Methods for Software Vulnerability Detection B Chernis, R Verma Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018 | 92 | 2018 |
Automatic phishing email detection based on natural language processing techniques R Verma, NK Shashidhar, N Hossain, N Rai US Patent 10,404,745, 2019 | 83 | 2019 |
The embodied nature of narrative knowledge: A cross-study analysis of embodied knowledge in teaching, learning, and life CJ Craig, JA You, Y Zou, R Verma, D Stokes, P Evans, G Curtis Teaching and Teacher Education 71, 329-340, 2018 | 79 | 2018 |
Combining syntax and semantics for automatic extractive single-document summarization A Barrera, R Verma Computational Linguistics and Intelligent Text Processing, 366-377, 2012 | 73 | 2012 |
The influence of parents on undergraduate and graduate entering the STEM disciplines and STEM careers C Craig, R Verma, D Stokes, P Evans, B Abrol International Journal of Science Education, 2018 | 68 | 2018 |
A query-based medical information summarization system using ontology knowledge P Chen, R Verma Proceedings of the IEEE 2006 Symposium on Computer-Based Medical Systems …, 2006 | 59 | 2006 |
Semantic feature selection for text with application to phishing email detection R Verma, N Hossain international conference on information security and cryptology, 455-468, 2013 | 56 | 2013 |
Data quality for security challenges: Case studies of phishing, malware and intrusion detection datasets RM Verma, V Zeng, H Faridi Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 54 | 2019 |
Scaling and effectiveness of email masquerade attacks: Exploiting natural language generation S Baki, R Verma, A Mukherjee, O Gnawali Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 54 | 2017 |
Phishing Email Detection Using Robust NLP Techniques G Egozi, R Verma 2018 ICDM Workshops (ADMiS), 2018 | 48 | 2018 |
Sixteen years of phishing user studies: What have we learned? S Baki, RM Verma IEEE Transactions on Dependable and Secure Computing 20 (2), 1200-1212, 2022 | 47 | 2022 |
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students R Verma, M Kantarcioglou, D Marchette, E Leiss, T Solorio IEEE Security and Privacy 13 (6), 60-65, 2015 | 46 | 2015 |
Term matching on parallel computers R Ramesh, RM Verma, T Krishnaprasad, IV Ramakrishnan The Journal of Logic Programming 6 (3), 213-228, 1989 | 45 | 1989 |