Baki, Shahryar
14  results:
Search for persons X
?
2

Sixteen Years of Phishing User Studies: What Have We Learne..:

Baki, Shahryar ; Verma, Rakesh M.
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  2 - p. 1200-1212 , 2023
 
?
3

PhishBench 2.0: A Versatile and Extendable Benchmarking Fra..:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
Zeng, Victor ; Zhou, Xin ; Baki, Shahryar. - p. 2077-2079 , 2020
 
?
4

Diverse Datasets and a Customizable Benchmarking Framework ..:

, In: Proceedings of the Sixth International Workshop on Security and Privacy Analytics,
Zeng, Victor ; Baki, Shahryar ; Aassal, Ayman El... - p. 35-41 , 2020
 
?
5

Scam Augmentation and Customization: Identifying Vulnerable..:

, In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security,
 
?
7

Scaling and Effectiveness of Email Masquerade Attacks : ..:

, In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security,
Baki, Shahryar ; Verma, Rakesh ; Mukherjee, Arjun. - p. 469-482 , 2017
 
?
8

Identifying reference spans: topic modeling and word embedd..:

Moraes, Luis ; Baki, Shahryar ; Verma, Rakesh.
International Journal on Digital Libraries.  19 (2017)  2-3 - p. 191-202 , 2017
 
?
11

You Are Not Alone: Helping Users Not to Fall For Phishing:

Baki, Shahryar
Portions of this document appear in: Das, Avisha, Shahryar Baki, Ayman El Aassal, Rakesh Verma, and Arthur Dunbar. "SoK: a comprehensive reexamination of phishing research from the security perspective." IEEE Communications Surveys & Tutorials 22, no. 1 (2019): 671-708. And in: Baki, Shahryar, Rakesh Verma, Arjun Mukherjee, and Omprakash Gnawali. "Scaling and effectiveness of email masquerade attacks: Exploiting natural language generation." In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 469-482. 2017. And in: Baki, Shahryar, Rakesh M. Verma, and Omprakash Gnawali. "Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders." In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 236-247. 2020..  , 2020
 
1-14