Publications


Sixteen Years of Phishing User Studies: What Have We Learned?


Shahryar Baki, Rakesh M. Verma

{IEEE} Trans. Dependable Secur. Comput., vol. 20, 2023, pp. 1200--1212


Adversarial Robustness of Phishing Email Detection Models


Parisa Mehdi Gholampour, Rakesh M. Verma

David J. Marchette, Andrew H. Sung, Rakesh M. Verma, Proceedings of the 9th {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2023, Charlotte, NC, USA, 26 April 2023, {ACM}, 2023, pp. 67--76


Enhancement of Twitter event detection using news streams


Samaneh Karimi, Azadeh Shakery, Rakesh M. Verma

Nat. Lang. Eng., vol. 29, 2023, pp. 181--200


Data Quality and Linguistic Cues for Domain-independent Deception Detection


Casey Hanks, Rakesh M. Verma

{IEEE/ACM} International Conference on Big Data Computing, Applications and Technologies, {BDCAT} 2022, Vancouver, WA, USA, December 6-9, 2022, {IEEE}, 2022, pp. 248--258


Leveraging Synthetic Data and PU Learning For Phishing Email Detection


Fatima Zahra Qachfar, Rakesh M. Verma, Arjun Mukherjee

Anupam Joshi, Maribel Fern{\'{a}}ndez, Rakesh M. Verma, {CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022, {ACM}, 2022, pp. 29--40


Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate


Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Xuting Liu

CoRR, abs/2207.01738, 2022


Does Deception Leave a Content Independent Stylistic Trace?


Victor Zeng, Xuting Liu, Rakesh M. Verma

Anupam Joshi, Maribel Fern{\'{a}}ndez, Rakesh M. Verma, {CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022, {ACM}, 2022, pp. 349--351


Vulnerability Detection via Multimodal Learning: Datasets and Analysis


Xin Zhou, Rakesh M. Verma

Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako, {ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022, {ACM}, 2022, pp. 1225--1227


Software Vulnerability Detection via Multimodal Deep Learning


Xin Zhou, Rakesh M. Verma

Lecture Notes in Computer Science, Gabriele Lenzini, Weizhi Meng, Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings, vol. 13867, Springer, 2022, pp. 85--103


Sixteen Years of Phishing User Studies: What Have We Learned?


Shahryar Baki, Rakesh M. Verma

CoRR, abs/2109.04661, 2021


Claim Verification using a Multi-GAN based Model


Amartya Hatua, Arjun Mukherjee, Rakesh M. Verma

CoRR, abs/2103.08001, 2021


On the Feasibility of Using GANs for Claim Verification- Experiments and Analysis


Amartya Hatua, Arjun Mukherjee, Rakesh M. Verma

{CEUR} Workshop Proceedings, Fabio Saracco, Marco Viviani, Proceedings of the workshop Reducing Online Misinformation Through Credible Information Retrieval {(ROMCIR} 2021) co-located with 43rd European Conference on Information Retrieval {(ECIR} 2021), Lucca, Italy (On-line), April 1, 2021, vol. 2838, CEUR-WS.org, 2021, pp. 35--46


Claim Verification Using a Multi-GAN Based Model


Amartya Hatua, Arjun Mukherjee, Rakesh M. Verma

Galia Angelova, Maria Kunilovskaya, Ruslan Mitkov, Ivelina Nikolova{-}Koleva, Proceedings of the International Conference on Recent Advances in Natural Language Processing {(RANLP} 2021), Held Online, 1-3September, 2021, {INCOMA} Ltd., 2021, pp. 494--503


Online news media website ranking using user-generated content


Samaneh Karimi, Azadeh Shakery, Rakesh M. Verma

J. Inf. Sci., vol. 47, 2021


Capacity Expansion in Cybersecurity: Challenges and Prospects


Rakesh M. Verma

Mark Sherriff, Laurence D. Merkle, Pamela A. Cutter, Alvaro E. Monge, Judithe Sheard, {SIGCSE} '21: The 52nd {ACM} Technical Symposium on Computer Science Education, Virtual Event, USA, March 13-20, 2021, {ACM}, 2021, p. 1277


What is the Security Mindset? Can it be Developed?


Rakesh M. Verma, Rangarajan Ray Parthasarathy, Lila Ghemri

Mark Sherriff, Laurence D. Merkle, Pamela A. Cutter, Alvaro E. Monge, Judithe Sheard, {SIGCSE} '21: The 52nd {ACM} Technical Symposium on Computer Science Education, Virtual Event, USA, March 13-20, 2021, {ACM}, 2021, p. 1361


An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs


Ayman El Aassal, Shahryar Baki, Avisha Das, Rakesh M. Verma

{IEEE} Access, vol. 8, 2020, pp. 22170--22192


Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders


Shahryar Baki, Rakesh M. Verma, Omprakash Gnawali

Hung{-}Min Sun, Shiuh{-}Pyng Shieh, Guofei Gu, Giuseppe Ateniese, {ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020, {ACM}, 2020, pp. 236--247


Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack


Shahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali

CoRR, abs/2006.13499, 2020


Developing A Compelling Vision for Winning the Cybersecurity Arms Race


Elisa Bertino, Anoop Singhal, Srivathsan Srinivasagopalan, Rakesh M. Verma

Vassil Roussev, Bhavani Thuraisingham, Barbara Carminati, Murat Kantarcioglu, {CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020, {ACM}, 2020, pp. 220--222


SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective


Avisha Das, Shahryar Baki, Ayman El Aassal, Rakesh M. Verma, Arthur Dunbar

{IEEE} Commun. Surv. Tutorials, vol. 22, 2020, pp. 671--708


Can Machines Tell Stories? A Comparative Study of Deep Neural Language Models and Metrics


Avisha Das, Rakesh M. Verma

{IEEE} Access, vol. 8, 2020, pp. 181258--181292


Modeling Coherency in Generated Emails by Leveraging Deep Neural Learners


Avisha Das, Rakesh M. Verma

CoRR, abs/2007.07403, 2020


Adversarial Machine Learning for Text


Daniel Lee, Rakesh M. Verma

Rakesh M. Verma, Latifur Khan, Chilukuri K. Mohan, IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, New Orleans, LA, USA, March 18, 2020, {ACM}, 2020, pp. 33--34


Experiments in Extractive Summarization: Integer Linear Programming, Term/Sentence Scoring, and Title-driven Models


Daniel Lee, Rakesh M. Verma, Avisha Das, Arjun Mukherjee

CoRR, abs/2008.00140, 2020


Poster: A Modular and Innovative Security Analytics Course


Rakesh M. Verma

Jian Zhang, Mark Sherriff, Sarah Heckman, Pamela A. Cutter, Alvaro E. Monge, Proceedings of the 51st {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2020, Portland, OR, USA, March 11-14, 2020, {ACM}, 2020, p. 1352


Diverse Datasets and a Customizable Benchmarking Framework for Phishing


Victor Zeng, Shahryar Baki, Ayman El Aassal, Rakesh M. Verma, Luis Felipe Teixeira De Moraes, Avisha Das

Rakesh M. Verma, Latifur Khan, Chilukuri K. Mohan, IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, New Orleans, LA, USA, March 18, 2020, {ACM}, 2020, pp. 35--41


PhishBench 2.0: A Versatile and Extendable Benchmarking Framework for Phishing


Victor Zeng, Xin Zhou, Shahryar Baki, Rakesh M. Verma

Jay Ligatti, Xinming Ou, Jonathan Katz, Giovanni Vigna, {CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, {ACM}, 2020, pp. 2077--2079


Phishing Sites Detection from a Web Developer's Perspective Using Machine Learning


Xin Zhou, Rakesh M. Verma

53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020, ScholarSpace, 2020, pp. 1--10


SOK: A Comprehensive Reexamination of Phishing Research from the Security Perspective


Avisha Das, Shahryar Baki, Ayman El Aassal, Rakesh M. Verma, Arthur Dunbar

CoRR, abs/1911.00953, 2019


Automated email Generation for Targeted Attacks using Natural Language


Avisha Das, Rakesh M. Verma

CoRR, abs/1908.06893, 2019


Parameter Tuning and Confidence Limits of Malware Clustering


Houtan Faridi, Srivathsan Srinivasagopalan, Rakesh M. Verma

Gail{-}Joon Ahn, Bhavani Thuraisingham, Murat Kantarcioglu, Ram Krishnan, Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019, {ACM}, 2019, pp. 169--171


Online News Media Website Ranking Using User Generated Content


Samaneh Karimi, Azadeh Shakery, Rakesh M. Verma

CoRR, abs/1910.12441, 2019


The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories


Alan T. Sherman, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh M. Verma, Ryan Vrecenar, Linda Oliva, Enis Golaszewski, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson

{IEEE} Secur. Priv., vol. 17, 2019, pp. 77--83


The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories


Alan T. Sherman, Linda Oliva, Enis Golaszewski, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh M. Verma, Ryan Vrecenar

CoRR, abs/1901.09286, 2019


Newswire versus Social Media for Disaster Response and Recovery


Rakesh M. Verma, Samaneh Karimi, Daniel Lee, Omprakash Gnawali, Azadeh Shakery

CoRR, abs/1906.10607, 2019


Cybersecurity analytics


Rakesh M Verma, David J Marchette

CRC Press, 2019


Data Quality for Security Challenges: Case Studies of Phishing, Malware and Intrusion Detection Datasets


Rakesh M. Verma, Victor Zeng, Houtan Faridi

Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, Jonathan Katz, Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019, {ACM}, 2019, pp. 2605--2607


Machine Learning Methods for Software Vulnerability Detection


Boris Chernis, Rakesh M. Verma

Rakesh M. Verma, Murat Kantarcioglu, Proceedings of the Fourth {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, {ACM}, 2018, pp. 31--39


Phishing Email Detection Using Robust NLP Techniques


Gal Egozi, Rakesh M. Verma

Hanghang Tong, Zhenhui Jessie Li, Feida Zhu, Jeffrey Yu, 2018 {IEEE} International Conference on Data Mining Workshops, {ICDM} Workshops, Singapore, Singapore, November 17-20, 2018, {IEEE}, 2018, pp. 7--12


Performance Evaluation of Features and Clustering Algorithms for Malware


Houtan Faridi, Srivathsan Srinivasagopalan, Rakesh M. Verma

Hanghang Tong, Zhenhui Jessie Li, Feida Zhu, Jeffrey Yu, 2018 {IEEE} International Conference on Data Mining Workshops, {ICDM} Workshops, Singapore, Singapore, November 17-20, 2018, {IEEE}, 2018, pp. 13--22


Citance-based retrieval and summarization using IR and machine learning


Samaneh Karimi, Luis F. T. Moraes, Avisha Das, Azadeh Shakery, Rakesh M. Verma

Scientometrics, vol. 116, 2018, pp. 1331--1366


Identifying reference spans: topic modeling and word embeddings help IR


Luis F. T. Moraes, Shahryar Baki, Rakesh M. Verma, Daniel Lee

Int. J. Digit. Libr., vol. 19, 2018, pp. 191--202


University of Houston @ CL-SciSumm 2018


Luis F. T. De Moraes, Avisha Das, Samaneh Karimi, Rakesh M. Verma

{CEUR} Workshop Proceedings, Philipp Mayr, Muthu Kumar Chandrasekaran, Kokil Jaidka, Proceedings of the 3rd Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL} 2018) co-located with the 41st International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval {(SIGIR} 2018), Ann Arbor, USA, July 12, 2018, vol. 2132, CEUR-WS.org, 2018, pp. 142--149


Security Analytics: Adapting Data Science for Security Challenges


Rakesh M. Verma

Rakesh M. Verma, Murat Kantarcioglu, Proceedings of the Fourth {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, {ACM}, 2018, pp. 40--41


Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation


Shahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali

Ramesh Karri, Ozgur Sinanoglu, Ahmad{-}Reza Sadeghi, Xun Yi, Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017, {ACM}, 2017, pp. 469--482


University of Houston @ CL-SciSumm 2017: Positional language Models, Structural Correspondence Learning and Textual Entailment


Samaneh Karimi, Luis F. T. Moraes, Avisha Das, Rakesh M. Verma

{CEUR} Workshop Proceedings, Kokil Jaidka, Muthu Kumar Chandrasekaran, Min{-}Yen Kan, Proceedings of the Computational Linguistics Scientific Summarization Shared Task (CL-SciSumm 2017) organized as a part of the 2nd Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL} 2017) and co-located with the 40th International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval {(SIGIR} 2017), Tokyo, Japan, August 11, 2017, vol. 2002, CEUR-WS.org, 2017, pp. 73--85


Identifying Reference Spans: Topic Modeling and Word Embeddings help IR


Luis F. T. Moraes, Shahryar Baki, Rakesh M. Verma, Daniel Lee

CoRR, abs/1708.02989, 2017


Uniqueness of Normal Forms for Shallow Term Rewrite Systems


Nicholas R. Radcliffe, Luis F. T. Moraes, Rakesh M. Verma

{ACM} Trans. Comput. Log., vol. 18, 2017, pp. 17:1--17:20


The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research


Alan T. Sherman, Melissa Dark, Agnes Chan, Rylan Chong, Thomas H. Morris, Linda Oliva, John A. Springer, Bhavani Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel

CoRR, abs/1703.08859, 2017


INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research


Alan T. Sherman, Melissa Dark, Agnes Chan, Rylan Chong, Thomas H. Morris, Linda Oliva, John A. Springer, Bhavani Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel

{IEEE} Secur. Priv., vol. 15, 2017, pp. 72--78


Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based Analysis and User Participation


Rakesh M. Verma, Ayman El Aassal

Gail{-}Joon Ahn, Alexander Pretschner, Gabriel Ghinita, Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017, {ACM}, 2017, pp. 155--157


What's in a URL: Fast Feature Extraction and Malicious URL Detection


Rakesh M. Verma, Avisha Das

Rakesh M. Verma, Bhavani Thuraisingham, Proceedings of the 3rd {ACM} on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017, {ACM}, 2017, pp. 55--63


Extractive Summarization: Limits, Compression, Generalized Model and Heuristics


Rakesh M. Verma, Daniel Lee

CoRR, abs/1704.05550, 2017


Extractive Summarization: Limits, Compression, Generalized Model and Heuristics


Rakesh M. Verma, Daniel Lee

Computaci{\'{o}}n y Sistemas, vol. 21, 2017


ICE: Idiom and Collocation Extractor for Research and Education


Vasanthi Vuppuluri, Shahryar Baki, An Nguyen, Rakesh M. Verma

Andre Martins, Anselmo Pe{\~{n}}as, Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics, {EACL} 2017, Valencia, Spain, April 3-7, 2017, Software Demonstrations, Association for Computational Linguistics, 2017, pp. 108--111


University of Houston at CL-SciSumm 2016: SVMs with tree kernels and Sentence Similarity


Luis F. T. Moraes, Shahryar Baki, Rakesh M. Verma, Daniel Lee

{CEUR} Workshop Proceedings, Guillaume Cabanac, Muthu Kumar Chandrasekaran, Ingo Frommholz, Kokil Jaidka, Min{-}Yen Kan, Philipp Mayr, Dietmar Wolfram, Proceedings of the Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL)} co-located with the Joint Conference on Digital Libraries 2016 {(JCDL} 2016), Newark, NJ, USA, June 23, 2016, vol. 1610, CEUR-WS.org, 2016, pp. 113--121


Uniqueness of Normal Forms for Shallow Term Rewrite Systems


Nicholas R. Radcliffe, Luis F. T. Moraes, Rakesh M. Verma

CoRR, abs/1607.00431, 2016


Mining the Web for Collocations: IR Models of Term Associations


Rakesh M. Verma, Vasanthi Vuppuluri, An Nguyen, Arjun Mukherjee, Ghita Mammar, Shahryar Baki, Reed Armstrong

Lecture Notes in Computer Science, Alexander F. Gelbukh, Computational Linguistics and Intelligent Text Processing - 17th International Conference, CICLing 2016, Konya, Turkey, April 3-9, 2016, Revised Selected Papers, Part {I}, vol. 9623, Springer, 2016, pp. 177--194


Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students


Wenyaw Chan, George Cybenko, Murat Kantarcioglu, Ernst L. Leiss, Thamar Solorio, Bhavani Thuraisingham, Rakesh M. Verma

Stephen Huang, Rakesh M. Verma, Proceedings of the 2015 {ACM} International Workshop on International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2015, San Antonio, TX, USA, March 4, 2015, {ACM}, 2015, pp. 55--57


Integrity Protection for Big Data Processing with Dynamic Redundancy Computation


Zhimin Gao, Nicholas DeSalvo, Pham Dang Khoa, Seung{-}Hun Kim, Lei Xu, Won Woo Ro, Rakesh M. Verma, Weidong Shi

2015 {IEEE} International Conference on Autonomic Computing, Grenoble, France, July 7-10, 2015, {IEEE} Computer Society, 2015, pp. 159--160


The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks


Narasimha K. Shashidhar, Chadi Kari, Rakesh M. Verma

J. Sens. Actuator Networks, vol. 4, 2015, pp. 378--409


Topic based segmentation of classroom videos


Tayfun Tuna, Mahima Joshi, Varun Varghese, Rucha Deshpande, Jaspal Subhlok, Rakesh M. Verma

2015 {IEEE} Frontiers in Education Conference, {FIE} 2015, El Paso, TX, USA, October 21-24, 2015, {IEEE} Computer Society, 2015, pp. 1--9


On the Character of Phishing URLs: Accurate and Robust Statistical Learning Classifiers


Rakesh M. Verma, Keith Dyer

Jaehong Park, Anna Cinzia Squicciarini, Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015, {ACM}, 2015, pp. 111--122


Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students


Rakesh M. Verma, Murat Kantarcioglu, David J. Marchette, Ernst L. Leiss, Thamar Solorio

{IEEE} Secur. Priv., vol. 13, 2015, pp. 60--65


Phish-IDetector: Message-Id Based Automatic Phishing Detection


Rakesh M. Verma, Nirmala Rai

Mohammad S. Obaidat, Pascal Lorenz, Pierangela Samarati, {SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015, SciTePress, 2015, pp. 427--434


A New Approach for Idiom Identification Using Meanings and the Web


Rakesh M. Verma, Vasanthi Vuppuluri

Galia Angelova, Kalina Bontcheva, Ruslan Mitkov, Recent Advances in Natural Language Processing, {RANLP} 2015, 7-9 September, 2015, Hissar, Bulgaria, {RANLP} 2015 Organising Committee / {ACL}, 2015, pp. 681--687


Catching Classical and Hijack-Based Phishing Attacks


Tanmay Thakur, Rakesh M. Verma

Lecture Notes in Computer Science, Atul Prakash, Rudrapatna K. Shyamasundar, Information Systems Security - 10th International Conference, {ICISS} 2014, Hyderabad, India, December 16-20, 2014, Proceedings, vol. 8880, Springer, 2014, pp. 318--337


Modeling and analysis of LEAP, a key management protocol for wireless sensor networks


Rakesh M. Verma, Bailey E. Basile

10th Annual {IEEE} International Conference on Sensing, Communications and Networking, {SECON} 2013, New Orleans, LA, USA, 24-27 June, 2013, {IEEE}, 2013, pp. 65--67


Semantic Feature Selection for Text with Application to Phishing Email Detection


Rakesh M. Verma, Nabil Hossain

Lecture Notes in Computer Science, Hyang{-}Sook Lee, Dong{-}Guk Han, Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers, vol. 8565, Springer, 2013, pp. 455--468


Combining Syntax and Semantics for Automatic Extractive Single-Document Summarization


Araly Barrera, Rakesh M. Verma

Lecture Notes in Computer Science, Alexander F. Gelbukh, Computational Linguistics and Intelligent Text Processing - 13th International Conference, CICLing 2012, New Delhi, India, March 11-17, 2012, Proceedings, Part {II}, vol. 7182, Springer, 2012, pp. 366--377


Two-Pronged Phish Snagging


Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain

Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012, {IEEE} Computer Society, 2012, pp. 174--179


Detecting Phishing Emails the Natural Language Way


Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain

Lecture Notes in Computer Science, Sara Foresti, Moti Yung, Fabio Martinelli, Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, vol. 7459, Springer, 2012, pp. 824--841


Automated extractive single-document summarization: beating the baselines with a new approach


Araly Barrera, Rakesh M. Verma

William C. Chu, W. Eric Wong, Mathew J. Palakal, Chih{-}Cheng Hung, Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011, {ACM}, 2011, pp. 268--269


SemQuest: University of Houston's Semantics-based Question Answering System


Araly Barrera, Rakesh M. Verma, Ryan Vincent

Proceedings of the Fourth Text Analysis Conference, {TAC} 2011, Gaithersburg, Maryland, USA, November 14-15, 2011, {NIST}, 2011


A Ranking-based Approach for Multiple-document Information Extraction


Araly Barrera, Rakesh M. Verma

Proceedings of the Third Text Analysis Conference, {TAC} 2010, Gaithersburg, Maryland, USA, November 15-16, 2010, {NIST}, 2010


R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks


Sam Blackshear, Rakesh M. Verma

Sung Y. Shin, Sascha Ossowski, Michael Schumacher, Mathew J. Palakal, Chih{-}Cheng Hung, Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, {ACM}, 2010, pp. 1985--1992


Uniqueness of Normal Forms is Decidable for Shallow Term Rewrite Systems


Nicholas R. Radcliffe, Rakesh M. Verma

LIPIcs, Kamal Lodaya, Meena Mahajan, {IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2010, December 15-18, 2010, Chennai, India, vol. 8, Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, 2010, pp. 284--295


A polynomial algorithm for uniqueness of normal forms of linear shallow term rewrite systems


Julian Zinn, Rakesh M. Verma

Appl. Algebra Eng. Commun. Comput., vol. 21, 2010, pp. 459--485


Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity


Zhiyao Liang, Rakesh M. Verma

Lecture Notes in Computer Science, Atul Prakash, Indranil Gupta, Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings, vol. 5905, Springer, 2009, pp. 101--116


Complexity of Normal Form Properties and Reductions for Term Rewriting Problems


Rakesh M. Verma

Fundam. Informaticae, vol. 92, 2009, pp. 145--168


Semantic Analysis of Association Rules


Ping Chen, Rakesh M. Verma, Janet C. Meininger, Wenyaw Chan

David Wilson, H. Chad Lane, Proceedings of the Twenty-First International Florida Artificial Intelligence Research Society Conference, May 15-17, 2008, Coconut Grove, Florida, {USA}, {AAAI} Press, 2008, pp. 270--275


Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols


Zhiyao Liang, Rakesh M. Verma

Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, {IEEE} Computer Society, 2008, pp. 1067--1074


Complexity of Checking Freshness of Cryptographic Protocols


Zhiyao Liang, Rakesh M. Verma

Lecture Notes in Computer Science, R. Sekar, Arun K. Pujari, Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings, vol. 5352, Springer, 2008, pp. 86--101


New Undecidability Results for Properties of Term Rewrite Systems


Rakesh M. Verma

Electronic Notes in Theoretical Computer Science, G{\"{u}}nter Kniesel, Jorge Sousa Pinto, Ninth International Workshop on Rule-Based Programming, {RULE} 2008, Hagenberg, Austria, July 14-18, 2008, vol. 290, Elsevier, 2008, pp. 69--85


Semantic Multi-Document Update Summarization Techniques


Rakesh M. Verma, David Kent, Ping Chen

Proceedings of the First Text Analysis Conference, {TAC} 2008, Gaithersburg, Maryland, USA, November 17-19, 2008, {NIST}, 2008


Visualization of rule-based programming


Wenshan Yu, Rakesh M. Verma

Roger L. Wainwright, Hisham Haddad, Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, {ACM}, 2008, pp. 1258--1259


Automata theory: its relevance to computer science students and course contents


Michal Armoni, Susan H. Rodger, Moshe Y. Vardi, Rakesh M. Verma

Doug Baldwin, Paul T. Tymann, Susan M. Haller, Ingrid Russell, Proceedings of the 37th {SIGCSE} Technical Symposium on Computer Science Education, {SIGCSE} 2006, Houston, Texas, USA, March 3-5, 2006, {ACM}, 2006, pp. 197--198


A Query-Based Medical Information Summarization System Using Ontology Knowledge


Ping Chen, Rakesh M. Verma

19th {IEEE} International Symposium on Computer-Based Medical Systems {(CBMS} 2006), 22-23 June 2006, Salt Lake City, Utah, {USA}, {IEEE} Computer Society, 2006, pp. 37--42


A visual and interactive automata theory course emphasizing breadth of automata


Rakesh M. Verma

Jos{\'{e}} C. Cunha, William M. Fleischman, Viera K. Proulx, Jo{\~{a}}o Louren{\c{c}}o, Proceedings of the 10th Annual {SIGCSE} Conference on Innovation and Technology in Computer Science Education, ITiCSE 2005, Caparica, Portugal, June 27-29, 2005, {ACM}, 2005, pp. 325--329


A new decidability technique for ground term rewriting systems with applications


Rakesh M. Verma, Ara Hayrapetyan

{ACM} Trans. Comput. Log., vol. 6, 2005, pp. 102--123


Characterizing Confluence by Rewrite Closure and Right Ground Term Rewrite Systems


Guillem Godoy, Ashish Tiwari, Rakesh M. Verma

Appl. Algebra Eng. Commun. Comput., vol. 15, 2004, pp. 13--36


Deciding confluence of certain term rewriting systems in polynomial time


Guillem Godoy, Ashish Tiwari, Rakesh M. Verma

Ann. Pure Appl. Log., vol. 130, 2004, pp. 33--59