BibTeX records: Shahryar Baki

download as .bib file

@article{DBLP:journals/tdsc/BakiV23,
  author       = {Shahryar Baki and
                  Rakesh M. Verma},
  title        = {Sixteen Years of Phishing User Studies: What Have We Learned?},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1200--1212},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3151103},
  doi          = {10.1109/TDSC.2022.3151103},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BakiV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-04661,
  author       = {Shahryar Baki and
                  Rakesh M. Verma},
  title        = {Sixteen Years of Phishing User Studies: What Have We Learned?},
  journal      = {CoRR},
  volume       = {abs/2109.04661},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.04661},
  eprinttype    = {arXiv},
  eprint       = {2109.04661},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-04661.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AassalBDV20,
  author       = {Ayman El Aassal and
                  Shahryar Baki and
                  Avisha Das and
                  Rakesh M. Verma},
  title        = {An In-Depth Benchmarking and Evaluation of Phishing Detection Research
                  for Security Needs},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {22170--22192},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2969780},
  doi          = {10.1109/ACCESS.2020.2969780},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AassalBDV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/DasBAVD20,
  author       = {Avisha Das and
                  Shahryar Baki and
                  Ayman El Aassal and
                  Rakesh M. Verma and
                  Arthur Dunbar},
  title        = {SoK: {A} Comprehensive Reexamination of Phishing Research From the
                  Security Perspective},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {22},
  number       = {1},
  pages        = {671--708},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMST.2019.2957750},
  doi          = {10.1109/COMST.2019.2957750},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/DasBAVD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BakiVG20,
  author       = {Shahryar Baki and
                  Rakesh M. Verma and
                  Omprakash Gnawali},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Scam Augmentation and Customization: Identifying Vulnerable Users
                  and Arming Defenders},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {236--247},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384753},
  doi          = {10.1145/3320269.3384753},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BakiVG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZengZBV20,
  author       = {Victor Zeng and
                  Xin Zhou and
                  Shahryar Baki and
                  Rakesh M. Verma},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {PhishBench 2.0: {A} Versatile and Extendable Benchmarking Framework
                  for Phishing},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2077--2079},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3420017},
  doi          = {10.1145/3372297.3420017},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZengZBV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZengBAVMD20,
  author       = {Victor Zeng and
                  Shahryar Baki and
                  Ayman El Aassal and
                  Rakesh M. Verma and
                  Luis Felipe Teixeira De Moraes and
                  Avisha Das},
  editor       = {Rakesh M. Verma and
                  Latifur Khan and
                  Chilukuri K. Mohan},
  title        = {Diverse Datasets and a Customizable Benchmarking Framework for Phishing},
  booktitle    = {IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop
                  on Security and Privacy Analytics, New Orleans, LA, USA, March 18,
                  2020},
  pages        = {35--41},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3375708.3380313},
  doi          = {10.1145/3375708.3380313},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZengBAVMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-13499,
  author       = {Shahryar Baki and
                  Rakesh M. Verma and
                  Arjun Mukherjee and
                  Omprakash Gnawali},
  title        = {Less is More: Exploiting Social Trust to Increase the Effectiveness
                  of a Deception Attack},
  journal      = {CoRR},
  volume       = {abs/2006.13499},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.13499},
  eprinttype    = {arXiv},
  eprint       = {2006.13499},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-13499.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-00953,
  author       = {Avisha Das and
                  Shahryar Baki and
                  Ayman El Aassal and
                  Rakesh M. Verma and
                  Arthur Dunbar},
  title        = {{SOK:} {A} Comprehensive Reexamination of Phishing Research from the
                  Security Perspective},
  journal      = {CoRR},
  volume       = {abs/1911.00953},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.00953},
  eprinttype    = {arXiv},
  eprint       = {1911.00953},
  timestamp    = {Mon, 11 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-00953.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jodl/MoraesBVL18,
  author       = {Luis F. T. Moraes and
                  Shahryar Baki and
                  Rakesh M. Verma and
                  Daniel Lee},
  title        = {Identifying reference spans: topic modeling and word embeddings help
                  {IR}},
  journal      = {Int. J. Digit. Libr.},
  volume       = {19},
  number       = {2-3},
  pages        = {191--202},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00799-017-0220-z},
  doi          = {10.1007/S00799-017-0220-Z},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jodl/MoraesBVL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BakiVMG17,
  author       = {Shahryar Baki and
                  Rakesh M. Verma and
                  Arjun Mukherjee and
                  Omprakash Gnawali},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Scaling and Effectiveness of Email Masquerade Attacks: Exploiting
                  Natural Language Generation},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {469--482},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053037},
  doi          = {10.1145/3052973.3053037},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BakiVMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eacl/VuppuluriBNV17,
  author       = {Vasanthi Vuppuluri and
                  Shahryar Baki and
                  An Nguyen and
                  Rakesh M. Verma},
  editor       = {Andre Martins and
                  Anselmo Pe{\~{n}}as},
  title        = {{ICE:} Idiom and Collocation Extractor for Research and Education},
  booktitle    = {Proceedings of the 15th Conference of the European Chapter of the
                  Association for Computational Linguistics, {EACL} 2017, Valencia,
                  Spain, April 3-7, 2017, Software Demonstrations},
  pages        = {108--111},
  publisher    = {Association for Computational Linguistics},
  year         = {2017},
  url          = {https://doi.org/10.18653/v1/e17-3027},
  doi          = {10.18653/V1/E17-3027},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eacl/VuppuluriBNV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-02989,
  author       = {Luis F. T. Moraes and
                  Shahryar Baki and
                  Rakesh M. Verma and
                  Daniel Lee},
  title        = {Identifying Reference Spans: Topic Modeling and Word Embeddings help
                  {IR}},
  journal      = {CoRR},
  volume       = {abs/1708.02989},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.02989},
  eprinttype    = {arXiv},
  eprint       = {1708.02989},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-02989.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicling/VermaVNMMBA16,
  author       = {Rakesh M. Verma and
                  Vasanthi Vuppuluri and
                  An Nguyen and
                  Arjun Mukherjee and
                  Ghita Mammar and
                  Shahryar Baki and
                  Reed Armstrong},
  editor       = {Alexander F. Gelbukh},
  title        = {Mining the Web for Collocations: {IR} Models of Term Associations},
  booktitle    = {Computational Linguistics and Intelligent Text Processing - 17th International
                  Conference, CICLing 2016, Konya, Turkey, April 3-9, 2016, Revised
                  Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9623},
  pages        = {177--194},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-75477-2\_11},
  doi          = {10.1007/978-3-319-75477-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/cicling/VermaVNMMBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jcdl/MoraesBVL16,
  author       = {Luis F. T. Moraes and
                  Shahryar Baki and
                  Rakesh M. Verma and
                  Daniel Lee},
  editor       = {Guillaume Cabanac and
                  Muthu Kumar Chandrasekaran and
                  Ingo Frommholz and
                  Kokil Jaidka and
                  Min{-}Yen Kan and
                  Philipp Mayr and
                  Dietmar Wolfram},
  title        = {University of Houston at CL-SciSumm 2016: SVMs with tree kernels and
                  Sentence Similarity},
  booktitle    = {Proceedings of the Joint Workshop on Bibliometric-enhanced Information
                  Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL)}
                  co-located with the Joint Conference on Digital Libraries 2016 {(JCDL}
                  2016), Newark, NJ, USA, June 23, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1610},
  pages        = {113--121},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1610/paper13.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},
  biburl       = {https://dblp.org/rec/conf/jcdl/MoraesBVL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics