Narasimha Shashidhar
Title
Cited by
Cited by
Year
Do Private and Portable Web Browsers Leave Incriminating Evidence?
D Ohana, N Shashidhar
The IEEE Computer Society's Security and Privacy Workshops (SPW 2013), 2013
68*2013
Detecting phishing emails the natural language way
R Verma, N Shashidhar, N Hossain
European Symposium on Research in Computer Security, 824-841, 2012
562012
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain
US Patent App. 14/015,524, 2015
522015
Scalable secure MJPEG video streaming
L Chen, N Shashidhar, Q Liu
2012 26th International Conference on Advanced Information Networking and …, 2012
292012
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain, N Rai
US Patent 10,404,745, 2019
242019
Security assessment of the Diebold optical scan voting terminal
A Kiayias, L Michel, A Russell, AA Shvartsman, UCVTR Center, ...
UConn Voting Technology Research (VoTeR) Center, 2006
182006
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges
L Chen, L Xu, X Yuan, N Shashidhar
2015 International Conference on Computing, Networking and Communications …, 2015
172015
Tampering with special purpose trusted computing devices: A case study in optical scan e-voting
A Kiayias, L Michel, A Russell, N Shashidhar, A See, A Shvartsman, ...
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
172007
Digital forensic analysis on prefetch files
NK Shashidhar, D Novak
International Journal of Information Security Science 4 (2), 39-49, 2015
162015
An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal.
A Kiayias, L Michel, A Russell, N Sashidar, A See, AA Shvartsman
EVT, 2007
162007
Taking total control of voting systems: Firmware manipulations on an optical scan voting terminal
S Davtyan, S Kentros, A Kiayias, L Michel, N Nicolaou, A Russell, A See, ...
Proceedings of the 2009 ACM symposium on Applied Computing, 2049-2053, 2009
122009
Two-pronged phish snagging
R Verma, N Shashidhar, N Hossain
2012 Seventh International Conference on Availability, Reliability and …, 2012
112012
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
S Davtyan, S Kentros, A Kiayias, L Michel, NC Nicolaou, A Russell, A See, ...
EVT, 2008
92008
Ransomware analysis and defense-WannaCry and the Win32 environment
NK Shashidhar
International Journal of Information Security Science 6 (4), 57-69, 2017
82017
A phishing model and its applications to evaluating phishing attacks
N Shashidhar, L Chen
School of Computer and Information Science, Security Research Centre, Edith …, 2011
82011
Analysis of evidence in cloud storage client applications on the Windows platform
R Malik, N Shashidhar, L Chen
Proceedings of the International Conference on Security and Management (SAM), 3, 2015
62015
Phishing email detection the natural language way
R Verma, N Shashidhar, N Hossain
Proc. 17th European Symp. Research in Computer Security, 824-841, 2012
62012
Low Budget Forensic Drive Imaging Using Arm Based Single Board Computers
E Olson, N Shashidhar
Journal of Digital Forensics, Security and Law 11 (1), 3, 2016
52016
The efficacy of epidemic algorithms on detecting node replicas in wireless sensor networks
N Shashidhar, C Kari, R Verma
Journal of Sensor and Actuator Networks 4 (4), 378-409, 2015
52015
Security in Wireless Metropolitan Area Networks
L Chen, N Shashidhar, S Yuan, M Yang
Wireless Network Security, 59-75, 2013
52013
The system can't perform the operation now. Try again later.
Articles 1–20