关注
Rakesh Verma, Rakesh M. Verma, RM Verma, R Verma
Rakesh Verma, Rakesh M. Verma, RM Verma, R Verma
Professor of Computer Science, University of Houston
在 uh.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An efficient multiversion access structure
PJ Varman, RM Verma
Knowledge and Data Engineering, IEEE Transactions on 9 (3), 391-409, 1997
1771997
SoK: a comprehensive reexamination of phishing research from the security perspective
A Das, S Baki, A El Aassal, R Verma, A Dunbar
IEEE Communications Surveys & Tutorials 22 (1), 671-708, 2019
1572019
Detecting Phishing Emails the Natural Language Way
R Verma, N Shashidhar, N Hossain
European Symp. on Research in Computer Security, 824-841, 2012
1252012
On the character of phishing URLs: Accurate and robust statistical learning classifiers
R Verma, K Dyer
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
1242015
An in-depth benchmarking and evaluation of phishing detection research for security needs
A El Aassal, S Baki, A Das, RM Verma
IEEE Access 8, 22170-22192, 2020
1212020
What's in a URL: Fast Feature Extraction and Malicious URL Detection
R Verma, A Das
IWSPA, 2017
1112017
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain
US Patent App. 14/015,524, 2015
942015
Machine Learning Methods for Software Vulnerability Detection
B Chernis, R Verma
Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018
922018
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain, N Rai
US Patent 10,404,745, 2019
832019
The embodied nature of narrative knowledge: A cross-study analysis of embodied knowledge in teaching, learning, and life
CJ Craig, JA You, Y Zou, R Verma, D Stokes, P Evans, G Curtis
Teaching and Teacher Education 71, 329-340, 2018
792018
Combining syntax and semantics for automatic extractive single-document summarization
A Barrera, R Verma
Computational Linguistics and Intelligent Text Processing, 366-377, 2012
732012
The influence of parents on undergraduate and graduate entering the STEM disciplines and STEM careers
C Craig, R Verma, D Stokes, P Evans, B Abrol
International Journal of Science Education, 2018
682018
A query-based medical information summarization system using ontology knowledge
P Chen, R Verma
Proceedings of the IEEE 2006 Symposium on Computer-Based Medical Systems …, 2006
592006
Semantic feature selection for text with application to phishing email detection
R Verma, N Hossain
international conference on information security and cryptology, 455-468, 2013
562013
Data quality for security challenges: Case studies of phishing, malware and intrusion detection datasets
RM Verma, V Zeng, H Faridi
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
542019
Scaling and effectiveness of email masquerade attacks: Exploiting natural language generation
S Baki, R Verma, A Mukherjee, O Gnawali
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
542017
Phishing Email Detection Using Robust NLP Techniques
G Egozi, R Verma
2018 ICDM Workshops (ADMiS), 2018
482018
Sixteen years of phishing user studies: What have we learned?
S Baki, RM Verma
IEEE Transactions on Dependable and Secure Computing 20 (2), 1200-1212, 2022
472022
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students
R Verma, M Kantarcioglou, D Marchette, E Leiss, T Solorio
IEEE Security and Privacy 13 (6), 60-65, 2015
462015
Term matching on parallel computers
R Ramesh, RM Verma, T Krishnaprasad, IV Ramakrishnan
The Journal of Logic Programming 6 (3), 213-228, 1989
451989
系统目前无法执行此操作,请稍后再试。
文章 1–20