An efficient multiversion access structure PJ Varman, RM Verma Knowledge and Data Engineering, IEEE Transactions on 9 (3), 391-409, 1997 | 158 | 1997 |
Detecting Phishing Emails the Natural Language Way R Verma, N Shashidhar, N Hossain European Symp. on Research in Computer Security, 824-841, 2012 | 62 | 2012 |
On the character of phishing URLs: Accurate and robust statistical learning classifiers R Verma, K Dyer Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 57 | 2015 |
A query-based medical information summarization system using ontology knowledge P Chen, R Verma Proceedings of the IEEE 2006 Symposium on Computer-Based Medical Systems …, 2006 | 52 | 2006 |
Automatic phishing email detection based on natural language processing techniques R Verma, NK Shashidhar, N Hossain US Patent App. 14/015,524, 2015 | 49 | 2015 |
Combining syntax and semantics for automatic extractive single-document summarization A Barrera, R Verma Computational Linguistics and Intelligent Text Processing, 366-377, 2012 | 48 | 2012 |
Term matching on parallel computers R Ramesh, RM Verma, T Krishnaprasad, IV Ramakrishnan The Journal of Logic Programming 6 (3), 213-228, 1989 | 47 | 1989 |
A Semantic Free-text Summarization System Using Ontology Knowledge R Verma, P Chen, W Lu | 37 | 2008 |
What's in a URL: Fast Feature Extraction and Malicious URL Detection R Verma, A Das IWSPA, 2017 | 35 | 2017 |
An analysis of a good algorithm for the subtree problem, corrected RM Verma, SW Reyner SIAM Journal on Computing 18 (5), 906-908, 1989 | 34 | 1989 |
Semantic feature selection for text with application to phishing email detection R Verma, N Hossain International Conference on Information Security and Cryptology, 455-468, 2013 | 30 | 2013 |
Local and symbolic bisimulation using tabled constraint logic programming S Basu, M Mukund, CR Ramakrishnan, IV Ramakrishnan, R Verma International Conference on Logic Programming, 166-180, 2001 | 30 | 2001 |
Tight bounds for prefetching and buffer management algorithms for parallel I/O systems PJ Varman, RM Verma Parallel and Distributed Systems, IEEE Transactions on 10 (12), 1262-1275, 1999 | 30 | 1999 |
RPO constraint solving is in NP P Narendran, M Rusinowitch, R Verma Computer Science Logic, 385-398, 1998 | 30 | 1998 |
On the confluence of linear shallow term rewrite systems G Godoy, A Tiwari, R Verma STACS, 85-96, 2003 | 29 | 2003 |
The embodied nature of narrative knowledge: A cross-study analysis of embodied knowledge in teaching, learning, and life C Craig, J You, Y Zou, R Verma, D Stokes, P Evans, G Curtis Teaching and Teacher Education 71 (329), e340, 2018 | 28 | 2018 |
The influence of parents on undergraduate and graduate entering the STEM disciplines and STEM careers C Craig, R Verma, D Stokes, P Evans, B Abrol International Journal of Science Education, 2018 | 26 | 2018 |
University of Houston at CL-SciSumm 2016: SVMs with tree kernels and Sentence Similarity L Moraes, S Baki, R Verma, D Lee BIRNDL, 2016 | 25 | 2016 |
Automatic phishing email detection based on natural language processing techniques R Verma, NK Shashidhar, N Hossain, N Rai US Patent 10,404,745, 2019 | 24 | 2019 |
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students R Verma, M Kantarcioglou, D Marchette, E Leiss, T Solorio IEEE Security and Privacy 13 (6), 60-65, 2015 | 24 | 2015 |