Следене
Hossein Siadati
Hossein Siadati
NYU->Google->Datadog
Потвърден имейл адрес: nyu.edu - Начална страница
Заглавие
Позовавания
Позовавания
Година
Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication
H Siadati, T Nguyen, P Gupta, M Jakobsson, N Memon
Computer&Security, 2016
1032016
Detecting Structurally Anomalous Logins Within Enterprise Networks
H Siadati, N Memon
ACM Conference on Computer and Communications Security (CCS'17), 1273-1284, 2017
662017
A phishing sites blacklist generator
M Sharifi, SH Siadati
2008 IEEE/ACS international conference on computer systems and applications …, 2008
662008
Detecting Malicious Logins in Enterprise Networks Using Visualization
H Siadati, B Saket, N Memon
13th IEEE Symposium on Visualization for Cyber Security (VizSec), 2016
452016
Measuring the Effectiveness of Embedded Phishing Exercises
H Siadati, S Palka, A Siegel, D McCoy
CSET, USENIX Security, 2017
402017
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention
M Jakobsson, H Siadati
The New Codebreakers 1, 177-194, 2016
31*2016
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
272013
System and method for hierarchical cryptographic key generation using biometric data
B Jakobsson, S Siadati
US Patent 9,621,342, 2017
222017
Traditional Countermeasures to Unwanted Emails
H Siadati, ST Jafarikhah, M Jakobsson
Understanding Social Engineering Based Scams, 53-63, 2016
192016
Fortifying android patterns using persuasive security framework
H Siadati, P Gupta, S Smith, N Memon, M Ahamad
UBICOMM 2015, 81, 2015
182015
Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities
J Koven, C Felix, H Siadati, E Bertini, M Jakobsson
IEEE VIS 2018, 2018
152018
Finding valuable yelp comments by personality, content, geo, and anomaly analysis
J Koven, H Siadati, CY Lin
2014 IEEE International Conference on Data Mining Workshop, 1215-1218, 2014
102014
Verification code forwarding attack (short paper)
H Siadati, T Nguyen, N Memon
Technology and Practice of Passwords: 9th International Conference …, 2016
92016
Improved visual preference authentication
M Jakobsson, H Siadati
2012 Workshop on Socio-Technical Aspects in Security and Trust, 27-34, 2012
82012
X-platform phishing: Abusing trust for targeted attacks short paper
H Siadati, T Nguyen, N Memon
Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017
52017
Method and System of Detecting Malicious Video Advertising Impressions
BM Jakobsson, R Gupta, A Gantman, S Siadati
US Patent App. 14/642,414, 2016
52016
A framework for analysis attackers’ accounts
H Siadati, J Koven, CF Silva, M Jakobsson, E Bertini, D Maimon, ...
Security, Privacy and User Interaction, 63-89, 2020
32020
DevPhish: Exploring Social Engineering in Software Supply Chain Attacks on Developers
H Siadati, S Jafarikhah, E Sahin, TB Hernandez, EL Tripp, D Khryashchev
arXiv preprint arXiv:2402.18401, 2024
2024
Exploring the Threat of Software Supply Chain Attacks on Containerized Applications
M Mounesan, H Siadati, S Jafarikhah
6th International Conference on Security of Information and Networks, 2023
2023
Liar buyer fraud, and how to curb it
M Jakobsson, H Siadati, M Dhiman
USEC Workshop-NDSS 2015, 2015
2015
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20