Rakesh Verma is a Professor of Computer Science at the University of Houston (UH) and Director of the of the ReDACS (Reasoning and Data Analytics for Cyber Security) Laboratory. He was the colead on National Security Agency's designation of UH as a Center of Academic Excellence in Information Assurance Education in 2009. His research interests are on formal methods and data analytics with applications to natural language understanding and cyber security.
Rakesh was a visiting professor at CRIN-INRIA Lorraine in France and at Stony Brook University. He has served on several conference program committees and workshops. In 2015, he served as the TPC Chair and editor of the proceedings of the ACM International Workshop on Security and Privacy Analytics. In 2013, he received the UH Lifetime Mentoring Award for Undergraduate Research, a career award given annually to only one faculty member.
A long-standing ACM member, he received his PhD and MS in Computer Science from the State University of New York at Stony Brook, where he was a Catacosinos Fellow, and his Bachelor's in Electronics and Telecommunication Engineering from Indian Institute of Technology Varanasi with highest honors and a gold medal.
To request a single lecture/event, click on the desired lecture and complete the Request Lecture Form.
Phish or Not is the Question
All of us have received emails threatening us with dire consequences, if we do not increase our mail quota or reset our account, and intent on stealing our digital identities. I myself receive...
Programming Without Tears?
Can you imagine a sorting program that is two lines? A Quicksort Program that fits on a PowerPoint slide? In this...
Security Analytics - The New Frontier in Cyber Security ?
Techniques from Data Analytics, by which I mean: Natural Language Processing, Data Mining, Machine Learning and Statistics, are being applied increasingly to security challenges such as phishing, intrusion...
Talking to Computers - A Solved Problem?
Life would be so much easier if computers could read and understand our directions in English, talk to people, and perhaps also compose stories and poems for them. Siri and Cortana notwithstanding,...
Wireless Sensor Networks: Security, Protocols and Countermeasures
Wireless Sensor Networks are increasingly being deployed in hazardous and hostile environments for numerous civil and military applications such as sensing the environment, biosensors, etc. They pose...
To request a tour with this speaker, please complete this online form.
If you are not requesting a tour, click on the desired lecture and complete the Request this Lecture form.
All requests will be sent to ACM headquarters for review.