Folgen
Narasimha Shashidhar
Titel
Zitiert von
Zitiert von
Jahr
Detecting phishing emails the natural language way
R Verma, N Shashidhar, N Hossain
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
1242012
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain
US Patent App. 14/015,524, 2015
972015
Do Private and Portable Web Browsers Leave Incriminating Evidence?
D Ohana, N Shashidhar
The IEEE Computer Society's Security and Privacy Workshops (SPW 2013), 2013
93*2013
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain, N Rai
US Patent 10,404,745, 2019
922019
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges
L Chen, L Xu, X Yuan, N Shashidhar
2015 International Conference on Computing, Networking and Communications …, 2015
422015
Scalable secure MJPEG video streaming
L Chen, N Shashidhar, Q Liu
2012 26th International Conference on Advanced Information Networking and …, 2012
362012
Digital forensic analysis on prefetch files
N Shashidhar, D Novak
International Journal of Information Security Science 4 (2), 39-49, 2015
302015
Using ITIL 4 in security management
D Berger, N Shashidhar, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020
212020
Tampering with special purpose trusted computing devices: A case study in optical scan e-voting
A Kiayias, L Michel, A Russell, N Shashidhar, A See, A Shvartsman, ...
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
202007
An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal.
A Kiayias, L Michel, A Russell, N Sashidar, A See, AA Shvartsman
EVT, 2007
192007
Deception detection using machine learning
AA Ceballos Delgado, W Glisson, N Shashidhar, J Mcdonald, G Grispos, ...
172021
Ransomware analysis and defense-wannacry and the win32 environment
J Jones
International Journal of Information Security Science 6 (4), 57-69, 2017
172017
Security assessment of the Diebold optical scan voting terminal
A Kiayias, L Michel, A Russell, AA Shvartsman, UCVTR Center, ...
UConn Voting Technology Research (VoTeR) Center, 2006
162006
Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools
A Neyaz, N Shashidhar, C Varol, A Rasheed
2022 10th International Symposium on Digital Forensics and Security (ISDFS …, 2022
152022
Two-pronged phish snagging
R Verma, N Shashidhar, N Hossain
2012 Seventh International Conference on Availability, Reliability and …, 2012
142012
Taking total control of voting systems: Firmware manipulations on an optical scan voting terminal
S Davtyan, S Kentros, A Kiayias, L Michel, N Nicolaou, A Russell, A See, ...
Proceedings of the 2009 ACM symposium on Applied Computing, 2049-2053, 2009
142009
Interplay of digital forensics in ediscovery
S Krishnan, N Shashidhar
International Journal of Computer Science and Security (IJCSS) 15 (2), 19, 2021
132021
Forensic analysis of wear leveling on solid-state media
A Neyaz, N Shashidhar, U Karabiyik
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
122018
Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console
L Chen, N Shashidhar, D Rawat, M Yang, C Kadlec
2016 International Conference on Computing, Networking and Communications …, 2016
112016
On-premises versus SECaaS security models
LF Plá, N Shashidhar, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020
92020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20