Hossein Siadati
Hossein Siadati
Google
Verifierad e-postadress på nyu.edu - Startsida
Titel
Citeras av
Citeras av
År
Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication
H Siadati, T Nguyen, P Gupta, M Jakobsson, N Memon
Computer&Security, 2016
372016
A phishing sites blacklist generator
M Sharifi, SH Siadati
2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008
362008
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
222013
Detecting Malicious Logins in Enterprise Networks Using Visualization
H Siadati, B Saket, N Memon
13th IEEE Symposium on Visualization for Cyber Security (VizSec), 2016
202016
Detecting Structurally Anomalous Logins Within Enterprise Networks
H Siadati, N Memon
ACM Conference on Computer and Communications Security (CCS'17), 1273-1284, 2017
132017
Measuring the Effectiveness of Embedded Phishing Exercises
H Siadati, S Palka, A Siegel, D McCoy
CSET, USENIX Security, 2017
132017
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention
M Jakobsson, H Siadati
The New Codebreakers 1, 177-194, 2016
13*2016
Fortifying android patterns using persuasive security framework
H Siadati, P Gupta, S Smith, N Memon, M Ahamad
UBICOMM 2015, 81, 2015
132015
Traditional Countermeasures to Unwanted Emails
H Siadati, ST Jafarikhah, M Jakobsson
Understanding Social Engineering Based Scams, 53-63, 2016
102016
Verification code forwarding attack (short paper)
H Siadati, T Nguyen, N Memon
International Conference on Passwords, 65-71, 2015
62015
Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities
J Koven, C Felix, H Siadati, E Bertini, M Jakobsson
IEEE VIS 2018, 2018
52018
Finding valuable yelp comments by personality, content, geo, and anomaly analysis
J Koven, H Siadati, CY Lin
2014 IEEE International Conference on Data Mining Workshop, 1215-1218, 2014
52014
X-platform phishing: Abusing trust for targeted attacks short paper
H Siadati, T Nguyen, N Memon
International Conference on Financial Cryptography and Data Security, 587-596, 2017
42017
Improved visual preference authentication
M Jakobsson, H Siadati
2012 Workshop on Socio-Technical Aspects in Security and Trust, 27-34, 2012
42012
System and method for hierarchical cryptographic key generation using biometric data
B Jakobsson, S Siadati
US Patent 9,621,342, 2017
32017
Method and System of Detecting Malicious Video Advertising Impressions
BM Jakobsson, R Gupta, A Gantman, S Siadati
US Patent App. 14/642,414, 2016
12016
Liar buyer fraud, and how to curb it
M Jakobsson, H Siadati, M Dhiman
USEC Workshop-NDSS 2015, 2015
2015
How to Kill Spoofing
M Jakobsson, H Siadati
Mobile Authentication, 73-90, 2013
2013
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–18