Folgen
Narasimha Shashidhar
Titel
Zitiert von
Zitiert von
Jahr
Detecting phishing emails the natural language way
R Verma, N Shashidhar, N Hossain
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
1082012
Do Private and Portable Web Browsers Leave Incriminating Evidence?
D Ohana, N Shashidhar
The IEEE Computer Society's Security and Privacy Workshops (SPW 2013), 2013
91*2013
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain
US Patent App. 14/015,524, 2015
872015
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain, N Rai
US Patent 10,404,745, 2019
762019
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges
L Chen, L Xu, X Yuan, N Shashidhar
2015 International Conference on Computing, Networking and Communications …, 2015
432015
Scalable secure MJPEG video streaming
L Chen, N Shashidhar, Q Liu
2012 26th International Conference on Advanced Information Networking and …, 2012
342012
Digital forensic analysis on prefetch files
N Shashidhar, D Novak
International Journal of Information Security Science 4 (2), 39-49, 2015
292015
Tampering with special purpose trusted computing devices: A case study in optical scan e-voting
A Kiayias, L Michel, A Russell, N Shashidhar, A See, A Shvartsman, ...
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
202007
An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal.
A Kiayias, L Michel, A Russell, N Sashidar, A See, AA Shvartsman
EVT, 2007
192007
Using ITIL 4 in security management
D Berger, N Shashidhar, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020
162020
Security assessment of the Diebold optical scan voting terminal
A Kiayias, L Michel, A Russell, AA Shvartsman, UCVTR Center, ...
UConn Voting Technology Research (VoTeR) Center, 2006
162006
Ransomware analysis and defense-wannacry and the win32 environment
J Jones
International Journal of Information Security Science 6 (4), 57-69, 2017
152017
Taking total control of voting systems: Firmware manipulations on an optical scan voting terminal
S Davtyan, S Kentros, A Kiayias, L Michel, N Nicolaou, A Russell, A See, ...
Proceedings of the 2009 ACM symposium on Applied Computing, 2049-2053, 2009
142009
Two-pronged phish snagging
R Verma, N Shashidhar, N Hossain
2012 Seventh International Conference on Availability, Reliability and …, 2012
132012
Deception detection using machine learning
AA Ceballos Delgado, W Glisson, N Shashidhar, J Mcdonald, G Grispos, ...
112021
Forensic analysis of wear leveling on solid-state media
A Neyaz, N Shashidhar, U Karabiyik
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
112018
Interplay of digital forensics in ediscovery
S Krishnan, N Shashidhar
International Journal of Computer Science and Security (IJCSS) 15 (2), 19, 2021
102021
Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console
L Chen, N Shashidhar, D Rawat, M Yang, C Kadlec
2016 International Conference on Computing, Networking and Communications …, 2016
102016
A phishing model and its applications to evaluating phishing attacks
N Shashidhar, L Chen
School of Computer and Information Science, Security Research Centre, Edith …, 2011
92011
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
S Davtyan, S Kentros, A Kiayias, L Michel, NC Nicolaou, A Russell, A See, ...
EVT, 2008
92008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20