<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:pagemap="http://www.google.com/schemas/sitemap-pagemap/1.0" xmlns:xhtml="http://www.w3.org/1999/xhtml" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/projects</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/people</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/courses</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/posts</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/pages</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/cv</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/contact_form</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21030-sixteen-years-of-phishing-user-studies-what-have-we-learned</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21031-adversarial-robustness-of-phishing-email-detection-models</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21029-enhancement-of-twitter-event-detection-using-news-streams</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21033-data-quality-and-linguistic-cues-for-domain-independent-deception-detection</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21034-leveraging-synthetic-data-and-pu-learning-for-phishing-email-detection</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21037-domain-independent-deception-definition-taxonomy-and-the-linguistic-cues-debate</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21035-does-deception-leave-a-content-independent-stylistic-trace</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21032-vulnerability-detection-via-multimodal-learning-datasets-and-analysis</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21036-software-vulnerability-detection-via-multimodal-deep-learning</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21045-sixteen-years-of-phishing-user-studies-what-have-we-learned</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21044-claim-verification-using-a-multi-gan-based-model</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21039-on-the-feasibility-of-using-gans-for-claim-verification-experiments-and-analysis</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21041-claim-verification-using-a-multi-gan-based-model</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21038-online-news-media-website-ranking-using-user-generated-content</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21042-capacity-expansion-in-cybersecurity-challenges-and-prospects</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21043-what-is-the-security-mindset-can-it-be-developed</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21046-an-in-depth-benchmarking-and-evaluation-of-phishing-detection-research-for-security-needs</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21049-scam-augmentation-and-customization-identifying-vulnerable-users-and-arming-defenders</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21057-less-is-more-exploiting-social-trust-to-increase-the-effectiveness-of-a-deception-attack</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21053-developing-a-compelling-vision-for-winning-the-cybersecurity-arms-race</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21048-sok-a-comprehensive-reexamination-of-phishing-research-from-the-security-perspective</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21047-can-machines-tell-stories-a-comparative-study-of-deep-neural-language-models-and-metrics</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21058-modeling-coherency-in-generated-emails-by-leveraging-deep-neural-learners</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21051-adversarial-machine-learning-for-text</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21059-experiments-in-extractive-summarization-integer-linear-programming-term-sentence-scoring-and-title-driven-models</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21056-poster-a-modular-and-innovative-security-analytics-course</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21052-diverse-datasets-and-a-customizable-benchmarking-framework-for-phishing</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21050-phishbench-2-0-a-versatile-and-extendable-benchmarking-framework-for-phishing</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21055-phishing-sites-detection-from-a-web-developer-s-perspective-using-machine-learning</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21067-sok-a-comprehensive-reexamination-of-phishing-research-from-the-security-perspective</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21065-automated-email-generation-for-targeted-attacks-using-natural-language</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21062-parameter-tuning-and-confidence-limits-of-malware-clustering</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21066-online-news-media-website-ranking-using-user-generated-content</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21060-the-cats-hackathon-creating-and-refining-test-items-for-cybersecurity-concept-inventories</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21063-the-cats-hackathon-creating-and-refining-test-items-for-cybersecurity-concept-inventories</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21064-newswire-versus-social-media-for-disaster-response-and-recovery</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21146-cybersecurity-analytics</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21061-data-quality-for-security-challenges-case-studies-of-phishing-malware-and-intrusion-detection-datasets</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21070-machine-learning-methods-for-software-vulnerability-detection</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21072-phishing-email-detection-using-robust-nlp-techniques</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21073-performance-evaluation-of-features-and-clustering-algorithms-for-malware</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21069-citance-based-retrieval-and-summarization-using-ir-and-machine-learning</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21068-identifying-reference-spans-topic-modeling-and-word-embeddings-help-ir</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21074-university-of-houston-cl-scisumm-2018</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21071-security-analytics-adapting-data-science-for-security-challenges</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21078-scaling-and-effectiveness-of-email-masquerade-attacks-exploiting-natural-language-generation</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21081-university-of-houston-cl-scisumm-2017-positional-language-models-structural-correspondence-learning-and-textual-entailment</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21085-identifying-reference-spans-topic-modeling-and-word-embeddings-help-ir</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21077-uniqueness-of-normal-forms-for-shallow-term-rewrite-systems</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21083-the-insure-project-cae-rs-collaborate-to-engage-students-in-cybersecurity-research</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21076-insure-collaborating-centers-of-academic-excellence-engage-students-in-cybersecurity-research</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21080-comprehensive-method-for-detecting-phishing-emailsusing-correlation-based-analysis-and-user-participation</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21079-what-s-in-a-url-fast-feature-extraction-and-malicious-url-detection</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21084-extractive-summarization-limits-compression-generalized-model-and-heuristics</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21075-extractive-summarization-limits-compression-generalized-model-and-heuristics</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21082-ice-idiom-and-collocation-extractor-for-research-and-education</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21092-university-of-houston-at-cl-scisumm-2016-svms-with-tree-kernels-and-sentence-similarity</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21093-uniqueness-of-normal-forms-for-shallow-term-rewrite-systems</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21089-mining-the-web-for-collocations-ir-models-of-term-associations</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21097-panel-essential-data-analytics-knowledge-forcyber-security-professionals-and-students</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21102-integrity-protection-for-big-data-processing-with-dynamic-redundancy-computation</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21095-the-efficacy-of-epidemic-algorithms-on-detecting-node-replicas-in-wireless-sensor-networks</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21099-topic-based-segmentation-of-classroom-videos</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21098-on-the-character-of-phishing-urls-accurate-and-robust-statistical-learning-classifiers</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21094-security-analytics-essential-data-analytics-knowledge-for-cybersecurity-professionals-and-students</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21104-phish-idetector-message-id-based-automatic-phishing-detection</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21103-a-new-approach-for-idiom-identification-using-meanings-and-the-web</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21105-catching-classical-and-hijack-based-phishing-attacks</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21107-modeling-and-analysis-of-leap-a-key-management-protocol-for-wireless-sensor-networks</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21106-semantic-feature-selection-for-text-with-application-to-phishing-email-detection</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21110-combining-syntax-and-semantics-for-automatic-extractive-single-document-summarization</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21109-two-pronged-phish-snagging</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21111-detecting-phishing-emails-the-natural-language-way</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21112-automated-extractive-single-document-summarization-beating-the-baselines-with-a-new-approach</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21113-semquest-university-of-houston-s-semantics-based-question-answering-system</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21117-a-ranking-based-approach-for-multiple-document-information-extraction</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21116-r-leap-randomizing-leap-key-distribution-to-resist-replay-and-jamming-attacks</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21115-uniqueness-of-normal-forms-is-decidable-for-shallow-term-rewrite-systems</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21114-a-polynomial-algorithm-for-uniqueness-of-normal-forms-of-linear-shallow-term-rewrite-systems</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21121-correcting-and-improving-the-np-proof-for-cryptographic-protocol-insecurity</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21119-complexity-of-normal-form-properties-and-reductions-for-term-rewriting-problems</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21123-semantic-analysis-of-association-rules</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21122-improving-techniques-for-proving-undecidability-of-checking-cryptographic-protocols</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21124-complexity-of-checking-freshness-of-cryptographic-protocols</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21127-new-undecidability-results-for-properties-of-term-rewrite-systems</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21128-semantic-multi-document-update-summarization-techniques</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21126-visualization-of-rule-based-programming</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21132-automata-theory-its-relevance-to-computer-science-students-and-course-contents</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21129-a-query-based-medical-information-summarization-system-using-ontology-knowledge</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21138-a-visual-and-interactive-automata-theory-course-emphasizing-breadth-of-automata</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21135-a-new-decidability-technique-for-ground-term-rewriting-systems-with-applications</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21139-characterizing-confluence-by-rewrite-closure-and-right-ground-term-rewrite-systems</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/publications/21140-deciding-confluence-of-certain-term-rewriting-systems-in-polynomial-time</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/people/1832-vu-minh-hoang-dang</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/people/1833-fatima-z-qachfar</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/courses/1787-security-analytics</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/pages/3482-book</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/pages/3471-courses</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/pages/3470-people</loc>
  </url>
  <url>
    <loc>https://rakesh-verma-uh.owlstown.net/pages/3469-projects</loc>
  </url>
</urlset>
