Sixteen Years of Phishing User Studies: What Have We Learned?
Shahryar Baki, Rakesh M. Verma
{IEEE} Trans. Dependable Secur. Comput., vol. 20, 2023, pp. 1200--1212
Adversarial Robustness of Phishing Email Detection Models
Parisa Mehdi Gholampour, Rakesh M. Verma
David J. Marchette, Andrew H. Sung, Rakesh M. Verma, Proceedings of the 9th {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2023, Charlotte, NC, USA, 26 April 2023, {ACM}, 2023, pp. 67--76
Enhancement of Twitter event detection using news streams
Samaneh Karimi, Azadeh Shakery, Rakesh M. Verma
Nat. Lang. Eng., vol. 29, 2023, pp. 181--200
Data Quality and Linguistic Cues for Domain-independent Deception Detection
Casey Hanks, Rakesh M. Verma
{IEEE/ACM} International Conference on Big Data Computing, Applications and Technologies, {BDCAT} 2022, Vancouver, WA, USA, December 6-9, 2022, {IEEE}, 2022, pp. 248--258
Leveraging Synthetic Data and PU Learning For Phishing Email Detection
Fatima Zahra Qachfar, Rakesh M. Verma, Arjun Mukherjee
Anupam Joshi, Maribel Fern{\'{a}}ndez, Rakesh M. Verma, {CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022, {ACM}, 2022, pp. 29--40
Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate
Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Xuting Liu
CoRR, abs/2207.01738, 2022
Does Deception Leave a Content Independent Stylistic Trace?
Victor Zeng, Xuting Liu, Rakesh M. Verma
Anupam Joshi, Maribel Fern{\'{a}}ndez, Rakesh M. Verma, {CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022, {ACM}, 2022, pp. 349--351
Vulnerability Detection via Multimodal Learning: Datasets and Analysis
Xin Zhou, Rakesh M. Verma
Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako, {ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022, {ACM}, 2022, pp. 1225--1227
Software Vulnerability Detection via Multimodal Deep Learning
Xin Zhou, Rakesh M. Verma
Lecture Notes in Computer Science, Gabriele Lenzini, Weizhi Meng, Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings, vol. 13867, Springer, 2022, pp. 85--103
Sixteen Years of Phishing User Studies: What Have We Learned?
Shahryar Baki, Rakesh M. Verma
CoRR, abs/2109.04661, 2021
Claim Verification using a Multi-GAN based Model
Amartya Hatua, Arjun Mukherjee, Rakesh M. Verma
CoRR, abs/2103.08001, 2021
On the Feasibility of Using GANs for Claim Verification- Experiments and Analysis
Amartya Hatua, Arjun Mukherjee, Rakesh M. Verma
{CEUR} Workshop Proceedings, Fabio Saracco, Marco Viviani, Proceedings of the workshop Reducing Online Misinformation Through Credible Information Retrieval {(ROMCIR} 2021) co-located with 43rd European Conference on Information Retrieval {(ECIR} 2021), Lucca, Italy (On-line), April 1, 2021, vol. 2838, CEUR-WS.org, 2021, pp. 35--46
Claim Verification Using a Multi-GAN Based Model
Amartya Hatua, Arjun Mukherjee, Rakesh M. Verma
Galia Angelova, Maria Kunilovskaya, Ruslan Mitkov, Ivelina Nikolova{-}Koleva, Proceedings of the International Conference on Recent Advances in Natural Language Processing {(RANLP} 2021), Held Online, 1-3September, 2021, {INCOMA} Ltd., 2021, pp. 494--503
Online news media website ranking using user-generated content
Samaneh Karimi, Azadeh Shakery, Rakesh M. Verma
J. Inf. Sci., vol. 47, 2021
Capacity Expansion in Cybersecurity: Challenges and Prospects
Rakesh M. Verma
Mark Sherriff, Laurence D. Merkle, Pamela A. Cutter, Alvaro E. Monge, Judithe Sheard, {SIGCSE} '21: The 52nd {ACM} Technical Symposium on Computer Science Education, Virtual Event, USA, March 13-20, 2021, {ACM}, 2021, p. 1277
What is the Security Mindset? Can it be Developed?
Rakesh M. Verma, Rangarajan Ray Parthasarathy, Lila Ghemri
Mark Sherriff, Laurence D. Merkle, Pamela A. Cutter, Alvaro E. Monge, Judithe Sheard, {SIGCSE} '21: The 52nd {ACM} Technical Symposium on Computer Science Education, Virtual Event, USA, March 13-20, 2021, {ACM}, 2021, p. 1361
An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs
Ayman El Aassal, Shahryar Baki, Avisha Das, Rakesh M. Verma
{IEEE} Access, vol. 8, 2020, pp. 22170--22192
Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders
Shahryar Baki, Rakesh M. Verma, Omprakash Gnawali
Hung{-}Min Sun, Shiuh{-}Pyng Shieh, Guofei Gu, Giuseppe Ateniese, {ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020, {ACM}, 2020, pp. 236--247
Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack
Shahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali
CoRR, abs/2006.13499, 2020
Developing A Compelling Vision for Winning the Cybersecurity Arms Race
Elisa Bertino, Anoop Singhal, Srivathsan Srinivasagopalan, Rakesh M. Verma
Vassil Roussev, Bhavani Thuraisingham, Barbara Carminati, Murat Kantarcioglu, {CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020, {ACM}, 2020, pp. 220--222
SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective
Avisha Das, Shahryar Baki, Ayman El Aassal, Rakesh M. Verma, Arthur Dunbar
{IEEE} Commun. Surv. Tutorials, vol. 22, 2020, pp. 671--708
Can Machines Tell Stories? A Comparative Study of Deep Neural Language Models and Metrics
Avisha Das, Rakesh M. Verma
{IEEE} Access, vol. 8, 2020, pp. 181258--181292
Modeling Coherency in Generated Emails by Leveraging Deep Neural Learners
Avisha Das, Rakesh M. Verma
CoRR, abs/2007.07403, 2020
Adversarial Machine Learning for Text
Daniel Lee, Rakesh M. Verma
Rakesh M. Verma, Latifur Khan, Chilukuri K. Mohan, IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, New Orleans, LA, USA, March 18, 2020, {ACM}, 2020, pp. 33--34
Daniel Lee, Rakesh M. Verma, Avisha Das, Arjun Mukherjee
CoRR, abs/2008.00140, 2020
Poster: A Modular and Innovative Security Analytics Course
Rakesh M. Verma
Jian Zhang, Mark Sherriff, Sarah Heckman, Pamela A. Cutter, Alvaro E. Monge, Proceedings of the 51st {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2020, Portland, OR, USA, March 11-14, 2020, {ACM}, 2020, p. 1352
Diverse Datasets and a Customizable Benchmarking Framework for Phishing
Victor Zeng, Shahryar Baki, Ayman El Aassal, Rakesh M. Verma, Luis Felipe Teixeira De Moraes, Avisha Das
Rakesh M. Verma, Latifur Khan, Chilukuri K. Mohan, IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, New Orleans, LA, USA, March 18, 2020, {ACM}, 2020, pp. 35--41
PhishBench 2.0: A Versatile and Extendable Benchmarking Framework for Phishing
Victor Zeng, Xin Zhou, Shahryar Baki, Rakesh M. Verma
Jay Ligatti, Xinming Ou, Jonathan Katz, Giovanni Vigna, {CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, {ACM}, 2020, pp. 2077--2079
Phishing Sites Detection from a Web Developer's Perspective Using Machine Learning
Xin Zhou, Rakesh M. Verma
53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020, ScholarSpace, 2020, pp. 1--10
SOK: A Comprehensive Reexamination of Phishing Research from the Security Perspective
Avisha Das, Shahryar Baki, Ayman El Aassal, Rakesh M. Verma, Arthur Dunbar
CoRR, abs/1911.00953, 2019
Automated email Generation for Targeted Attacks using Natural Language
Avisha Das, Rakesh M. Verma
CoRR, abs/1908.06893, 2019
Parameter Tuning and Confidence Limits of Malware Clustering
Houtan Faridi, Srivathsan Srinivasagopalan, Rakesh M. Verma
Gail{-}Joon Ahn, Bhavani Thuraisingham, Murat Kantarcioglu, Ram Krishnan, Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019, {ACM}, 2019, pp. 169--171
Online News Media Website Ranking Using User Generated Content
Samaneh Karimi, Azadeh Shakery, Rakesh M. Verma
CoRR, abs/1910.12441, 2019
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
Alan T. Sherman, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh M. Verma, Ryan Vrecenar, Linda Oliva, Enis Golaszewski, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson
{IEEE} Secur. Priv., vol. 17, 2019, pp. 77--83
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
Alan T. Sherman, Linda Oliva, Enis Golaszewski, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh M. Verma, Ryan Vrecenar
CoRR, abs/1901.09286, 2019
Newswire versus Social Media for Disaster Response and Recovery
Rakesh M. Verma, Samaneh Karimi, Daniel Lee, Omprakash Gnawali, Azadeh Shakery
CoRR, abs/1906.10607, 2019
Rakesh M. Verma, Victor Zeng, Houtan Faridi
Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, Jonathan Katz, Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019, {ACM}, 2019, pp. 2605--2607
Machine Learning Methods for Software Vulnerability Detection
Boris Chernis, Rakesh M. Verma
Rakesh M. Verma, Murat Kantarcioglu, Proceedings of the Fourth {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, {ACM}, 2018, pp. 31--39
Phishing Email Detection Using Robust NLP Techniques
Gal Egozi, Rakesh M. Verma
Hanghang Tong, Zhenhui Jessie Li, Feida Zhu, Jeffrey Yu, 2018 {IEEE} International Conference on Data Mining Workshops, {ICDM} Workshops, Singapore, Singapore, November 17-20, 2018, {IEEE}, 2018, pp. 7--12
Performance Evaluation of Features and Clustering Algorithms for Malware
Houtan Faridi, Srivathsan Srinivasagopalan, Rakesh M. Verma
Hanghang Tong, Zhenhui Jessie Li, Feida Zhu, Jeffrey Yu, 2018 {IEEE} International Conference on Data Mining Workshops, {ICDM} Workshops, Singapore, Singapore, November 17-20, 2018, {IEEE}, 2018, pp. 13--22
Citance-based retrieval and summarization using IR and machine learning
Samaneh Karimi, Luis F. T. Moraes, Avisha Das, Azadeh Shakery, Rakesh M. Verma
Scientometrics, vol. 116, 2018, pp. 1331--1366
Identifying reference spans: topic modeling and word embeddings help IR
Luis F. T. Moraes, Shahryar Baki, Rakesh M. Verma, Daniel Lee
Int. J. Digit. Libr., vol. 19, 2018, pp. 191--202
University of Houston @ CL-SciSumm 2018
Luis F. T. De Moraes, Avisha Das, Samaneh Karimi, Rakesh M. Verma
{CEUR} Workshop Proceedings, Philipp Mayr, Muthu Kumar Chandrasekaran, Kokil Jaidka, Proceedings of the 3rd Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL} 2018) co-located with the 41st International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval {(SIGIR} 2018), Ann Arbor, USA, July 12, 2018, vol. 2132, CEUR-WS.org, 2018, pp. 142--149
Security Analytics: Adapting Data Science for Security Challenges
Rakesh M. Verma
Rakesh M. Verma, Murat Kantarcioglu, Proceedings of the Fourth {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, {ACM}, 2018, pp. 40--41
Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation
Shahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali
Ramesh Karri, Ozgur Sinanoglu, Ahmad{-}Reza Sadeghi, Xun Yi, Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017, {ACM}, 2017, pp. 469--482
Samaneh Karimi, Luis F. T. Moraes, Avisha Das, Rakesh M. Verma
{CEUR} Workshop Proceedings, Kokil Jaidka, Muthu Kumar Chandrasekaran, Min{-}Yen Kan, Proceedings of the Computational Linguistics Scientific Summarization Shared Task (CL-SciSumm 2017) organized as a part of the 2nd Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL} 2017) and co-located with the 40th International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval {(SIGIR} 2017), Tokyo, Japan, August 11, 2017, vol. 2002, CEUR-WS.org, 2017, pp. 73--85
Identifying Reference Spans: Topic Modeling and Word Embeddings help IR
Luis F. T. Moraes, Shahryar Baki, Rakesh M. Verma, Daniel Lee
CoRR, abs/1708.02989, 2017
Uniqueness of Normal Forms for Shallow Term Rewrite Systems
Nicholas R. Radcliffe, Luis F. T. Moraes, Rakesh M. Verma
{ACM} Trans. Comput. Log., vol. 18, 2017, pp. 17:1--17:20
The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research
Alan T. Sherman, Melissa Dark, Agnes Chan, Rylan Chong, Thomas H. Morris, Linda Oliva, John A. Springer, Bhavani Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel
CoRR, abs/1703.08859, 2017
INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research
Alan T. Sherman, Melissa Dark, Agnes Chan, Rylan Chong, Thomas H. Morris, Linda Oliva, John A. Springer, Bhavani Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel
{IEEE} Secur. Priv., vol. 15, 2017, pp. 72--78
Rakesh M. Verma, Ayman El Aassal
Gail{-}Joon Ahn, Alexander Pretschner, Gabriel Ghinita, Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017, {ACM}, 2017, pp. 155--157
What's in a URL: Fast Feature Extraction and Malicious URL Detection
Rakesh M. Verma, Avisha Das
Rakesh M. Verma, Bhavani Thuraisingham, Proceedings of the 3rd {ACM} on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017, {ACM}, 2017, pp. 55--63
Extractive Summarization: Limits, Compression, Generalized Model and Heuristics
Rakesh M. Verma, Daniel Lee
CoRR, abs/1704.05550, 2017
Extractive Summarization: Limits, Compression, Generalized Model and Heuristics
Rakesh M. Verma, Daniel Lee
Computaci{\'{o}}n y Sistemas, vol. 21, 2017
ICE: Idiom and Collocation Extractor for Research and Education
Vasanthi Vuppuluri, Shahryar Baki, An Nguyen, Rakesh M. Verma
Andre Martins, Anselmo Pe{\~{n}}as, Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics, {EACL} 2017, Valencia, Spain, April 3-7, 2017, Software Demonstrations, Association for Computational Linguistics, 2017, pp. 108--111
University of Houston at CL-SciSumm 2016: SVMs with tree kernels and Sentence Similarity
Luis F. T. Moraes, Shahryar Baki, Rakesh M. Verma, Daniel Lee
{CEUR} Workshop Proceedings, Guillaume Cabanac, Muthu Kumar Chandrasekaran, Ingo Frommholz, Kokil Jaidka, Min{-}Yen Kan, Philipp Mayr, Dietmar Wolfram, Proceedings of the Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL)} co-located with the Joint Conference on Digital Libraries 2016 {(JCDL} 2016), Newark, NJ, USA, June 23, 2016, vol. 1610, CEUR-WS.org, 2016, pp. 113--121
Uniqueness of Normal Forms for Shallow Term Rewrite Systems
Nicholas R. Radcliffe, Luis F. T. Moraes, Rakesh M. Verma
CoRR, abs/1607.00431, 2016
Mining the Web for Collocations: IR Models of Term Associations
Rakesh M. Verma, Vasanthi Vuppuluri, An Nguyen, Arjun Mukherjee, Ghita Mammar, Shahryar Baki, Reed Armstrong
Lecture Notes in Computer Science, Alexander F. Gelbukh, Computational Linguistics and Intelligent Text Processing - 17th International Conference, CICLing 2016, Konya, Turkey, April 3-9, 2016, Revised Selected Papers, Part {I}, vol. 9623, Springer, 2016, pp. 177--194
Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students
Wenyaw Chan, George Cybenko, Murat Kantarcioglu, Ernst L. Leiss, Thamar Solorio, Bhavani Thuraisingham, Rakesh M. Verma
Stephen Huang, Rakesh M. Verma, Proceedings of the 2015 {ACM} International Workshop on International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2015, San Antonio, TX, USA, March 4, 2015, {ACM}, 2015, pp. 55--57
Integrity Protection for Big Data Processing with Dynamic Redundancy Computation
Zhimin Gao, Nicholas DeSalvo, Pham Dang Khoa, Seung{-}Hun Kim, Lei Xu, Won Woo Ro, Rakesh M. Verma, Weidong Shi
2015 {IEEE} International Conference on Autonomic Computing, Grenoble, France, July 7-10, 2015, {IEEE} Computer Society, 2015, pp. 159--160
The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks
Narasimha K. Shashidhar, Chadi Kari, Rakesh M. Verma
J. Sens. Actuator Networks, vol. 4, 2015, pp. 378--409
Topic based segmentation of classroom videos
Tayfun Tuna, Mahima Joshi, Varun Varghese, Rucha Deshpande, Jaspal Subhlok, Rakesh M. Verma
2015 {IEEE} Frontiers in Education Conference, {FIE} 2015, El Paso, TX, USA, October 21-24, 2015, {IEEE} Computer Society, 2015, pp. 1--9
On the Character of Phishing URLs: Accurate and Robust Statistical Learning Classifiers
Rakesh M. Verma, Keith Dyer
Jaehong Park, Anna Cinzia Squicciarini, Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015, {ACM}, 2015, pp. 111--122
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students
Rakesh M. Verma, Murat Kantarcioglu, David J. Marchette, Ernst L. Leiss, Thamar Solorio
{IEEE} Secur. Priv., vol. 13, 2015, pp. 60--65
Phish-IDetector: Message-Id Based Automatic Phishing Detection
Rakesh M. Verma, Nirmala Rai
Mohammad S. Obaidat, Pascal Lorenz, Pierangela Samarati, {SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015, SciTePress, 2015, pp. 427--434
A New Approach for Idiom Identification Using Meanings and the Web
Rakesh M. Verma, Vasanthi Vuppuluri
Galia Angelova, Kalina Bontcheva, Ruslan Mitkov, Recent Advances in Natural Language Processing, {RANLP} 2015, 7-9 September, 2015, Hissar, Bulgaria, {RANLP} 2015 Organising Committee / {ACL}, 2015, pp. 681--687
Catching Classical and Hijack-Based Phishing Attacks
Tanmay Thakur, Rakesh M. Verma
Lecture Notes in Computer Science, Atul Prakash, Rudrapatna K. Shyamasundar, Information Systems Security - 10th International Conference, {ICISS} 2014, Hyderabad, India, December 16-20, 2014, Proceedings, vol. 8880, Springer, 2014, pp. 318--337
Modeling and analysis of LEAP, a key management protocol for wireless sensor networks
Rakesh M. Verma, Bailey E. Basile
10th Annual {IEEE} International Conference on Sensing, Communications and Networking, {SECON} 2013, New Orleans, LA, USA, 24-27 June, 2013, {IEEE}, 2013, pp. 65--67
Semantic Feature Selection for Text with Application to Phishing Email Detection
Rakesh M. Verma, Nabil Hossain
Lecture Notes in Computer Science, Hyang{-}Sook Lee, Dong{-}Guk Han, Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers, vol. 8565, Springer, 2013, pp. 455--468
Combining Syntax and Semantics for Automatic Extractive Single-Document Summarization
Araly Barrera, Rakesh M. Verma
Lecture Notes in Computer Science, Alexander F. Gelbukh, Computational Linguistics and Intelligent Text Processing - 13th International Conference, CICLing 2012, New Delhi, India, March 11-17, 2012, Proceedings, Part {II}, vol. 7182, Springer, 2012, pp. 366--377
Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain
Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012, {IEEE} Computer Society, 2012, pp. 174--179
Detecting Phishing Emails the Natural Language Way
Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain
Lecture Notes in Computer Science, Sara Foresti, Moti Yung, Fabio Martinelli, Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, vol. 7459, Springer, 2012, pp. 824--841
Automated extractive single-document summarization: beating the baselines with a new approach
Araly Barrera, Rakesh M. Verma
William C. Chu, W. Eric Wong, Mathew J. Palakal, Chih{-}Cheng Hung, Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011, {ACM}, 2011, pp. 268--269
SemQuest: University of Houston's Semantics-based Question Answering System
Araly Barrera, Rakesh M. Verma, Ryan Vincent
Proceedings of the Fourth Text Analysis Conference, {TAC} 2011, Gaithersburg, Maryland, USA, November 14-15, 2011, {NIST}, 2011
A Ranking-based Approach for Multiple-document Information Extraction
Araly Barrera, Rakesh M. Verma
Proceedings of the Third Text Analysis Conference, {TAC} 2010, Gaithersburg, Maryland, USA, November 15-16, 2010, {NIST}, 2010
R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks
Sam Blackshear, Rakesh M. Verma
Sung Y. Shin, Sascha Ossowski, Michael Schumacher, Mathew J. Palakal, Chih{-}Cheng Hung, Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, {ACM}, 2010, pp. 1985--1992
Uniqueness of Normal Forms is Decidable for Shallow Term Rewrite Systems
Nicholas R. Radcliffe, Rakesh M. Verma
LIPIcs, Kamal Lodaya, Meena Mahajan, {IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2010, December 15-18, 2010, Chennai, India, vol. 8, Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, 2010, pp. 284--295
A polynomial algorithm for uniqueness of normal forms of linear shallow term rewrite systems
Julian Zinn, Rakesh M. Verma
Appl. Algebra Eng. Commun. Comput., vol. 21, 2010, pp. 459--485
Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity
Zhiyao Liang, Rakesh M. Verma
Lecture Notes in Computer Science, Atul Prakash, Indranil Gupta, Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings, vol. 5905, Springer, 2009, pp. 101--116
Complexity of Normal Form Properties and Reductions for Term Rewriting Problems
Rakesh M. Verma
Fundam. Informaticae, vol. 92, 2009, pp. 145--168
Semantic Analysis of Association Rules
Ping Chen, Rakesh M. Verma, Janet C. Meininger, Wenyaw Chan
David Wilson, H. Chad Lane, Proceedings of the Twenty-First International Florida Artificial Intelligence Research Society Conference, May 15-17, 2008, Coconut Grove, Florida, {USA}, {AAAI} Press, 2008, pp. 270--275
Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols
Zhiyao Liang, Rakesh M. Verma
Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, {IEEE} Computer Society, 2008, pp. 1067--1074
Complexity of Checking Freshness of Cryptographic Protocols
Zhiyao Liang, Rakesh M. Verma
Lecture Notes in Computer Science, R. Sekar, Arun K. Pujari, Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings, vol. 5352, Springer, 2008, pp. 86--101
New Undecidability Results for Properties of Term Rewrite Systems
Rakesh M. Verma
Electronic Notes in Theoretical Computer Science, G{\"{u}}nter Kniesel, Jorge Sousa Pinto, Ninth International Workshop on Rule-Based Programming, {RULE} 2008, Hagenberg, Austria, July 14-18, 2008, vol. 290, Elsevier, 2008, pp. 69--85
Semantic Multi-Document Update Summarization Techniques
Rakesh M. Verma, David Kent, Ping Chen
Proceedings of the First Text Analysis Conference, {TAC} 2008, Gaithersburg, Maryland, USA, November 17-19, 2008, {NIST}, 2008
Visualization of rule-based programming
Wenshan Yu, Rakesh M. Verma
Roger L. Wainwright, Hisham Haddad, Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, {ACM}, 2008, pp. 1258--1259
Automata theory: its relevance to computer science students and course contents
Michal Armoni, Susan H. Rodger, Moshe Y. Vardi, Rakesh M. Verma
Doug Baldwin, Paul T. Tymann, Susan M. Haller, Ingrid Russell, Proceedings of the 37th {SIGCSE} Technical Symposium on Computer Science Education, {SIGCSE} 2006, Houston, Texas, USA, March 3-5, 2006, {ACM}, 2006, pp. 197--198
A Query-Based Medical Information Summarization System Using Ontology Knowledge
Ping Chen, Rakesh M. Verma
19th {IEEE} International Symposium on Computer-Based Medical Systems {(CBMS} 2006), 22-23 June 2006, Salt Lake City, Utah, {USA}, {IEEE} Computer Society, 2006, pp. 37--42
A visual and interactive automata theory course emphasizing breadth of automata
Rakesh M. Verma
Jos{\'{e}} C. Cunha, William M. Fleischman, Viera K. Proulx, Jo{\~{a}}o Louren{\c{c}}o, Proceedings of the 10th Annual {SIGCSE} Conference on Innovation and Technology in Computer Science Education, ITiCSE 2005, Caparica, Portugal, June 27-29, 2005, {ACM}, 2005, pp. 325--329
A new decidability technique for ground term rewriting systems with applications
Rakesh M. Verma, Ara Hayrapetyan
{ACM} Trans. Comput. Log., vol. 6, 2005, pp. 102--123
Characterizing Confluence by Rewrite Closure and Right Ground Term Rewrite Systems
Guillem Godoy, Ashish Tiwari, Rakesh M. Verma
Appl. Algebra Eng. Commun. Comput., vol. 15, 2004, pp. 13--36
Deciding confluence of certain term rewriting systems in polynomial time
Guillem Godoy, Ashish Tiwari, Rakesh M. Verma
Ann. Pure Appl. Log., vol. 130, 2004, pp. 33--59