Narasimha Shashidhar
Title
Cited by
Cited by
Year
Do Private and Portable Web Browsers Leave Incriminating Evidence?
D Ohana, N Shashidhar
The IEEE Computer Society's Security and Privacy Workshops (SPW 2013), 2013
65*2013
Detecting phishing emails the natural language way
R Verma, N Shashidhar, N Hossain
European Symposium on Research in Computer Security, 824-841, 2012
502012
Automatic phishing email detection based on natural language processing techniques
R Verma, NK Shashidhar, N Hossain
US Patent App. 14/015,524, 2015
462015
Scalable secure MJPEG video streaming
L Chen, N Shashidhar, Q Liu
2012 26th International Conference on Advanced Information Networking and …, 2012
302012
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges
L Chen, L Xu, X Yuan, N Shashidhar
2015 International Conference on Computing, Networking and Communications …, 2015
172015
Tampering with special purpose trusted computing devices: A case study in optical scan e-voting
A Kiayias, L Michel, A Russell, N Shashidhar, A See, A Shvartsman, ...
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
172007
An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal.
A Kiayias, L Michel, A Russell, N Sashidar, A See, AA Shvartsman
EVT, 2007
172007
Security assessment of the Diebold optical scan voting terminal
A Kiayias, L Michel, A Russell, AA Shvartsman, UCVTR Center, ...
UConn Voting Technology Research (VoTeR) Center, 2006
172006
Digital forensic analysis on prefetch files
NK Shashidhar, D Novak
International Journal of Information Security Science 4 (2), 39-49, 2015
152015
Taking total control of voting systems: Firmware manipulations on an optical scan voting terminal
S Davtyan, S Kentros, A Kiayias, L Michel, N Nicolaou, A Russell, A See, ...
Proceedings of the 2009 ACM symposium on Applied Computing, 2049-2053, 2009
122009
Two-pronged phish snagging
R Verma, N Shashidhar, N Hossain
2012 Seventh International Conference on Availability, Reliability and …, 2012
102012
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
S Davtyan, S Kentros, A Kiayias, L Michel, NC Nicolaou, A Russell, A See, ...
EVT, 2008
102008
Ransomware Analysis and Defense-WannaCry and the Win32 environment
NK Shashidhar
International Journal of Information Security Science 6 (4), 57-69, 2017
82017
A phishing model and its applications to evaluating phishing attacks
N Shashidhar, L Chen
School of Computer and Information Science, Security Research Centre, Edith …, 2011
72011
Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform
R Malik, N Shashidhar, L Chen
Proceedings of the International Conference on Security and Management (SAM), 3, 2015
62015
Phishing email detection the natural language way
R Verma, N Shashidhar, N Hossain
Proc. 17th European Symp. Research in Computer Security, 824-841, 2012
62012
Robert Koch
M Kirchner
Springer-Verlag, 2013
5*2013
Security in Wireless Metropolitan Area Networks
L Chen, N Shashidhar, S Yuan, M Yang
Wireless Network Security, 59-75, 2013
52013
Low Budget Forensic Drive Imaging Using Arm Based Single Board Computers
E Olson, N Shashidhar
Journal of Digital Forensics, Security and Law 11 (1), 3, 2016
42016
StegoRogue: Steganography in Two-Dimensional Video Game Maps
C Gibbs, N Shashidhar
Advances in Computer Science: an International Journal 4 (3), 141-146, 2015
42015
The system can't perform the operation now. Try again later.
Articles 1–20