BibTeX records: Rakesh M. Verma

download as .bib file

@inproceedings{DBLP:conf/case-ws/QachfarTV24,
  author       = {Fatima Zahra Qachfar and
                  Bryan Tuck and
                  Rakesh M. Verma},
  editor       = {Ali H{\"{u}}rriyetoglu and
                  Hristo Tanev and
                  Surendrabikram Thapa and
                  G{\"{o}}k{\c{c}}e Uludogan},
  title        = {DetectiveReDASers at HSD-2Lang 2024: {A} New Pooling Strategy with
                  Cross-lingual Augmentation and Ensembling for Hate Speech Detection
                  in Low-resource Languages},
  booktitle    = {Proceedings of the 7th Workshop on Challenges and Applications of
                  Automated Extraction of Socio-political Events from Text, {CASE} 2024,
                  St. Julians, Malta, March 22, 2024},
  pages        = {199--204},
  publisher    = {Association for Computational Linguistics},
  year         = {2024},
  url          = {https://aclanthology.org/2024.case-1.28},
  timestamp    = {Tue, 02 Apr 2024 16:32:10 +0200},
  biburl       = {https://dblp.org/rec/conf/case-ws/QachfarTV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BoumberTVQ24,
  author       = {Dainis Boumber and
                  Bryan E. Tuck and
                  Rakesh M. Verma and
                  Fatima Zahra Qachfar},
  editor       = {Hongxin Hu and
                  Andrew H. Sung and
                  Rakesh M. Verma},
  title        = {LLMs for Explainable Few-shot Deception Detection},
  booktitle    = {Proceedings of the 10th {ACM} International Workshop on Security and
                  Privacy Analytics, {IWSPA} 2024, Porto, Portugal, 21 June 2024},
  pages        = {37--47},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643651.3659898},
  doi          = {10.1145/3643651.3659898},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/BoumberTVQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HanksKNV24,
  author       = {Casey Hanks and
                  Shanina Ko and
                  Emily Nguyen and
                  Rakesh M. Verma},
  editor       = {Hongxin Hu and
                  Andrew H. Sung and
                  Rakesh M. Verma},
  title        = {Domain Independent Deception Detection: Feature Sets, {LIWC} Efficacy,
                  and Synthetic Data Challenges},
  booktitle    = {Proceedings of the 10th {ACM} International Workshop on Security and
                  Privacy Analytics, {IWSPA} 2024, Porto, Portugal, 21 June 2024},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643651.3659895},
  doi          = {10.1145/3643651.3659895},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/HanksKNV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coling/BoumberQV24,
  author       = {Dainis Boumber and
                  Fatima Zahra Qachfar and
                  Rakesh M. Verma},
  editor       = {Nicoletta Calzolari and
                  Min{-}Yen Kan and
                  V{\'{e}}ronique Hoste and
                  Alessandro Lenci and
                  Sakriani Sakti and
                  Nianwen Xue},
  title        = {Domain-Agnostic Adapter Architecture for Deception Detection: Extensive
                  Evaluations with the DIFrauD Benchmark},
  booktitle    = {Proceedings of the 2024 Joint International Conference on Computational
                  Linguistics, Language Resources and Evaluation, {LREC/COLING} 2024,
                  20-25 May, 2024, Torino, Italy},
  pages        = {5260--5274},
  publisher    = {{ELRA} and {ICCL}},
  year         = {2024},
  url          = {https://aclanthology.org/2024.lrec-main.468},
  timestamp    = {Thu, 23 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coling/BoumberQV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/QachfarV24,
  author       = {Fatima Zahra Qachfar and
                  Rakesh M. Verma},
  editor       = {Anna Lisa Ferrara and
                  Ram Krishnan},
  title        = {All Your LLMs Belong to Us: Experiments with a New Extortion Phishing
                  Dataset},
  booktitle    = {Data and Applications Security and Privacy {XXXVIII} - 38th Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14901},
  pages        = {241--258},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-65172-4\_15},
  doi          = {10.1007/978-3-031-65172-4\_15},
  timestamp    = {Tue, 30 Jul 2024 21:29:14 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/QachfarV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ida/DangV24,
  author       = {Vu Minh Hoang Dang and
                  Rakesh M. Verma},
  editor       = {Ioanna Miliou and
                  Nico Piatkowski and
                  Panagiotis Papapetrou},
  title        = {Data Quality in {NLP:} Metrics and a Comprehensive Taxonomy},
  booktitle    = {Advances in Intelligent Data Analysis {XXII} - 22nd International
                  Symposium on Intelligent Data Analysis, {IDA} 2024, Stockholm, Sweden,
                  April 24-26, 2024, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14641},
  pages        = {217--229},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58547-0\_18},
  doi          = {10.1007/978-3-031-58547-0\_18},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ida/DangV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/BoumberVQ24,
  author       = {Dainis Boumber and
                  Rakesh M. Verma and
                  Fatima Zahra Qachfar},
  editor       = {Shashi Shekhar and
                  Vagelis Papalexakis and
                  Jing Gao and
                  Zhe Jiang and
                  Matteo Riondato},
  title        = {Blue Sky: Multilingual, Multimodal Domain Independent Deception Detection},
  booktitle    = {Proceedings of the 2024 {SIAM} International Conference on Data Mining,
                  {SDM} 2024, Houston, TX, USA, April 18-20, 2024},
  pages        = {396--399},
  publisher    = {{SIAM}},
  year         = {2024},
  url          = {https://doi.org/10.1137/1.9781611978032.46},
  doi          = {10.1137/1.9781611978032.46},
  timestamp    = {Wed, 03 Jul 2024 17:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/sdm/BoumberVQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2024iwspa,
  editor       = {Hongxin Hu and
                  Andrew H. Sung and
                  Rakesh M. Verma},
  title        = {Proceedings of the 10th {ACM} International Workshop on Security and
                  Privacy Analytics, {IWSPA} 2024, Porto, Portugal, 21 June 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643651},
  doi          = {10.1145/3643651},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2024iwspa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-01019,
  author       = {Rakesh M. Verma and
                  Nachum Dershowitz and
                  Victor Zeng and
                  Dainis Boumber and
                  Xuting Liu},
  title        = {Domain-Independent Deception: {A} New Taxonomy and Linguistic Analysis},
  journal      = {CoRR},
  volume       = {abs/2402.01019},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.01019},
  doi          = {10.48550/ARXIV.2402.01019},
  eprinttype    = {arXiv},
  eprint       = {2402.01019},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-01019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-03171,
  author       = {Fatima Zahra Qachfar and
                  Rakesh M. Verma},
  title        = {Homograph Attacks on Maghreb Sentiment Analyzers},
  journal      = {CoRR},
  volume       = {abs/2402.03171},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.03171},
  doi          = {10.48550/ARXIV.2402.03171},
  eprinttype    = {arXiv},
  eprint       = {2402.03171},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-03171.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-03920,
  author       = {Dainis Boumber and
                  Rakesh M. Verma and
                  Fatima Zahra Qachfar},
  title        = {A Roadmap for Multilingual, Multimodal Domain Independent Deception
                  Detection},
  journal      = {CoRR},
  volume       = {abs/2405.03920},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.03920},
  doi          = {10.48550/ARXIV.2405.03920},
  eprinttype    = {arXiv},
  eprint       = {2405.03920},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-03920.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-17967,
  author       = {Bryan E. Tuck and
                  Rakesh M. Verma},
  title        = {Unmasking the Imposters: In-Domain Detection of Human vs. Machine-Generated
                  Tweets},
  journal      = {CoRR},
  volume       = {abs/2406.17967},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.17967},
  doi          = {10.48550/ARXIV.2406.17967},
  eprinttype    = {arXiv},
  eprint       = {2406.17967},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-17967.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-12026,
  author       = {Rakesh M. Verma and
                  Nachum Dershowitz},
  title        = {The Pitfalls of Publishing in the Age of LLMs: Strange and Surprising
                  Adventures with a High-Impact {NLP} Journal},
  journal      = {CoRR},
  volume       = {abs/2407.12026},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.12026},
  doi          = {10.48550/ARXIV.2407.12026},
  eprinttype    = {arXiv},
  eprint       = {2407.12026},
  timestamp    = {Fri, 23 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-12026.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/DershowitzV23,
  author       = {Nachum Dershowitz and
                  Rakesh M. Verma},
  title        = {Rebutting Rebuttals},
  journal      = {Commun. {ACM}},
  volume       = {66},
  number       = {9},
  pages        = {35--41},
  year         = {2023},
  url          = {https://doi.org/10.1145/3584664},
  doi          = {10.1145/3584664},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/DershowitzV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nle/KarimiSV23,
  author       = {Samaneh Karimi and
                  Azadeh Shakery and
                  Rakesh M. Verma},
  title        = {Enhancement of Twitter event detection using news streams},
  journal      = {Nat. Lang. Eng.},
  volume       = {29},
  number       = {2},
  pages        = {181--200},
  year         = {2023},
  url          = {https://doi.org/10.1017/S1351324921000462},
  doi          = {10.1017/S1351324921000462},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nle/KarimiSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BakiV23,
  author       = {Shahryar Baki and
                  Rakesh M. Verma},
  title        = {Sixteen Years of Phishing User Studies: What Have We Learned?},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1200--1212},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3151103},
  doi          = {10.1109/TDSC.2022.3151103},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BakiV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GholampourV23,
  author       = {Parisa Mehdi Gholampour and
                  Rakesh M. Verma},
  editor       = {David J. Marchette and
                  Andrew H. Sung and
                  Rakesh M. Verma},
  title        = {Adversarial Robustness of Phishing Email Detection Models},
  booktitle    = {Proceedings of the 9th {ACM} International Workshop on Security and
                  Privacy Analytics, IWSPA@CODASPY 2023, Charlotte, NC, USA, 26 April
                  2023},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579987.3586567},
  doi          = {10.1145/3579987.3586567},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GholampourV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semeval/QachfarV23,
  author       = {Fatima Zahra Qachfar and
                  Rakesh M. Verma},
  editor       = {Atul Kr. Ojha and
                  A. Seza Dogru{\"{o}}z and
                  Giovanni Da San Martino and
                  Harish Tayyar Madabushi and
                  Ritesh Kumar and
                  Elisa Sartori},
  title        = {ReDASPersuasion at SemEval-2023 Task 3: Persuasion Detection using
                  Multilingual Transformers and Language Agnostic Features},
  booktitle    = {Proceedings of the The 17th International Workshop on Semantic Evaluation,
                  SemEval@ACL 2023, Toronto, Canada, 13-14 July 2023},
  pages        = {2124--2132},
  publisher    = {Association for Computational Linguistics},
  year         = {2023},
  url          = {https://doi.org/10.18653/v1/2023.semeval-1.293},
  doi          = {10.18653/V1/2023.SEMEVAL-1.293},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/semeval/QachfarV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wanlp/TuckQBV23,
  author       = {Bryan Tuck and
                  Fatima Zahra Qachfar and
                  Dainis Boumber and
                  Rakesh M. Verma},
  editor       = {Hassan Sawaf and
                  Samhaa R. El{-}Beltagy and
                  Wajdi Zaghouani and
                  Walid Magdy and
                  Ahmed Abdelali and
                  Nadi Tomeh and
                  Ibrahim Abu Farha and
                  Nizar Habash and
                  Salam Khalifa and
                  Amr Keleg and
                  Hatem Haddad and
                  Imed Zitouni and
                  Khalil Mrini and
                  Rawan N. Al{-}Matham},
  title        = {DetectiveRedasers at ArAIEval Shared Task: Leveraging Transformer
                  Ensembles for Arabic Deception Detection},
  booktitle    = {Proceedings of ArabicNLP 2023, Singapore (Hybrid), December 7, 2023},
  pages        = {494--501},
  publisher    = {Association for Computational Linguistics},
  year         = {2023},
  url          = {https://doi.org/10.18653/v1/2023.arabicnlp-1.45},
  doi          = {10.18653/V1/2023.ARABICNLP-1.45},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wanlp/TuckQBV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wanlp/QachfarV23,
  author       = {Fatima Zahra Qachfar and
                  Rakesh M. Verma},
  editor       = {Hassan Sawaf and
                  Samhaa R. El{-}Beltagy and
                  Wajdi Zaghouani and
                  Walid Magdy and
                  Ahmed Abdelali and
                  Nadi Tomeh and
                  Ibrahim Abu Farha and
                  Nizar Habash and
                  Salam Khalifa and
                  Amr Keleg and
                  Hatem Haddad and
                  Imed Zitouni and
                  Khalil Mrini and
                  Rawan N. Al{-}Matham},
  title        = {ReDASPersuasion at ArAIEval Shared Task: Multilingual and Monolingual
                  Models For Arabic Persuasion Detection},
  booktitle    = {Proceedings of ArabicNLP 2023, Singapore (Hybrid), December 7, 2023},
  pages        = {549--557},
  publisher    = {Association for Computational Linguistics},
  year         = {2023},
  url          = {https://doi.org/10.18653/v1/2023.arabicnlp-1.54},
  doi          = {10.18653/V1/2023.ARABICNLP-1.54},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wanlp/QachfarV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2023iwspa,
  editor       = {David J. Marchette and
                  Andrew H. Sung and
                  Rakesh M. Verma},
  title        = {Proceedings of the 9th {ACM} International Workshop on Security and
                  Privacy Analytics, IWSPA@CODASPY 2023, Charlotte, NC, USA, 26 April
                  2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579987},
  doi          = {10.1145/3579987},
  timestamp    = {Wed, 26 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2023iwspa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ZhouV22,
  author       = {Xin Zhou and
                  Rakesh M. Verma},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Vulnerability Detection via Multimodal Learning: Datasets and Analysis},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {1225--1227},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3527288},
  doi          = {10.1145/3488932.3527288},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ZhouV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdc/HanksV22,
  author       = {Casey Hanks and
                  Rakesh M. Verma},
  title        = {Data Quality and Linguistic Cues for Domain-independent Deception
                  Detection},
  booktitle    = {{IEEE/ACM} International Conference on Big Data Computing, Applications
                  and Technologies, {BDCAT} 2022, Vancouver, WA, USA, December 6-9,
                  2022},
  pages        = {248--258},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BDCAT56447.2022.00042},
  doi          = {10.1109/BDCAT56447.2022.00042},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bdc/HanksV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/QachfarVM22,
  author       = {Fatima Zahra Qachfar and
                  Rakesh M. Verma and
                  Arjun Mukherjee},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {Leveraging Synthetic Data and {PU} Learning For Phishing Email Detection},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3511524},
  doi          = {10.1145/3508398.3511524},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/QachfarVM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZengLV22,
  author       = {Victor Zeng and
                  Xuting Liu and
                  Rakesh M. Verma},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {Does Deception Leave a Content Independent Stylistic Trace?},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {349--351},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3519358},
  doi          = {10.1145/3508398.3519358},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZengLV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ZhouV22,
  author       = {Xin Zhou and
                  Rakesh M. Verma},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {Software Vulnerability Detection via Multimodal Deep Learning},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {85--103},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_5},
  doi          = {10.1007/978-3-031-29504-1\_5},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ZhouV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2022,
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398},
  doi          = {10.1145/3508398},
  isbn         = {978-1-4503-9220-4},
  timestamp    = {Wed, 20 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2022iwspa,
  editor       = {Andrew H. Sung and
                  Rakesh M. Verma and
                  Roland H. C. Yap},
  title        = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International
                  Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April
                  27, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510548},
  doi          = {10.1145/3510548},
  isbn         = {978-1-4503-9230-3},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2022iwspa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-01738,
  author       = {Rakesh M. Verma and
                  Nachum Dershowitz and
                  Victor Zeng and
                  Xuting Liu},
  title        = {Domain-Independent Deception: Definition, Taxonomy and the Linguistic
                  Cues Debate},
  journal      = {CoRR},
  volume       = {abs/2207.01738},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.01738},
  doi          = {10.48550/ARXIV.2207.01738},
  eprinttype    = {arXiv},
  eprint       = {2207.01738},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-01738.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jis/KarimiSV21,
  author       = {Samaneh Karimi and
                  Azadeh Shakery and
                  Rakesh M. Verma},
  title        = {Online news media website ranking using user-generated content},
  journal      = {J. Inf. Sci.},
  volume       = {47},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1177/0165551519894928},
  doi          = {10.1177/0165551519894928},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jis/KarimiSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecir/HatuaMV21,
  author       = {Amartya Hatua and
                  Arjun Mukherjee and
                  Rakesh M. Verma},
  editor       = {Fabio Saracco and
                  Marco Viviani},
  title        = {On the Feasibility of Using GANs for Claim Verification- Experiments
                  and Analysis},
  booktitle    = {Proceedings of the workshop Reducing Online Misinformation Through
                  Credible Information Retrieval {(ROMCIR} 2021) co-located with 43rd
                  European Conference on Information Retrieval {(ECIR} 2021), Lucca,
                  Italy (On-line), April 1, 2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2838},
  pages        = {35--46},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2838/paper4.pdf},
  timestamp    = {Mon, 21 Aug 2023 07:59:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ecir/HatuaMV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ranlp/HatuaMV21,
  author       = {Amartya Hatua and
                  Arjun Mukherjee and
                  Rakesh M. Verma},
  editor       = {Galia Angelova and
                  Maria Kunilovskaya and
                  Ruslan Mitkov and
                  Ivelina Nikolova{-}Koleva},
  title        = {Claim Verification Using a Multi-GAN Based Model},
  booktitle    = {Proceedings of the International Conference on Recent Advances in
                  Natural Language Processing {(RANLP} 2021), Held Online, 1-3 September,
                  2021},
  pages        = {494--503},
  publisher    = {{INCOMA} Ltd.},
  year         = {2021},
  url          = {https://aclanthology.org/2021.ranlp-1.56},
  timestamp    = {Mon, 13 Nov 2023 12:27:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ranlp/HatuaMV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/Verma21,
  author       = {Rakesh M. Verma},
  editor       = {Mark Sherriff and
                  Laurence D. Merkle and
                  Pamela A. Cutter and
                  Alvaro E. Monge and
                  Judithe Sheard},
  title        = {Capacity Expansion in Cybersecurity: Challenges and Prospects},
  booktitle    = {{SIGCSE} '21: The 52nd {ACM} Technical Symposium on Computer Science
                  Education, Virtual Event, USA, March 13-20, 2021},
  pages        = {1277},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3408877.3439634},
  doi          = {10.1145/3408877.3439634},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/Verma21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/VermaPG21,
  author       = {Rakesh M. Verma and
                  Rangarajan Ray Parthasarathy and
                  Lila Ghemri},
  editor       = {Mark Sherriff and
                  Laurence D. Merkle and
                  Pamela A. Cutter and
                  Alvaro E. Monge and
                  Judithe Sheard},
  title        = {What is the Security Mindset? Can it be Developed?},
  booktitle    = {{SIGCSE} '21: The 52nd {ACM} Technical Symposium on Computer Science
                  Education, Virtual Event, USA, March 13-20, 2021},
  pages        = {1361},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3408877.3439528},
  doi          = {10.1145/3408877.3439528},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/VermaPG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2021,
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337},
  doi          = {10.1145/3422337},
  isbn         = {978-1-4503-8143-7},
  timestamp    = {Wed, 21 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-08001,
  author       = {Amartya Hatua and
                  Arjun Mukherjee and
                  Rakesh M. Verma},
  title        = {Claim Verification using a Multi-GAN based Model},
  journal      = {CoRR},
  volume       = {abs/2103.08001},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.08001},
  eprinttype    = {arXiv},
  eprint       = {2103.08001},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-08001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-04661,
  author       = {Shahryar Baki and
                  Rakesh M. Verma},
  title        = {Sixteen Years of Phishing User Studies: What Have We Learned?},
  journal      = {CoRR},
  volume       = {abs/2109.04661},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.04661},
  eprinttype    = {arXiv},
  eprint       = {2109.04661},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-04661.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AassalBDV20,
  author       = {Ayman El Aassal and
                  Shahryar Baki and
                  Avisha Das and
                  Rakesh M. Verma},
  title        = {An In-Depth Benchmarking and Evaluation of Phishing Detection Research
                  for Security Needs},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {22170--22192},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2969780},
  doi          = {10.1109/ACCESS.2020.2969780},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AassalBDV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DasV20,
  author       = {Avisha Das and
                  Rakesh M. Verma},
  title        = {Can Machines Tell Stories? {A} Comparative Study of Deep Neural Language
                  Models and Metrics},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {181258--181292},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3023421},
  doi          = {10.1109/ACCESS.2020.3023421},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DasV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/DasBAVD20,
  author       = {Avisha Das and
                  Shahryar Baki and
                  Ayman El Aassal and
                  Rakesh M. Verma and
                  Arthur Dunbar},
  title        = {SoK: {A} Comprehensive Reexamination of Phishing Research From the
                  Security Perspective},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {22},
  number       = {1},
  pages        = {671--708},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMST.2019.2957750},
  doi          = {10.1109/COMST.2019.2957750},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/DasBAVD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BakiVG20,
  author       = {Shahryar Baki and
                  Rakesh M. Verma and
                  Omprakash Gnawali},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Scam Augmentation and Customization: Identifying Vulnerable Users
                  and Arming Defenders},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {236--247},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384753},
  doi          = {10.1145/3320269.3384753},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BakiVG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZengZBV20,
  author       = {Victor Zeng and
                  Xin Zhou and
                  Shahryar Baki and
                  Rakesh M. Verma},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {PhishBench 2.0: {A} Versatile and Extendable Benchmarking Framework
                  for Phishing},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2077--2079},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3420017},
  doi          = {10.1145/3372297.3420017},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZengZBV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LeeV20,
  author       = {Daniel Lee and
                  Rakesh M. Verma},
  editor       = {Rakesh M. Verma and
                  Latifur Khan and
                  Chilukuri K. Mohan},
  title        = {Adversarial Machine Learning for Text},
  booktitle    = {IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop
                  on Security and Privacy Analytics, New Orleans, LA, USA, March 18,
                  2020},
  pages        = {33--34},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3375708.3380551},
  doi          = {10.1145/3375708.3380551},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/LeeV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZengBAVMD20,
  author       = {Victor Zeng and
                  Shahryar Baki and
                  Ayman El Aassal and
                  Rakesh M. Verma and
                  Luis Felipe Teixeira De Moraes and
                  Avisha Das},
  editor       = {Rakesh M. Verma and
                  Latifur Khan and
                  Chilukuri K. Mohan},
  title        = {Diverse Datasets and a Customizable Benchmarking Framework for Phishing},
  booktitle    = {IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop
                  on Security and Privacy Analytics, New Orleans, LA, USA, March 18,
                  2020},
  pages        = {35--41},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3375708.3380313},
  doi          = {10.1145/3375708.3380313},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZengBAVMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BertinoSSV20,
  author       = {Elisa Bertino and
                  Anoop Singhal and
                  Srivathsan Srinivasagopalan and
                  Rakesh M. Verma},
  editor       = {Vassil Roussev and
                  Bhavani Thuraisingham and
                  Barbara Carminati and
                  Murat Kantarcioglu},
  title        = {Developing {A} Compelling Vision for Winning the Cybersecurity Arms
                  Race},
  booktitle    = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security
                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},
  pages        = {220--222},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374664.3379538},
  doi          = {10.1145/3374664.3379538},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/BertinoSSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ZhouV20,
  author       = {Xin Zhou and
                  Rakesh M. Verma},
  title        = {Phishing Sites Detection from a Web Developer's Perspective Using
                  Machine Learning},
  booktitle    = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020,
                  Maui, Hawaii, USA, January 7-10, 2020},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2020},
  url          = {https://hdl.handle.net/10125/64536},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/ZhouV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/Verma20,
  author       = {Rakesh M. Verma},
  editor       = {Jian Zhang and
                  Mark Sherriff and
                  Sarah Heckman and
                  Pamela A. Cutter and
                  Alvaro E. Monge},
  title        = {Poster: {A} Modular and Innovative Security Analytics Course},
  booktitle    = {Proceedings of the 51st {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2020, Portland, OR, USA, March 11-14, 2020},
  pages        = {1352},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3328778.3372649},
  doi          = {10.1145/3328778.3372649},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/Verma20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2020iwspa,
  editor       = {Rakesh M. Verma and
                  Latifur Khan and
                  Chilukuri K. Mohan},
  title        = {IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop
                  on Security and Privacy Analytics, New Orleans, LA, USA, March 18,
                  2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3375708},
  doi          = {10.1145/3375708},
  isbn         = {978-1-4503-7115-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2020iwspa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-13499,
  author       = {Shahryar Baki and
                  Rakesh M. Verma and
                  Arjun Mukherjee and
                  Omprakash Gnawali},
  title        = {Less is More: Exploiting Social Trust to Increase the Effectiveness
                  of a Deception Attack},
  journal      = {CoRR},
  volume       = {abs/2006.13499},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.13499},
  eprinttype    = {arXiv},
  eprint       = {2006.13499},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-13499.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-07403,
  author       = {Avisha Das and
                  Rakesh M. Verma},
  title        = {Modeling Coherency in Generated Emails by Leveraging Deep Neural Learners},
  journal      = {CoRR},
  volume       = {abs/2007.07403},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.07403},
  eprinttype    = {arXiv},
  eprint       = {2007.07403},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-07403.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-00140,
  author       = {Daniel Lee and
                  Rakesh M. Verma and
                  Avisha Das and
                  Arjun Mukherjee},
  title        = {Experiments in Extractive Summarization: Integer Linear Programming,
                  Term/Sentence Scoring, and Title-driven Models},
  journal      = {CoRR},
  volume       = {abs/2008.00140},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.00140},
  eprinttype    = {arXiv},
  eprint       = {2008.00140},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-00140.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ShermanDBCSVVOG19,
  author       = {Alan T. Sherman and
                  Josiah Dykstra and
                  Gregory V. Bard and
                  Ankur Chattopadhyay and
                  Filipo Sharevski and
                  Rakesh M. Verma and
                  Ryan Vrecenar and
                  Linda Oliva and
                  Enis Golaszewski and
                  Dhananjay S. Phatak and
                  Travis Scheponik and
                  Geoffrey L. Herman and
                  Dong San Choi and
                  Spencer E. Offenberger and
                  Peter Peterson},
  title        = {The {CATS} Hackathon: Creating and Refining Test Items for Cybersecurity
                  Concept Inventories},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {77--83},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2929812},
  doi          = {10.1109/MSEC.2019.2929812},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ShermanDBCSVVOG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VermaZF19,
  author       = {Rakesh M. Verma and
                  Victor Zeng and
                  Houtan Faridi},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Data Quality for Security Challenges: Case Studies of Phishing, Malware
                  and Intrusion Detection Datasets},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2605--2607},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363267},
  doi          = {10.1145/3319535.3363267},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/VermaZF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/FaridiSV19,
  author       = {Houtan Faridi and
                  Srivathsan Srinivasagopalan and
                  Rakesh M. Verma},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Parameter Tuning and Confidence Limits of Malware Clustering},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {169--171},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3302385},
  doi          = {10.1145/3292006.3302385},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/FaridiSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-09286,
  author       = {Alan T. Sherman and
                  Linda Oliva and
                  Enis Golaszewski and
                  Dhananjay S. Phatak and
                  Travis Scheponik and
                  Geoffrey L. Herman and
                  Dong San Choi and
                  Spencer E. Offenberger and
                  Peter Peterson and
                  Josiah Dykstra and
                  Gregory V. Bard and
                  Ankur Chattopadhyay and
                  Filipo Sharevski and
                  Rakesh M. Verma and
                  Ryan Vrecenar},
  title        = {The {CATS} Hackathon: Creating and Refining Test Items for Cybersecurity
                  Concept Inventories},
  journal      = {CoRR},
  volume       = {abs/1901.09286},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.09286},
  eprinttype    = {arXiv},
  eprint       = {1901.09286},
  timestamp    = {Sat, 02 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-09286.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10607,
  author       = {Rakesh M. Verma and
                  Samaneh Karimi and
                  Daniel Lee and
                  Omprakash Gnawali and
                  Azadeh Shakery},
  title        = {Newswire versus Social Media for Disaster Response and Recovery},
  journal      = {CoRR},
  volume       = {abs/1906.10607},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10607},
  eprinttype    = {arXiv},
  eprint       = {1906.10607},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10607.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-06893,
  author       = {Avisha Das and
                  Rakesh M. Verma},
  title        = {Automated email Generation for Targeted Attacks using Natural Language},
  journal      = {CoRR},
  volume       = {abs/1908.06893},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.06893},
  eprinttype    = {arXiv},
  eprint       = {1908.06893},
  timestamp    = {Mon, 26 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-06893.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-12441,
  author       = {Samaneh Karimi and
                  Azadeh Shakery and
                  Rakesh M. Verma},
  title        = {Online News Media Website Ranking Using User Generated Content},
  journal      = {CoRR},
  volume       = {abs/1910.12441},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.12441},
  eprinttype    = {arXiv},
  eprint       = {1910.12441},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-12441.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-00953,
  author       = {Avisha Das and
                  Shahryar Baki and
                  Ayman El Aassal and
                  Rakesh M. Verma and
                  Arthur Dunbar},
  title        = {{SOK:} {A} Comprehensive Reexamination of Phishing Research from the
                  Security Perspective},
  journal      = {CoRR},
  volume       = {abs/1911.00953},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.00953},
  eprinttype    = {arXiv},
  eprint       = {1911.00953},
  timestamp    = {Mon, 11 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-00953.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jodl/MoraesBVL18,
  author       = {Luis F. T. Moraes and
                  Shahryar Baki and
                  Rakesh M. Verma and
                  Daniel Lee},
  title        = {Identifying reference spans: topic modeling and word embeddings help
                  {IR}},
  journal      = {Int. J. Digit. Libr.},
  volume       = {19},
  number       = {2-3},
  pages        = {191--202},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00799-017-0220-z},
  doi          = {10.1007/S00799-017-0220-Z},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jodl/MoraesBVL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scientometrics/KarimiMDSV18,
  author       = {Samaneh Karimi and
                  Luis F. T. Moraes and
                  Avisha Das and
                  Azadeh Shakery and
                  Rakesh M. Verma},
  title        = {Citance-based retrieval and summarization using {IR} and machine learning},
  journal      = {Scientometrics},
  volume       = {116},
  number       = {2},
  pages        = {1331--1366},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11192-018-2785-8},
  doi          = {10.1007/S11192-018-2785-8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scientometrics/KarimiMDSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChernisV18,
  author       = {Boris Chernis and
                  Rakesh M. Verma},
  editor       = {Rakesh M. Verma and
                  Murat Kantarcioglu},
  title        = {Machine Learning Methods for Software Vulnerability Detection},
  booktitle    = {Proceedings of the Fourth {ACM} International Workshop on Security
                  and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {31--39},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3180445.3180453},
  doi          = {10.1145/3180445.3180453},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChernisV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Verma18,
  author       = {Rakesh M. Verma},
  editor       = {Rakesh M. Verma and
                  Murat Kantarcioglu},
  title        = {Security Analytics: Adapting Data Science for Security Challenges},
  booktitle    = {Proceedings of the Fourth {ACM} International Workshop on Security
                  and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {40--41},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3180445.3180456},
  doi          = {10.1145/3180445.3180456},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/Verma18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/EgoziV18,
  author       = {Gal Egozi and
                  Rakesh M. Verma},
  editor       = {Hanghang Tong and
                  Zhenhui Jessie Li and
                  Feida Zhu and
                  Jeffrey Yu},
  title        = {Phishing Email Detection Using Robust {NLP} Techniques},
  booktitle    = {2018 {IEEE} International Conference on Data Mining Workshops, {ICDM}
                  Workshops, Singapore, Singapore, November 17-20, 2018},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICDMW.2018.00009},
  doi          = {10.1109/ICDMW.2018.00009},
  timestamp    = {Thu, 14 Nov 2019 15:37:05 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/EgoziV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/FaridiSV18,
  author       = {Houtan Faridi and
                  Srivathsan Srinivasagopalan and
                  Rakesh M. Verma},
  editor       = {Hanghang Tong and
                  Zhenhui Jessie Li and
                  Feida Zhu and
                  Jeffrey Yu},
  title        = {Performance Evaluation of Features and Clustering Algorithms for Malware},
  booktitle    = {2018 {IEEE} International Conference on Data Mining Workshops, {ICDM}
                  Workshops, Singapore, Singapore, November 17-20, 2018},
  pages        = {13--22},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICDMW.2018.00010},
  doi          = {10.1109/ICDMW.2018.00010},
  timestamp    = {Thu, 26 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdm/FaridiSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigir/MoraesDKV18,
  author       = {Luis F. T. De Moraes and
                  Avisha Das and
                  Samaneh Karimi and
                  Rakesh M. Verma},
  editor       = {Philipp Mayr and
                  Muthu Kumar Chandrasekaran and
                  Kokil Jaidka},
  title        = {University of Houston @ CL-SciSumm 2018},
  booktitle    = {Proceedings of the 3rd Joint Workshop on Bibliometric-enhanced Information
                  Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL}
                  2018) co-located with the 41st International {ACM} {SIGIR} Conference
                  on Research and Development in Information Retrieval {(SIGIR} 2018),
                  Ann Arbor, USA, July 12, 2018},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2132},
  pages        = {142--149},
  publisher    = {CEUR-WS.org},
  year         = {2018},
  url          = {https://ceur-ws.org/Vol-2132/paper14.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigir/MoraesDKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2018iwspa,
  editor       = {Rakesh M. Verma and
                  Murat Kantarcioglu},
  title        = {Proceedings of the Fourth {ACM} International Workshop on Security
                  and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3180445},
  timestamp    = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2018iwspa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cys/VermaL17,
  author       = {Rakesh M. Verma and
                  Daniel Lee},
  title        = {Extractive Summarization: Limits, Compression, Generalized Model and
                  Heuristics},
  journal      = {Computaci{\'{o}}n y Sistemas},
  volume       = {21},
  number       = {4},
  year         = {2017},
  url          = {https://doi.org/10.13053/cys-21-4-2855},
  doi          = {10.13053/CYS-21-4-2855},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cys/VermaL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ShermanDCCMOSTV17,
  author       = {Alan T. Sherman and
                  Melissa Dark and
                  Agnes H. Chan and
                  Rylan Chong and
                  Thomas H. Morris and
                  Linda Oliva and
                  John A. Springer and
                  Bhavani Thuraisingham and
                  Christopher Vatcher and
                  Rakesh M. Verma and
                  Susanne Wetzel},
  title        = {INSuRE: Collaborating Centers of Academic Excellence Engage Students
                  in Cybersecurity Research},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {4},
  pages        = {72--78},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.3151327},
  doi          = {10.1109/MSP.2017.3151327},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ShermanDCCMOSTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/RadcliffeMV17,
  author       = {Nicholas R. Radcliffe and
                  Luis F. T. Moraes and
                  Rakesh M. Verma},
  title        = {Uniqueness of Normal Forms for Shallow Term Rewrite Systems},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {18},
  number       = {2},
  pages        = {17:1--17:20},
  year         = {2017},
  url          = {https://doi.org/10.1145/3060144},
  doi          = {10.1145/3060144},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocl/RadcliffeMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BakiVMG17,
  author       = {Shahryar Baki and
                  Rakesh M. Verma and
                  Arjun Mukherjee and
                  Omprakash Gnawali},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Scaling and Effectiveness of Email Masquerade Attacks: Exploiting
                  Natural Language Generation},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {469--482},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053037},
  doi          = {10.1145/3052973.3053037},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BakiVMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/VermaD17,
  author       = {Rakesh M. Verma and
                  Avisha Das},
  editor       = {Rakesh M. Verma and
                  Bhavani Thuraisingham},
  title        = {What's in a {URL:} Fast Feature Extraction and Malicious {URL} Detection},
  booktitle    = {Proceedings of the 3rd {ACM} on International Workshop on Security
                  And Privacy Analytics, IWSPA@CODASPY 2017, Scottsdale, Arizona, USA,
                  March 24, 2017},
  pages        = {55--63},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041008.3041016},
  doi          = {10.1145/3041008.3041016},
  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/VermaD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/VermaA17,
  author       = {Rakesh M. Verma and
                  Ayman El Aassal},
  editor       = {Gail{-}Joon Ahn and
                  Alexander Pretschner and
                  Gabriel Ghinita},
  title        = {Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based
                  Analysis and User Participation},
  booktitle    = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  pages        = {155--157},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3029806.3029842},
  doi          = {10.1145/3029806.3029842},
  timestamp    = {Wed, 16 Sep 2020 11:48:10 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/VermaA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eacl/VuppuluriBNV17,
  author       = {Vasanthi Vuppuluri and
                  Shahryar Baki and
                  An Nguyen and
                  Rakesh M. Verma},
  editor       = {Andre Martins and
                  Anselmo Pe{\~{n}}as},
  title        = {{ICE:} Idiom and Collocation Extractor for Research and Education},
  booktitle    = {Proceedings of the 15th Conference of the European Chapter of the
                  Association for Computational Linguistics, {EACL} 2017, Valencia,
                  Spain, April 3-7, 2017, Software Demonstrations},
  pages        = {108--111},
  publisher    = {Association for Computational Linguistics},
  year         = {2017},
  url          = {https://doi.org/10.18653/v1/e17-3027},
  doi          = {10.18653/V1/E17-3027},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eacl/VuppuluriBNV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigir/KarimiMDV17,
  author       = {Samaneh Karimi and
                  Luis F. T. Moraes and
                  Avisha Das and
                  Rakesh M. Verma},
  editor       = {Kokil Jaidka and
                  Muthu Kumar Chandrasekaran and
                  Min{-}Yen Kan},
  title        = {University of Houston @ CL-SciSumm 2017: Positional language Models,
                  Structural Correspondence Learning and Textual Entailment},
  booktitle    = {Proceedings of the Computational Linguistics Scientific Summarization
                  Shared Task (CL-SciSumm 2017) organized as a part of the 2nd Joint
                  Workshop on Bibliometric-enhanced Information Retrieval and Natural
                  Language Processing for Digital Libraries {(BIRNDL} 2017) and co-located
                  with the 40th International {ACM} {SIGIR} Conference on Research and
                  Development in Information Retrieval {(SIGIR} 2017), Tokyo, Japan,
                  August 11, 2017},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2002},
  pages        = {73--85},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-2002/uhclscisumm2017.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:17 +0100},
  biburl       = {https://dblp.org/rec/conf/sigir/KarimiMDV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017iwspa,
  editor       = {Rakesh M. Verma and
                  Bhavani Thuraisingham},
  title        = {Proceedings of the 3rd {ACM} on International Workshop on Security
                  And Privacy Analytics, IWSPA@CODASPY 2017, Scottsdale, Arizona, USA,
                  March 24, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041008},
  doi          = {10.1145/3041008},
  isbn         = {978-1-4503-4909-3},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2017iwspa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShermanDCCMOSTV17,
  author       = {Alan T. Sherman and
                  Melissa Dark and
                  Agnes H. Chan and
                  Rylan Chong and
                  Thomas H. Morris and
                  Linda Oliva and
                  John A. Springer and
                  Bhavani Thuraisingham and
                  Christopher Vatcher and
                  Rakesh M. Verma and
                  Susanne Wetzel},
  title        = {The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity
                  Research},
  journal      = {CoRR},
  volume       = {abs/1703.08859},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.08859},
  eprinttype    = {arXiv},
  eprint       = {1703.08859},
  timestamp    = {Wed, 26 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShermanDCCMOSTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/VermaL17,
  author       = {Rakesh M. Verma and
                  Daniel Lee},
  title        = {Extractive Summarization: Limits, Compression, Generalized Model and
                  Heuristics},
  journal      = {CoRR},
  volume       = {abs/1704.05550},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.05550},
  eprinttype    = {arXiv},
  eprint       = {1704.05550},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/VermaL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-02989,
  author       = {Luis F. T. Moraes and
                  Shahryar Baki and
                  Rakesh M. Verma and
                  Daniel Lee},
  title        = {Identifying Reference Spans: Topic Modeling and Word Embeddings help
                  {IR}},
  journal      = {CoRR},
  volume       = {abs/1708.02989},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.02989},
  eprinttype    = {arXiv},
  eprint       = {1708.02989},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-02989.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicling/VermaVNMMBA16,
  author       = {Rakesh M. Verma and
                  Vasanthi Vuppuluri and
                  An Nguyen and
                  Arjun Mukherjee and
                  Ghita Mammar and
                  Shahryar Baki and
                  Reed Armstrong},
  editor       = {Alexander F. Gelbukh},
  title        = {Mining the Web for Collocations: {IR} Models of Term Associations},
  booktitle    = {Computational Linguistics and Intelligent Text Processing - 17th International
                  Conference, CICLing 2016, Konya, Turkey, April 3-9, 2016, Revised
                  Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9623},
  pages        = {177--194},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-75477-2\_11},
  doi          = {10.1007/978-3-319-75477-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/cicling/VermaVNMMBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jcdl/MoraesBVL16,
  author       = {Luis F. T. Moraes and
                  Shahryar Baki and
                  Rakesh M. Verma and
                  Daniel Lee},
  editor       = {Guillaume Cabanac and
                  Muthu Kumar Chandrasekaran and
                  Ingo Frommholz and
                  Kokil Jaidka and
                  Min{-}Yen Kan and
                  Philipp Mayr and
                  Dietmar Wolfram},
  title        = {University of Houston at CL-SciSumm 2016: SVMs with tree kernels and
                  Sentence Similarity},
  booktitle    = {Proceedings of the Joint Workshop on Bibliometric-enhanced Information
                  Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL)}
                  co-located with the Joint Conference on Digital Libraries 2016 {(JCDL}
                  2016), Newark, NJ, USA, June 23, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1610},
  pages        = {113--121},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1610/paper13.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},
  biburl       = {https://dblp.org/rec/conf/jcdl/MoraesBVL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2016iwspa,
  editor       = {Rakesh M. Verma and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Proceedings of the 2016 {ACM} on International Workshop on Security
                  And Privacy Analytics, IWSPA@CODASPY 2016, New Orleans, LA, USA, March
                  11, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2875475},
  isbn         = {978-1-4503-4077-9},
  timestamp    = {Tue, 15 Mar 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2016iwspa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RadcliffeMV16,
  author       = {Nicholas R. Radcliffe and
                  Luis F. T. Moraes and
                  Rakesh M. Verma},
  title        = {Uniqueness of Normal Forms for Shallow Term Rewrite Systems},
  journal      = {CoRR},
  volume       = {abs/1607.00431},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.00431},
  eprinttype    = {arXiv},
  eprint       = {1607.00431},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RadcliffeMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/VermaKMLS15,
  author       = {Rakesh M. Verma and
                  Murat Kantarcioglu and
                  David J. Marchette and
                  Ernst L. Leiss and
                  Thamar Solorio},
  title        = {Security Analytics: Essential Data Analytics Knowledge for Cybersecurity
                  Professionals and Students},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {6},
  pages        = {60--65},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.121},
  doi          = {10.1109/MSP.2015.121},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/VermaKMLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/ShashidharKV15,
  author       = {Narasimha K. Shashidhar and
                  Chadi Kari and
                  Rakesh M. Verma},
  title        = {The Efficacy of Epidemic Algorithms on Detecting Node Replicas in
                  Wireless Sensor Networks},
  journal      = {J. Sens. Actuator Networks},
  volume       = {4},
  number       = {4},
  pages        = {378--409},
  year         = {2015},
  url          = {https://doi.org/10.3390/jsan4040378},
  doi          = {10.3390/JSAN4040378},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsan/ShashidharKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChanCKLSTV15,
  author       = {Wenyaw Chan and
                  George Cybenko and
                  Murat Kantarcioglu and
                  Ernst L. Leiss and
                  Thamar Solorio and
                  Bhavani Thuraisingham and
                  Rakesh M. Verma},
  editor       = {Stephen Huang and
                  Rakesh M. Verma},
  title        = {Panel: Essential Data Analytics Knowledge forCyber-security Professionals
                  and Students},
  booktitle    = {Proceedings of the 2015 {ACM} International Workshop on International
                  Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2015, San
                  Antonio, TX, USA, March 4, 2015},
  pages        = {55--57},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2713579.2713590},
  doi          = {10.1145/2713579.2713590},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChanCKLSTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/VermaD15,
  author       = {Rakesh M. Verma and
                  Keith Dyer},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {On the Character of Phishing URLs: Accurate and Robust Statistical
                  Learning Classifiers},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {111--122},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699115},
  doi          = {10.1145/2699026.2699115},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/VermaD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/TunaJVDSV15,
  author       = {Tayfun Tuna and
                  Mahima Joshi and
                  Varun Varghese and
                  Rucha Deshpande and
                  Jaspal Subhlok and
                  Rakesh M. Verma},
  title        = {Topic based segmentation of classroom videos},
  booktitle    = {2015 {IEEE} Frontiers in Education Conference, {FIE} 2015, El Paso,
                  TX, USA, October 21-24, 2015},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/FIE.2015.7344336},
  doi          = {10.1109/FIE.2015.7344336},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/TunaJVDSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icac/GaoDKKXRVS15,
  author       = {Zhimin Gao and
                  Nicholas DeSalvo and
                  Pham Dang Khoa and
                  Seung{-}Hun Kim and
                  Lei Xu and
                  Won Woo Ro and
                  Rakesh M. Verma and
                  Weidong Shi},
  title        = {Integrity Protection for Big Data Processing with Dynamic Redundancy
                  Computation},
  booktitle    = {2015 {IEEE} International Conference on Autonomic Computing, Grenoble,
                  France, July 7-10, 2015},
  pages        = {159--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICAC.2015.34},
  doi          = {10.1109/ICAC.2015.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icac/GaoDKKXRVS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ranlp/VermaV15,
  author       = {Rakesh M. Verma and
                  Vasanthi Vuppuluri},
  editor       = {Galia Angelova and
                  Kalina Bontcheva and
                  Ruslan Mitkov},
  title        = {A New Approach for Idiom Identification Using Meanings and the Web},
  booktitle    = {Recent Advances in Natural Language Processing, {RANLP} 2015, 7-9
                  September, 2015, Hissar, Bulgaria},
  pages        = {681--687},
  publisher    = {{RANLP} 2015 Organising Committee / {ACL}},
  year         = {2015},
  url          = {https://aclanthology.org/R15-1087/},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ranlp/VermaV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VermaR15,
  author       = {Rakesh M. Verma and
                  Nirmala Rai},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Phish-IDetector: Message-Id Based Automatic Phishing Detection},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {427--434},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005574304270434},
  doi          = {10.5220/0005574304270434},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VermaR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2015iwspa,
  editor       = {Stephen Huang and
                  Rakesh M. Verma},
  title        = {Proceedings of the 2015 {ACM} International Workshop on International
                  Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2015, San
                  Antonio, TX, USA, March 4, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2713579},
  isbn         = {978-1-4503-3341-2},
  timestamp    = {Tue, 15 Mar 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2015iwspa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ThakurV14,
  author       = {Tanmay Thakur and
                  Rakesh M. Verma},
  editor       = {Atul Prakash and
                  Rudrapatna K. Shyamasundar},
  title        = {Catching Classical and Hijack-Based Phishing Attacks},
  booktitle    = {Information Systems Security - 10th International Conference, {ICISS}
                  2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {318--337},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13841-1\_18},
  doi          = {10.1007/978-3-319-13841-1\_18},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/ThakurV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/VermaH13,
  author       = {Rakesh M. Verma and
                  Nabil Hossain},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {Semantic Feature Selection for Text with Application to Phishing Email
                  Detection},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {455--468},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_27},
  doi          = {10.1007/978-3-319-12160-4\_27},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/VermaH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/VermaB13,
  author       = {Rakesh M. Verma and
                  Bailey E. Basile},
  title        = {Modeling and analysis of LEAP, a key management protocol for wireless
                  sensor networks},
  booktitle    = {10th Annual {IEEE} International Conference on Sensing, Communications
                  and Networking, {SECON} 2013, New Orleans, LA, USA, 24-27 June, 2013},
  pages        = {65--67},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SAHCN.2013.6644961},
  doi          = {10.1109/SAHCN.2013.6644961},
  timestamp    = {Fri, 30 Apr 2021 18:08:41 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/VermaB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/VermaSH12,
  author       = {Rakesh M. Verma and
                  Narasimha K. Shashidhar and
                  Nabil Hossain},
  title        = {Two-Pronged Phish Snagging},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {174--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.51},
  doi          = {10.1109/ARES.2012.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/VermaSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicling/BarreraV12,
  author       = {Araly Barrera and
                  Rakesh M. Verma},
  editor       = {Alexander F. Gelbukh},
  title        = {Combining Syntax and Semantics for Automatic Extractive Single-Document
                  Summarization},
  booktitle    = {Computational Linguistics and Intelligent Text Processing - 13th International
                  Conference, CICLing 2012, New Delhi, India, March 11-17, 2012, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7182},
  pages        = {366--377},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28601-8\_31},
  doi          = {10.1007/978-3-642-28601-8\_31},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/cicling/BarreraV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/VermaSH12,
  author       = {Rakesh M. Verma and
                  Narasimha K. Shashidhar and
                  Nabil Hossain},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Detecting Phishing Emails the Natural Language Way},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {824--841},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_47},
  doi          = {10.1007/978-3-642-33167-1\_47},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/VermaSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BarreraV11,
  author       = {Araly Barrera and
                  Rakesh M. Verma},
  editor       = {William C. Chu and
                  W. Eric Wong and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Automated extractive single-document summarization: beating the baselines
                  with a new approach},
  booktitle    = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC),
                  TaiChung, Taiwan, March 21 - 24, 2011},
  pages        = {268--269},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1982185.1982247},
  doi          = {10.1145/1982185.1982247},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BarreraV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/unif/VermaG11,
  author       = {Rakesh M. Verma and
                  Wei Guo},
  editor       = {Franz Baader and
                  Barbara Morawska and
                  Jan Otop},
  title        = {Does Unification Help in Normalization?},
  booktitle    = {Proceedings of the 25th International Workshop on Unification, {UNIF}
                  2011, Wroclaw, Poland, July 31, 2011},
  pages        = {52--58},
  year         = {2011},
  url          = {https://www.irif.fr/\%7Etreinen/unif/past/unif11/unif11-proceedings.pdf\#page=58},
  timestamp    = {Mon, 23 Oct 2023 15:28:12 +0200},
  biburl       = {https://dblp.org/rec/conf/unif/VermaG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tac/BarreraVV11,
  author       = {Araly Barrera and
                  Rakesh M. Verma and
                  Ryan Vincent},
  title        = {SemQuest: University of Houston's Semantics-based Question Answering
                  System},
  booktitle    = {Proceedings of the Fourth Text Analysis Conference, {TAC} 2011, Gaithersburg,
                  Maryland, USA, November 14-15, 2011},
  publisher    = {{NIST}},
  year         = {2011},
  url          = {https://tac.nist.gov/publications/2011/participant.papers/txsumm.proceedings.pdf},
  timestamp    = {Tue, 20 Aug 2019 13:25:15 +0200},
  biburl       = {https://dblp.org/rec/conf/tac/BarreraVV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/ZinnV10,
  author       = {Julian Zinn and
                  Rakesh M. Verma},
  title        = {A polynomial algorithm for uniqueness of normal forms of linear shallow
                  term rewrite systems},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {21},
  number       = {6},
  pages        = {459--485},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00200-010-0133-1},
  doi          = {10.1007/S00200-010-0133-1},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aaecc/ZinnV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/RadcliffeV10,
  author       = {Nicholas R. Radcliffe and
                  Rakesh M. Verma},
  editor       = {Kamal Lodaya and
                  Meena Mahajan},
  title        = {Uniqueness of Normal Forms is Decidable for Shallow Term Rewrite Systems},
  booktitle    = {{IARCS} Annual Conference on Foundations of Software Technology and
                  Theoretical Computer Science, {FSTTCS} 2010, December 15-18, 2010,
                  Chennai, India},
  series       = {LIPIcs},
  volume       = {8},
  pages        = {284--295},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2010},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2010.284},
  doi          = {10.4230/LIPICS.FSTTCS.2010.284},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/RadcliffeV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BlackshearV10,
  author       = {Sam Blackshear and
                  Rakesh M. Verma},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {{R-LEAP+:} randomizing {LEAP+} key distribution to resist replay and
                  jamming attacks},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1985--1992},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774507},
  doi          = {10.1145/1774088.1774507},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BlackshearV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tac/BarreraV10,
  author       = {Araly Barrera and
                  Rakesh M. Verma},
  title        = {A Ranking-based Approach for Multiple-document Information Extraction},
  booktitle    = {Proceedings of the Third Text Analysis Conference, {TAC} 2010, Gaithersburg,
                  Maryland, USA, November 15-16, 2010},
  publisher    = {{NIST}},
  year         = {2010},
  url          = {https://tac.nist.gov/publications/2010/participant.papers/txsumm.proceedings.pdf},
  timestamp    = {Tue, 20 Aug 2019 13:25:20 +0200},
  biburl       = {https://dblp.org/rec/conf/tac/BarreraV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Verma09,
  author       = {Rakesh M. Verma},
  title        = {Complexity of Normal Form Properties and Reductions for Term Rewriting
                  Problems Complexity of Normal Form Properties and Reductions for Term
                  Rewriting Problems},
  journal      = {Fundam. Informaticae},
  volume       = {92},
  number       = {1-2},
  pages        = {145--168},
  year         = {2009},
  url          = {https://doi.org/10.3233/FI-2009-0070},
  doi          = {10.3233/FI-2009-0070},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Verma09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiangV09,
  author       = {Zhiyao Liang and
                  Rakesh M. Verma},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Correcting and Improving the {NP} Proof for Cryptographic Protocol
                  Insecurity},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {101--116},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_9},
  doi          = {10.1007/978-3-642-10772-6\_9},
  timestamp    = {Wed, 12 May 2021 16:44:21 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/LiangV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LiangV08,
  author       = {Zhiyao Liang and
                  Rakesh M. Verma},
  title        = {Improving Techniques for Proving Undecidability of Checking Cryptographic
                  Protocols},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {1067--1074},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.198},
  doi          = {10.1109/ARES.2008.198},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LiangV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/flairs/ChenVMC08,
  author       = {Ping Chen and
                  Rakesh M. Verma and
                  Janet C. Meininger and
                  Wenyaw Chan},
  editor       = {David Wilson and
                  H. Chad Lane},
  title        = {Semantic Analysis of Association Rules},
  booktitle    = {Proceedings of the Twenty-First International Florida Artificial Intelligence
                  Research Society Conference, May 15-17, 2008, Coconut Grove, Florida,
                  {USA}},
  pages        = {270--275},
  publisher    = {{AAAI} Press},
  year         = {2008},
  url          = {http://www.aaai.org/Library/FLAIRS/2008/flairs08-068.php},
  timestamp    = {Wed, 26 Oct 2022 08:35:23 +0200},
  biburl       = {https://dblp.org/rec/conf/flairs/ChenVMC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiangV08,
  author       = {Zhiyao Liang and
                  Rakesh M. Verma},
  editor       = {R. Sekar and
                  Arun K. Pujari},
  title        = {Complexity of Checking Freshness of Cryptographic Protocols},
  booktitle    = {Information Systems Security, 4th International Conference, {ICISS}
                  2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {86--101},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89862-7\_6},
  doi          = {10.1007/978-3-540-89862-7\_6},
  timestamp    = {Thu, 18 Nov 2021 17:21:37 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/LiangV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/YuV08,
  author       = {Wenshan Yu and
                  Rakesh M. Verma},
  editor       = {Roger L. Wainwright and
                  Hisham Haddad},
  title        = {Visualization of rule-based programming},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC),
                  Fortaleza, Ceara, Brazil, March 16-20, 2008},
  pages        = {1258--1259},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1363686.1363976},
  doi          = {10.1145/1363686.1363976},
  timestamp    = {Tue, 06 Nov 2018 11:06:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/YuV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Verma12,
  author       = {Rakesh M. Verma},
  editor       = {G{\"{u}}nter Kniesel and
                  Jorge Sousa Pinto},
  title        = {New Undecidability Results for Properties of Term Rewrite Systems},
  booktitle    = {Ninth International Workshop on Rule-Based Programming, {RULE} 2008,
                  Hagenberg, Austria, July 14-18, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {290},
  pages        = {69--85},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2012.11.012},
  doi          = {10.1016/J.ENTCS.2012.11.012},
  timestamp    = {Fri, 25 Nov 2022 14:52:44 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Verma12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tac/VermaKC08,
  author       = {Rakesh M. Verma and
                  David Kent and
                  Ping Chen},
  title        = {Semantic Multi-Document Update Summarization Techniques},
  booktitle    = {Proceedings of the First Text Analysis Conference, {TAC} 2008, Gaithersburg,
                  Maryland, USA, November 17-19, 2008},
  publisher    = {{NIST}},
  year         = {2008},
  url          = {https://tac.nist.gov/publications/2008/participant.papers/txsumm.proceedings.pdf},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tac/VermaKC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbms/ChenV06,
  author       = {Ping Chen and
                  Rakesh M. Verma},
  title        = {A Query-Based Medical Information Summarization System Using Ontology
                  Knowledge},
  booktitle    = {19th {IEEE} International Symposium on Computer-Based Medical Systems
                  {(CBMS} 2006), 22-23 June 2006, Salt Lake City, Utah, {USA}},
  pages        = {37--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CBMS.2006.25},
  doi          = {10.1109/CBMS.2006.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cbms/ChenV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/ArmoniRVV06,
  author       = {Michal Armoni and
                  Susan H. Rodger and
                  Moshe Y. Vardi and
                  Rakesh M. Verma},
  editor       = {Doug Baldwin and
                  Paul T. Tymann and
                  Susan M. Haller and
                  Ingrid Russell},
  title        = {Automata theory: its relevance to computer science students and course
                  contents},
  booktitle    = {Proceedings of the 37th {SIGCSE} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2006, Houston, Texas, USA, March 3-5, 2006},
  pages        = {197--198},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1121341.1121403},
  doi          = {10.1145/1121341.1121403},
  timestamp    = {Wed, 10 Mar 2021 13:04:38 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/ArmoniRVV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/VermaH05,
  author       = {Rakesh M. Verma and
                  Ara Hayrapetyan},
  title        = {A new decidability technique for ground term rewriting systems with
                  applications},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {6},
  number       = {1},
  pages        = {102--123},
  year         = {2005},
  url          = {https://doi.org/10.1145/1042038.1042042},
  doi          = {10.1145/1042038.1042042},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocl/VermaH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/Verma05,
  author       = {Rakesh M. Verma},
  editor       = {Jos{\'{e}} C. Cunha and
                  William M. Fleischman and
                  Viera K. Proulx and
                  Jo{\~{a}}o Louren{\c{c}}o},
  title        = {A visual and interactive automata theory course emphasizing breadth
                  of automata},
  booktitle    = {Proceedings of the 10th Annual {SIGCSE} Conference on Innovation and
                  Technology in Computer Science Education, ITiCSE 2005, Caparica, Portugal,
                  June 27-29, 2005},
  pages        = {325--329},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1067445.1067535},
  doi          = {10.1145/1067445.1067535},
  timestamp    = {Wed, 10 Mar 2021 13:17:16 +0100},
  biburl       = {https://dblp.org/rec/conf/iticse/Verma05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/GodoyTV04,
  author       = {Guillem Godoy and
                  Ashish Tiwari and
                  Rakesh M. Verma},
  title        = {Characterizing Confluence by Rewrite Closure and Right Ground Term
                  Rewrite Systems},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {13--36},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00200-004-0148-6},
  doi          = {10.1007/S00200-004-0148-6},
  timestamp    = {Wed, 06 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aaecc/GodoyTV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apal/GodoyTV04,
  author       = {Guillem Godoy and
                  Ashish Tiwari and
                  Rakesh M. Verma},
  title        = {Deciding confluence of certain term rewriting systems in polynomial
                  time},
  journal      = {Ann. Pure Appl. Log.},
  volume       = {130},
  number       = {1-3},
  pages        = {33--59},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.apal.2004.04.005},
  doi          = {10.1016/J.APAL.2004.04.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apal/GodoyTV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/LuttikRV04,
  author       = {Bas Luttik and
                  Piet Rodenburg and
                  Rakesh M. Verma},
  title        = {Remarks on Thatte's transformation of term rewriting systems},
  journal      = {Inf. Comput.},
  volume       = {195},
  number       = {1-2},
  pages        = {66--87},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.ic.2003.09.006},
  doi          = {10.1016/J.IC.2003.09.006},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/LuttikRV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/GodoyTV03,
  author       = {Guillem Godoy and
                  Ashish Tiwari and
                  Rakesh M. Verma},
  editor       = {Helmut Alt and
                  Michel Habib},
  title        = {On the Confluence of Linear Shallow Term Rewrite Systems},
  booktitle    = {{STACS} 2003, 20th Annual Symposium on Theoretical Aspects of Computer
                  Science, Berlin, Germany, February 27 - March 1, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2607},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36494-3\_9},
  doi          = {10.1007/3-540-36494-3\_9},
  timestamp    = {Thu, 14 Oct 2021 10:38:16 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/GodoyTV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Verma02,
  author       = {Rakesh M. Verma},
  title        = {Algorithms and reductions for rewriting problems {II}},
  journal      = {Inf. Process. Lett.},
  volume       = {84},
  number       = {4},
  pages        = {227--233},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0020-0190(02)00395-2},
  doi          = {10.1016/S0020-0190(02)00395-2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/Verma02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigir/VermaB02,
  author       = {Rakesh M. Verma and
                  Sanjiv Behl},
  editor       = {Kalervo J{\"{a}}rvelin and
                  Micheline Beaulieu and
                  Ricardo A. Baeza{-}Yates and
                  Sung{-}Hyon Myaeng},
  title        = {K-tree/forest: efficient indexes for boolean queries},
  booktitle    = {{SIGIR} 2002: Proceedings of the 25th Annual International {ACM} {SIGIR}
                  Conference on Research and Development in Information Retrieval, August
                  11-15, 2002, Tampere, Finland},
  pages        = {433--434},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/564376.564480},
  doi          = {10.1145/564376.564480},
  timestamp    = {Wed, 07 Nov 2018 14:52:44 +0100},
  biburl       = {https://dblp.org/rec/conf/sigir/VermaB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/VermaH02,
  author       = {Rakesh M. Verma and
                  Sarah Hwang},
  editor       = {James Harland},
  title        = {On the Structure of Counterexamples to Symmetric Orderings for BDD's},
  booktitle    = {Computing: the Australasian Theory Symposium, {CATS} 2002, Melbourne,
                  Australia},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {61},
  pages        = {84--100},
  publisher    = {Elsevier},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1571-0661(04)00307-X},
  doi          = {10.1016/S1571-0661(04)00307-X},
  timestamp    = {Fri, 11 Nov 2022 16:14:30 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/VermaH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/VermaRL01,
  author       = {Rakesh M. Verma and
                  Micha{\"{e}}l Rusinowitch and
                  Denis Lugiez},
  title        = {Algorithms and Reductions for Rewriting Problems},
  journal      = {Fundam. Informaticae},
  volume       = {46},
  number       = {3},
  pages        = {257--276},
  year         = {2001},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi46-3-05},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/VermaRL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adc/BehlV01,
  author       = {Sanjiv Behl and
                  Rakesh M. Verma},
  editor       = {Maria E. Orlowska and
                  John F. Roddick},
  title        = {Efficient declustering techniques for temporal access structures},
  booktitle    = {Twelfth Australasian Database Conference, ADC2001, Bond University,
                  Queensland, Australia, January 29 - February 1, 2001},
  pages        = {91--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ADC.2001.904469},
  doi          = {10.1109/ADC.2001.904469},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/adc/BehlV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclp/BasuMRRV01,
  author       = {Samik Basu and
                  Madhavan Mukund and
                  C. R. Ramakrishnan and
                  I. V. Ramakrishnan and
                  Rakesh M. Verma},
  editor       = {Philippe Codognet},
  title        = {Local and Symbolic Bisimulation Using Tabled Constraint Logic Programming},
  booktitle    = {Logic Programming, 17th International Conference, {ICLP} 2001, Paphos,
                  Cyprus, November 26 - December 1, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2237},
  pages        = {166--180},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45635-X\_19},
  doi          = {10.1007/3-540-45635-X\_19},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclp/BasuMRRV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/tcs/BrandV01,
  author       = {Mark van den Brand and
                  Rakesh M. Verma},
  editor       = {Mark van den Brand and
                  Rakesh M. Verma},
  title        = {{RULE2001} - Foreword},
  booktitle    = {Second International Workshop on Rule-Based Programming, {RULE} 2001,
                  Satellite Event of {PLI} 2001, Firenze, Italy, September 4, 2001},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {59},
  number       = {4},
  pages        = {425--426},
  publisher    = {Elsevier},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0661(05)80559-6},
  doi          = {10.1016/S1571-0661(05)80559-6},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BrandV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rule/2001,
  editor       = {Mark van den Brand and
                  Rakesh M. Verma},
  title        = {Second International Workshop on Rule-Based Programming, {RULE} 2001,
                  Satellite Event of {PLI} 2001, Firenze, Italy, September 4, 2001},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {59},
  number       = {4},
  publisher    = {Elsevier},
  year         = {2001},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/59/issue/4},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rule/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-LO-0010034,
  author       = {Rakesh M. Verma},
  title        = {Static Analysis Techniques for Equational Logic Programming},
  journal      = {CoRR},
  volume       = {cs.LO/0010034},
  year         = {2000},
  url          = {https://arxiv.org/abs/cs/0010034},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-LO-0010034.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/VarmanV99,
  author       = {Peter J. Varman and
                  Rakesh M. Verma},
  title        = {Tight Bounds for Prefetching and Buffer Management Algorithms for
                  Parallel {I/O} Systems},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {10},
  number       = {12},
  pages        = {1262--1275},
  year         = {1999},
  url          = {https://doi.org/10.1109/71.819948},
  doi          = {10.1109/71.819948},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/VarmanV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/VermaS99,
  author       = {Rakesh M. Verma and
                  Shalitha Senanayake},
  editor       = {Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  title        = {L\({}^{\mbox{arrow}}\)R\({}^{\mbox{2}}\): {A} Laboratory fro Rapid
                  Term Graph Rewriting},
  booktitle    = {Rewriting Techniques and Applications, 10th International Conference,
                  RTA-99, Trento, Italy, July 2-4, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1631},
  pages        = {252--255},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48685-2\_21},
  doi          = {10.1007/3-540-48685-2\_21},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/VermaS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/NarendranRV98,
  author       = {Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch and
                  Rakesh M. Verma},
  editor       = {Georg Gottlob and
                  Etienne Grandjean and
                  Katrin Seyr},
  title        = {{RPO} Constraint Solving Is in {NP}},
  booktitle    = {Computer Science Logic, 12th International Workshop, {CSL} '98, Annual
                  Conference of the EACSL, Brno, Czech Republic, August 24-28, 1998,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1584},
  pages        = {385--398},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10703163\_26},
  doi          = {10.1007/10703163\_26},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/NarendranRV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/VermaRL98,
  author       = {Rakesh M. Verma and
                  Micha{\"{e}}l Rusinowitch and
                  Denis Lugiez},
  editor       = {Tobias Nipkow},
  title        = {Algorithms and Reductions for Rewriting Problems},
  booktitle    = {Rewriting Techniques and Applications, 9th International Conference,
                  RTA-98, Tsukuba, Japan, March 30 - April 1, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1379},
  pages        = {166--180},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0052369},
  doi          = {10.1007/BFB0052369},
  timestamp    = {Sat, 05 Sep 2020 18:07:52 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/VermaRL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/HuangLV97,
  author       = {Shou{-}Hsuan Stephen Huang and
                  Hongfei Liu and
                  Rakesh M. Verma},
  title        = {On Embedding Rectangular Meshes into Rectangular Meshes of Smaller
                  Aspect Ratio},
  journal      = {Inf. Process. Lett.},
  volume       = {63},
  number       = {3},
  pages        = {123--129},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0020-0190(97)00114-2},
  doi          = {10.1016/S0020-0190(97)00114-2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/HuangLV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/Verma97,
  author       = {Rakesh M. Verma},
  title        = {General Techniques for Analyzing Recursive Algorithms with Applications},
  journal      = {{SIAM} J. Comput.},
  volume       = {26},
  number       = {2},
  pages        = {568--581},
  year         = {1997},
  url          = {https://doi.org/10.1137/S0097539792240583},
  doi          = {10.1137/S0097539792240583},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/Verma97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/VarmanV97,
  author       = {Peter J. Varman and
                  Rakesh M. Verma},
  title        = {An Efficient Multiversion Access STructure},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {9},
  number       = {3},
  pages        = {391--409},
  year         = {1997},
  url          = {https://doi.org/10.1109/69.599929},
  doi          = {10.1109/69.599929},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/VarmanV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fct/Verma97,
  author       = {Rakesh M. Verma},
  editor       = {Bogdan S. Chlebus and
                  Ludwik Czaja},
  title        = {Unique Normal Forms for Nonlinear Term Rewriting Systems: Root Overlaps},
  booktitle    = {Fundamentals of Computation Theory, 11th International Symposium,
                  {FCT} '97, Krak{\'{o}}w, Poland, September 1-3, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1279},
  pages        = {452--462},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0036206},
  doi          = {10.1007/BFB0036206},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fct/Verma97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/HuangLV96,
  author       = {Shou{-}Hsuan Stephen Huang and
                  Hongfei Liu and
                  Rakesh M. Verma},
  title        = {A New Combinatorial Approach to Optimal Embeddings of Rectangles},
  journal      = {Algorithmica},
  volume       = {16},
  number       = {2},
  pages        = {161--180},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF01940645},
  doi          = {10.1007/BF01940645},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/algorithmica/HuangLV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/VarmanV96,
  author       = {Peter J. Varman and
                  Rakesh M. Verma},
  editor       = {Vijay Chandru and
                  V. Vinay},
  title        = {Tight Bounds for Prefetching and Buffer Management Algorithms for
                  Parallel {I/O} Systems},
  booktitle    = {Foundations of Software Technology and Theoretical Computer Science,
                  16th Conference, Hyderabad, India, December 18-20, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1180},
  pages        = {200--211},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62034-6\_50},
  doi          = {10.1007/3-540-62034-6\_50},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/VarmanV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/Verma95,
  author       = {Rakesh M. Verma},
  title        = {A Theory of Using History for Equational Systems with Applications},
  journal      = {J. {ACM}},
  volume       = {42},
  number       = {5},
  pages        = {984--1020},
  year         = {1995},
  url          = {https://doi.org/10.1145/210118.210130},
  doi          = {10.1145/210118.210130},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/Verma95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Verma95,
  author       = {Rakesh M. Verma},
  title        = {Transformations and Confluence for Rewrite Systems},
  journal      = {Theor. Comput. Sci.},
  volume       = {152},
  number       = {2},
  pages        = {269--283},
  year         = {1995},
  url          = {https://doi.org/10.1016/0304-3975(94)00255-0},
  doi          = {10.1016/0304-3975(94)00255-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Verma95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/Verma95,
  author       = {Rakesh M. Verma},
  title        = {Unique Normal Forms and Confluence of Rewrite Systems: Persistence},
  booktitle    = {Proceedings of the Fourteenth International Joint Conference on Artificial
                  Intelligence, {IJCAI} 95, Montr{\'{e}}al Qu{\'{e}}bec, Canada,
                  August 20-25 1995, 2 Volumes},
  pages        = {362--370},
  publisher    = {Morgan Kaufmann},
  year         = {1995},
  url          = {http://ijcai.org/Proceedings/95-1/Papers/048.pdf},
  timestamp    = {Tue, 20 Aug 2019 16:17:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/Verma95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jal/Verma94,
  author       = {Rakesh M. Verma},
  title        = {A General Method and a Master Theorem for Divide-and-Conquer Recurrences
                  with Applications},
  journal      = {J. Algorithms},
  volume       = {16},
  number       = {1},
  pages        = {67--79},
  year         = {1994},
  url          = {https://doi.org/10.1006/jagm.1994.1004},
  doi          = {10.1006/JAGM.1994.1004},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jal/Verma94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/HuangLV94,
  author       = {Shou{-}Hsuan Stephen Huang and
                  Hongfei Liu and
                  Rakesh M. Verma},
  editor       = {Howard Jay Siegel},
  title        = {A New Combinatorial Approach to Optimal Embeddings of Rectangles},
  booktitle    = {Proceedings of the 8th International Symposium on Parallel Processing,
                  Canc{\'{u}}n, Mexico, April 1994},
  pages        = {715--722},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/IPPS.1994.288225},
  doi          = {10.1109/IPPS.1994.288225},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/HuangLV94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpp/HuangLV93,
  author       = {Shou{-}Hsuan Stephen Huang and
                  Hongfei Liu and
                  Rakesh M. Verma},
  editor       = {Salim Hariri and
                  P. Bruce Berra},
  title        = {On Embeddings of Rectangles into Optimal Squares},
  booktitle    = {Proceedings of the 1993 International Conference on Parallel Processing,
                  Syracuse University, NY, USA, August 16-20, 1993. Volume {III:} Algorithms
                  {\&} Applications},
  pages        = {73--76},
  publisher    = {{CRC} Press},
  year         = {1993},
  url          = {https://doi.org/10.1109/ICPP.1993.123},
  doi          = {10.1109/ICPP.1993.123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpp/HuangLV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/Verma93,
  author       = {Rakesh M. Verma},
  editor       = {Claude Kirchner},
  title        = {Smaran: {A} Congruence-Closure Based System for Equational Computations},
  booktitle    = {Rewriting Techniques and Applications, 5th International Conference,
                  RTA-93, Montreal, Canada, June 16-18, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {690},
  pages        = {457--461},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/978-3-662-21551-7\_37},
  doi          = {10.1007/978-3-662-21551-7\_37},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/Verma93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/VermaR92,
  author       = {Rakesh M. Verma and
                  I. V. Ramakrishnan},
  title        = {Tight Complexity Bounds for Term Matching Problems},
  journal      = {Inf. Comput.},
  volume       = {101},
  number       = {1},
  pages        = {33--69},
  year         = {1992},
  url          = {https://doi.org/10.1016/0890-5401(92)90075-Q},
  doi          = {10.1016/0890-5401(92)90075-Q},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/VermaR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Verma92,
  author       = {Rakesh M. Verma},
  title        = {Strings, Trees, and Patterns},
  journal      = {Inf. Process. Lett.},
  volume       = {41},
  number       = {3},
  pages        = {157--161},
  year         = {1992},
  url          = {https://doi.org/10.1016/0020-0190(92)90046-X},
  doi          = {10.1016/0020-0190(92)90046-X},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/Verma92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/Verma91,
  author       = {Rakesh M. Verma},
  title        = {A Theory of Using History for Equational Systems with Applications
                  (Extended Abstract)},
  booktitle    = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
                  Puerto Rico, 1-4 October 1991},
  pages        = {348--357},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/SFCS.1991.185390},
  doi          = {10.1109/SFCS.1991.185390},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/Verma91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/VermaR90,
  author       = {Rakesh M. Verma and
                  I. V. Ramakrishnan},
  editor       = {Mike Paterson},
  title        = {Nonoblivious Normalization Algorithms for Nonlinear Rewrite Systems},
  booktitle    = {Automata, Languages and Programming, 17th International Colloquium,
                  ICALP90, Warwick University, England, UK, July 16-20, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {443},
  pages        = {370--385},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/BFb0032045},
  doi          = {10.1007/BFB0032045},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/VermaR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/RameschVKR89,
  author       = {R. Ramesh and
                  Rakesh M. Verma and
                  Krishnaprasad Thirunarayan and
                  I. V. Ramakrishnan},
  title        = {Term Matching on Parallel Computers},
  journal      = {J. Log. Program.},
  volume       = {6},
  number       = {3},
  pages        = {213--228},
  year         = {1989},
  url          = {https://doi.org/10.1016/0743-1066(89)90014-9},
  doi          = {10.1016/0743-1066(89)90014-9},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/RameschVKR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/VermaR89,
  author       = {Rakesh M. Verma and
                  Steven W. Reyner},
  title        = {An Analysis of a Good Algorithm for the Subtree Problem, Corrected},
  journal      = {{SIAM} J. Comput.},
  volume       = {18},
  number       = {5},
  pages        = {906--908},
  year         = {1989},
  url          = {https://doi.org/10.1137/0218062},
  doi          = {10.1137/0218062},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/VermaR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/VermaR89,
  author       = {Rakesh M. Verma and
                  I. V. Ramakrishnan},
  editor       = {Burkhard Monien and
                  Robert Cori},
  title        = {Some Complexity Theoretic Aspects of {AC} Rewriting},
  booktitle    = {{STACS} 89, 6th Annual Symposium on Theoretical Aspects of Computer
                  Science, Paderborn, FRG, February 16-18, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {349},
  pages        = {407--420},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/BFb0029003},
  doi          = {10.1007/BFB0029003},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/VermaR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/VermaR88,
  author       = {Rakesh M. Verma and
                  I. V. Ramakrishnan},
  editor       = {Ewing L. Lusk and
                  Ross A. Overbeek},
  title        = {Optimal Time Bounds for Parallel Term Matching},
  booktitle    = {9th International Conference on Automated Deduction, Argonne, Illinois,
                  USA, May 23-26, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {310},
  pages        = {694--703},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/BFb0012867},
  doi          = {10.1007/BFB0012867},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/VermaR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/RameshVKR87,
  author       = {R. Ramesh and
                  Rakesh M. Verma and
                  Krishnaprasad Thirunarayan and
                  I. V. Ramakrishnan},
  editor       = {Thomas Ottmann},
  title        = {Term Matching on Parallel Computers},
  booktitle    = {Automata, Languages and Programming, 14th International Colloquium,
                  ICALP87, Karlsruhe, Germany, July 13-17, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {267},
  pages        = {336--346},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-18088-5\_28},
  doi          = {10.1007/3-540-18088-5\_28},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/RameshVKR87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/VermaKR86,
  author       = {Rakesh M. Verma and
                  Krishnaprasad Thirunarayan and
                  I. V. Ramakrishnan},
  editor       = {Kesav V. Nori},
  title        = {An Efficient Parallel Algorithm for Term Matching},
  booktitle    = {Foundations of Software Technology and Theoretical Computer Science,
                  Sixth Conference, New Delhi, India, December 18-20, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {241},
  pages        = {504--518},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-17179-7\_31},
  doi          = {10.1007/3-540-17179-7\_31},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/VermaKR86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}