\n \n \n
\n
\n\n \n \n \n \n \n \n Diverse Datasets and a Customizable Benchmarking Framework for Phishing.\n \n \n \n \n\n\n \n Zeng, V.; Baki, S.; Aassal, A. E.; Verma, R. M.; Moraes, L. F. T. D.; and Das, A.\n\n\n \n\n\n\n In
Verma, R. M.; Khan, L.; and Mohan, C. K., editor(s),
IWSPA@CODASPY, pages 35-41, 2020. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n Link\n \n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/codaspy/ZengBAVMD20,\n added-at = {2022-10-02T00:00:00.000+0200},\n author = {Zeng, Victor and Baki, Shahryar and Aassal, Ayman El and Verma, Rakesh M. and Moraes, Luis Felipe Teixeira De and Das, Avisha},\n biburl = {https://www.bibsonomy.org/bibtex/22ca3aca9bae98253142531daaa6d706a/dblp},\n booktitle = {IWSPA@CODASPY},\n crossref = {conf/codaspy/2020iwspa},\n editor = {Verma, Rakesh M. and Khan, Latifur and Mohan, Chilukuri K.},\n ee = {https://doi.org/10.1145/3375708.3380313},\n interhash = {096c6b0b0e5f4668851c2f3eec8fc82d},\n intrahash = {2ca3aca9bae98253142531daaa6d706a},\n isbn = {978-1-4503-7115-5},\n keywords = {dblp},\n pages = {35-41},\n publisher = {ACM},\n timestamp = {2024-04-10T11:57:37.000+0200},\n title = {Diverse Datasets and a Customizable Benchmarking Framework for Phishing.},\n url = {http://dblp.uni-trier.de/db/conf/codaspy/iwspa2020.html#ZengBAVMD20},\n year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n PhishBench 2.0: A Versatile and Extendable Benchmarking Framework for Phishing.\n \n \n \n \n\n\n \n Zeng, V.; Zhou, X.; Baki, S.; and Verma, R. M.\n\n\n \n\n\n\n In Ligatti, J.; Ou, X.; Katz, J.; and Vigna, G., editor(s),
CCS, pages 2077-2079, 2020. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n Link\n \n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/ccs/ZengZBV20,\n added-at = {2022-10-02T00:00:00.000+0200},\n author = {Zeng, Victor and Zhou, Xin and Baki, Shahryar and Verma, Rakesh M.},\n biburl = {https://www.bibsonomy.org/bibtex/20298a35ff6963fdbaa0bcd33492fb876/dblp},\n booktitle = {CCS},\n crossref = {conf/ccs/2020},\n editor = {Ligatti, Jay and Ou, Xinming and Katz, Jonathan and Vigna, Giovanni},\n ee = {https://doi.org/10.1145/3372297.3420017},\n interhash = {f1329c1b0d1af0daba0d7d38b395be15},\n intrahash = {0298a35ff6963fdbaa0bcd33492fb876},\n isbn = {978-1-4503-7089-9},\n keywords = {dblp},\n pages = {2077-2079},\n publisher = {ACM},\n timestamp = {2024-04-10T06:17:27.000+0200},\n title = {PhishBench 2.0: A Versatile and Extendable Benchmarking Framework for Phishing.},\n url = {http://dblp.uni-trier.de/db/conf/ccs/ccs2020.html#ZengZBV20},\n year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Phishing Sites Detection from a Web Developer's Perspective Using Machine Learning.\n \n \n \n \n\n\n \n Zhou, X.; and Verma, R. M.\n\n\n \n\n\n\n In
HICSS, pages 1-10, 2020. ScholarSpace\n
\n\n
\n\n
\n\n
\n\n \n \n Link\n \n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/hicss/ZhouV20,\n added-at = {2022-05-04T00:00:00.000+0200},\n author = {Zhou, Xin and Verma, Rakesh M.},\n biburl = {https://www.bibsonomy.org/bibtex/2a8ac4917715e5760d6fef19f60a22109/dblp},\n booktitle = {HICSS},\n crossref = {conf/hicss/2020},\n ee = {https://hdl.handle.net/10125/64536},\n interhash = {4417c751a766ade53123b897335970c9},\n intrahash = {a8ac4917715e5760d6fef19f60a22109},\n keywords = {dblp},\n pages = {1-10},\n publisher = {ScholarSpace},\n timestamp = {2024-04-10T21:23:07.000+0200},\n title = {Phishing Sites Detection from a Web Developer's Perspective Using Machine Learning.},\n url = {http://dblp.uni-trier.de/db/conf/hicss/hicss2020.html#ZhouV20},\n year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Experiments in Extractive Summarization: Integer Linear Programming, Term/Sentence Scoring, and Title-driven Models.\n \n \n \n \n\n\n \n Lee, D.; Verma, R. M.; Das, A.; and Mukherjee, A.\n\n\n \n\n\n\n
CoRR, abs/2008.00140. 2020.\n
\n\n
\n\n
\n\n
\n\n \n \n Link\n \n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@article{journals/corr/abs-2008-00140,\n added-at = {2021-10-08T00:00:00.000+0200},\n author = {Lee, Daniel and Verma, Rakesh M. and Das, Avisha and Mukherjee, Arjun},\n biburl = {https://www.bibsonomy.org/bibtex/2ba21879627bde7c74205df738a3617d5/dblp},\n ee = {https://arxiv.org/abs/2008.00140},\n interhash = {26e2cc5a08c9ee7c0d68484c7b254fa7},\n intrahash = {ba21879627bde7c74205df738a3617d5},\n journal = {CoRR},\n keywords = {dblp},\n timestamp = {2024-04-08T23:04:07.000+0200},\n title = {Experiments in Extractive Summarization: Integer Linear Programming, Term/Sentence Scoring, and Title-driven Models.},\n url = {http://dblp.uni-trier.de/db/journals/corr/corr2008.html#abs-2008-00140},\n volume = {abs/2008.00140},\n year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders.\n \n \n \n \n\n\n \n Baki, S.; Verma, R. M.; and Gnawali, O.\n\n\n \n\n\n\n In Sun, H.; Shieh, S.; Gu, G.; and Ateniese, G., editor(s),
AsiaCCS, pages 236-247, 2020. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n Link\n \n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/ccs/BakiVG20,\n added-at = {2021-09-23T00:00:00.000+0200},\n author = {Baki, Shahryar and Verma, Rakesh M. and Gnawali, Omprakash},\n biburl = {https://www.bibsonomy.org/bibtex/2695279f81210fbb62dc9190c48a36749/dblp},\n booktitle = {AsiaCCS},\n crossref = {conf/ccs/2020asia},\n editor = {Sun, Hung-Min and Shieh, Shiuh-Pyng and Gu, Guofei and Ateniese, Giuseppe},\n ee = {https://doi.org/10.1145/3320269.3384753},\n interhash = {124917f43847ca4f6933253636cca042},\n intrahash = {695279f81210fbb62dc9190c48a36749},\n isbn = {978-1-4503-6750-9},\n keywords = {dblp},\n pages = {236-247},\n publisher = {ACM},\n timestamp = {2024-04-10T09:01:04.000+0200},\n title = {Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders.},\n url = {http://dblp.uni-trier.de/db/conf/ccs/asiaccs2020.html#BakiVG20},\n year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Adversarial Machine Learning for Text.\n \n \n \n \n\n\n \n Lee, D.; and Verma, R. M.\n\n\n \n\n\n\n In
Verma, R. M.; Khan, L.; and Mohan, C. K., editor(s),
IWSPA@CODASPY, pages 33-34, 2020. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n Link\n \n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/codaspy/LeeV20,\n added-at = {2021-09-23T00:00:00.000+0200},\n author = {Lee, Daniel and Verma, Rakesh M.},\n biburl = {https://www.bibsonomy.org/bibtex/2526b72b1081bde7c38ff50f707688a05/dblp},\n booktitle = {IWSPA@CODASPY},\n crossref = {conf/codaspy/2020iwspa},\n editor = {Verma, Rakesh M. and Khan, Latifur and Mohan, Chilukuri K.},\n ee = {https://doi.org/10.1145/3375708.3380551},\n interhash = {a3b6dd9592c5f786f115e3e887faf7f0},\n intrahash = {526b72b1081bde7c38ff50f707688a05},\n isbn = {978-1-4503-7115-5},\n keywords = {dblp},\n pages = {33-34},\n publisher = {ACM},\n timestamp = {2024-04-10T11:57:37.000+0200},\n title = {Adversarial Machine Learning for Text.},\n url = {http://dblp.uni-trier.de/db/conf/codaspy/iwspa2020.html#LeeV20},\n year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Developing A Compelling Vision for Winning the Cybersecurity Arms Race.\n \n \n \n \n\n\n \n Bertino, E.; Singhal, A.; Srinivasagopalan, S.; and Verma, R. M.\n\n\n \n\n\n\n In Roussev, V.; Thuraisingham, B.; Carminati, B.; and Kantarcioglu, M., editor(s),
CODASPY, pages 220-222, 2020. ACM\n
Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020.\n\n
\n\n
\n\n
\n\n \n \n Link\n \n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/codaspy/BertinoSSV20,\n added-at = {2021-09-23T00:00:00.000+0200},\n author = {Bertino, Elisa and Singhal, Anoop and Srinivasagopalan, Srivathsan and Verma, Rakesh M.},\n biburl = {https://www.bibsonomy.org/bibtex/2613b3b2657f57e95bb1e567850bba1c7/dblp},\n booktitle = {CODASPY},\n crossref = {conf/codaspy/2020},\n editor = {Roussev, Vassil and Thuraisingham, Bhavani and Carminati, Barbara and Kantarcioglu, Murat},\n ee = {https://doi.org/10.1145/3374664.3379538},\n interhash = {fba2cd576b7f78756dc20a67fccf4450},\n intrahash = {613b3b2657f57e95bb1e567850bba1c7},\n isbn = {978-1-4503-7107-0},\n keywords = {dblp},\n note = {Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020.},\n pages = {220-222},\n publisher = {ACM},\n timestamp = {2024-04-09T11:17:01.000+0200},\n title = {Developing A Compelling Vision for Winning the Cybersecurity Arms Race.},\n url = {http://dblp.uni-trier.de/db/conf/codaspy/codaspy2020.html#BertinoSSV20},\n year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs.\n \n \n \n \n\n\n \n Aassal, A. E.; Baki, S.; Das, A.; and Verma, R. M.\n\n\n \n\n\n\n
IEEE Access, 8: 22170-22192. 2020.\n
\n\n
\n\n
\n\n
\n\n \n \n Link\n \n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@article{journals/access/AassalBDV20,\n added-at = {2021-09-23T00:00:00.000+0200},\n author = {Aassal, Ayman El and Baki, Shahryar and Das, Avisha and Verma, Rakesh M.},\n biburl = {https://www.bibsonomy.org/bibtex/2356a03922658fecfb84c00fd72cb17f7/dblp},\n ee = {https://doi.org/10.1109/ACCESS.2020.2969780},\n interhash = {c87fafa5479585d51d4452cf857eb89e},\n intrahash = {356a03922658fecfb84c00fd72cb17f7},\n journal = {IEEE Access},\n keywords = {dblp},\n pages = {22170-22192},\n timestamp = {2024-04-08T13:39:49.000+0200},\n title = {An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs.},\n url = {http://dblp.uni-trier.de/db/journals/access/access8.html#AassalBDV20},\n volume = 8,\n year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Poster: A Modular and Innovative Security Analytics Course.\n \n \n \n \n\n\n \n Verma, R. M.\n\n\n \n\n\n\n In Zhang, J.; Sherriff, M.; Heckman, S.; Cutter, P. A.; and Monge, A. E., editor(s),
SIGCSE, pages 1352, 2020. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n Link\n \n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/sigcse/Verma20,\n added-at = {2021-09-23T00:00:00.000+0200},\n author = {Verma, Rakesh M.},\n biburl = {https://www.bibsonomy.org/bibtex/2fbf52793e893771434c09a947d3ee1f3/dblp},\n booktitle = {SIGCSE},\n crossref = {conf/sigcse/2020},\n editor = {Zhang, Jian and Sherriff, Mark and Heckman, Sarah and Cutter, Pamela A. and Monge, Alvaro E.},\n ee = {https://doi.org/10.1145/3328778.3372649},\n interhash = {f2c3b54c5c4b316fa905ce0c36275e54},\n intrahash = {fbf52793e893771434c09a947d3ee1f3},\n isbn = {978-1-4503-6793-6},\n keywords = {dblp},\n pages = 1352,\n publisher = {ACM},\n timestamp = {2024-04-09T17:37:38.000+0200},\n title = {Poster: A Modular and Innovative Security Analytics Course.},\n url = {http://dblp.uni-trier.de/db/conf/sigcse/sigcse2020.html#Verma20},\n year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Can Machines Tell Stories? A Comparative Study of Deep Neural Language Models and Metrics.\n \n \n \n \n\n\n \n Das, A.; and Verma, R. M.\n\n\n \n\n\n\n
IEEE Access, 8: 181258-181292. 2020.\n
\n\n
\n\n
\n\n
\n\n \n \n Link\n \n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@article{journals/access/DasV20,\n added-at = {2020-10-20T00:00:00.000+0200},\n author = {Das, Avisha and Verma, Rakesh M.},\n biburl = {https://www.bibsonomy.org/bibtex/2d4f7dee5e2954928023c31f38705900f/dblp},\n ee = {https://doi.org/10.1109/ACCESS.2020.3023421},\n interhash = {de651e03bf18fb1c9066ca2cf608483a},\n intrahash = {d4f7dee5e2954928023c31f38705900f},\n journal = {IEEE Access},\n keywords = {dblp},\n pages = {181258-181292},\n timestamp = {2020-10-21T11:35:52.000+0200},\n title = {Can Machines Tell Stories? A Comparative Study of Deep Neural Language Models and Metrics.},\n url = {http://dblp.uni-trier.de/db/journals/access/access8.html#DasV20},\n volume = 8,\n year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Modeling Coherency in Generated Emails by Leveraging Deep Neural Learners.\n \n \n \n \n\n\n \n Das, A.; and Verma, R. M.\n\n\n \n\n\n\n
CoRR, abs/2007.07403. 2020.\n
\n\n
\n\n
\n\n
\n\n \n \n Link\n \n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@article{journals/corr/abs-2007-07403,\n added-at = {2020-07-21T00:00:00.000+0200},\n author = {Das, Avisha and Verma, Rakesh M.},\n biburl = {https://www.bibsonomy.org/bibtex/260cd84226170f30b5ed6fd6242c1e3e5/dblp},\n ee = {https://arxiv.org/abs/2007.07403},\n interhash = {18a68ce5325f0eb1b14fe772af45aae4},\n intrahash = {60cd84226170f30b5ed6fd6242c1e3e5},\n journal = {CoRR},\n keywords = {dblp},\n timestamp = {2020-07-24T00:28:06.000+0200},\n title = {Modeling Coherency in Generated Emails by Leveraging Deep Neural Learners.},\n url = {http://dblp.uni-trier.de/db/journals/corr/corr2007.html#abs-2007-07403},\n volume = {abs/2007.07403},\n year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective.\n \n \n \n \n\n\n \n Das, A.; Baki, S.; Aassal, A. E.; Verma, R. M.; and Dunbar, A.\n\n\n \n\n\n\n
IEEE Commun. Surv. Tutorials, 22(1): 671-708. 2020.\n
\n\n
\n\n
\n\n
\n\n \n \n Link\n \n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n\n\n\n
\n
@article{journals/comsur/DasBAVD20,\n added-at = {2020-04-09T00:00:00.000+0200},\n author = {Das, Avisha and Baki, Shahryar and Aassal, Ayman El and Verma, Rakesh M. and Dunbar, Arthur},\n biburl = {https://www.bibsonomy.org/bibtex/274797b96958af2fca30d6bf3dee85d9c/dblp},\n ee = {https://doi.org/10.1109/COMST.2019.2957750},\n interhash = {1562422c544d86733257e7f2017922b3},\n intrahash = {74797b96958af2fca30d6bf3dee85d9c},\n journal = {IEEE Commun. Surv. Tutorials},\n keywords = {dblp},\n number = 1,\n pages = {671-708},\n timestamp = {2020-04-10T11:48:15.000+0200},\n title = {SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective.},\n url = {http://dblp.uni-trier.de/db/journals/comsur/comsur22.html#DasBAVD20},\n volume = 22,\n year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n