Follow
Narasimha Shashidhar
Title
Cited by
Cited by
Year
Detecting phishing emails the natural language way
R Verma, N Shashidhar, N Hossain
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
972012
Do Private and Portable Web Browsers Leave Incriminating Evidence?
D Ohana, N Shashidhar
The IEEE Computer Society's Security and Privacy Workshops (SPW 2013), 2013
84*2013
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain
US Patent App. 14/015,524, 2015
752015
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain, N Rai
US Patent 10,404,745, 2019
482019
Scalable secure MJPEG video streaming
L Chen, N Shashidhar, Q Liu
2012 26th International Conference on Advanced Information Networking and …, 2012
332012
Digital forensic analysis on prefetch files
N Shashidhar, D Novak
International Journal of Information Security Science 4 (2), 39-49, 2015
272015
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges
L Chen, L Xu, X Yuan, N Shashidhar
2015 International Conference on Computing, Networking and Communications …, 2015
232015
Tampering with special purpose trusted computing devices: A case study in optical scan e-voting
A Kiayias, L Michel, A Russell, N Shashidhar, A See, A Shvartsman, ...
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
192007
An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal.
A Kiayias, L Michel, A Russell, N Sashidar, A See, AA Shvartsman
EVT, 2007
192007
Security assessment of the Diebold optical scan voting terminal
A Kiayias, L Michel, A Russell, AA Shvartsman, UCVTR Center, ...
UConn Voting Technology Research (VoTeR) Center, 2006
172006
Using ITIL 4 in security management
D Berger, N Shashidhar, C Varol
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020
132020
Taking total control of voting systems: Firmware manipulations on an optical scan voting terminal
S Davtyan, S Kentros, A Kiayias, L Michel, N Nicolaou, A Russell, A See, ...
Proceedings of the 2009 ACM symposium on Applied Computing, 2049-2053, 2009
132009
Ransomware analysis and defense-WannaCry and the Win32 environment
J Jones
International Journal of Information Security Science 6 (4), 57-69, 2017
122017
Two-pronged phish snagging
R Verma, N Shashidhar, N Hossain
2012 Seventh International Conference on Availability, Reliability and …, 2012
122012
Forensic analysis of wear leveling on solid-state media
A Neyaz, N Shashidhar, U Karabiyik
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
92018
A phishing model and its applications to evaluating phishing attacks
N Shashidhar, L Chen
School of Computer and Information Science, Security Research Centre, Edith …, 2011
92011
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
S Davtyan, S Kentros, A Kiayias, L Michel, NC Nicolaou, A Russell, A See, ...
EVT, 2008
92008
Interplay of digital forensics in ediscovery
S Krishnan, N Shashidhar
International Journal of Computer Science and Security (IJCSS) 15 (2), 19, 2021
82021
Low Budget Forensic Drive Imaging Using Arm Based Single Board Computers
E Olson, N Shashidhar
Journal of Digital Forensics, Security and Law 11 (1), 3, 2016
82016
Klinik der Muskelrelaxation: 50 Jahre nach Griffith und Johnson
E Kirchner, W Seitz
Springer-Verlag, 2013
8*2013
The system can't perform the operation now. Try again later.
Articles 1–20