Hossein Siadati
Hossein Siadati
Google
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication
H Siadati, T Nguyen, P Gupta, M Jakobsson, N Memon
Computer&Security, 2016
382016
A phishing sites blacklist generator
M Sharifi, SH Siadati
2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008
372008
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
222013
Detecting Malicious Logins in Enterprise Networks Using Visualization
H Siadati, B Saket, N Memon
13th IEEE Symposium on Visualization for Cyber Security (VizSec), 2016
202016
Measuring the Effectiveness of Embedded Phishing Exercises
H Siadati, S Palka, A Siegel, D McCoy
CSET, USENIX Security, 2017
142017
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention
M Jakobsson, H Siadati
The New Codebreakers 1, 177-194, 2016
14*2016
Detecting Structurally Anomalous Logins Within Enterprise Networks
H Siadati, N Memon
ACM Conference on Computer and Communications Security (CCS'17), 1273-1284, 2017
132017
Fortifying android patterns using persuasive security framework
H Siadati, P Gupta, S Smith, N Memon, M Ahamad
UBICOMM 2015, 81, 2015
132015
Traditional Countermeasures to Unwanted Emails
H Siadati, ST Jafarikhah, M Jakobsson
Understanding Social Engineering Based Scams, 53-63, 2016
102016
Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities
J Koven, C Felix, H Siadati, E Bertini, M Jakobsson
IEEE VIS 2018, 2018
62018
Verification code forwarding attack (short paper)
H Siadati, T Nguyen, N Memon
International Conference on Passwords, 65-71, 2015
62015
Finding valuable yelp comments by personality, content, geo, and anomaly analysis
J Koven, H Siadati, CY Lin
2014 IEEE International Conference on Data Mining Workshop, 1215-1218, 2014
52014
X-platform phishing: Abusing trust for targeted attacks short paper
H Siadati, T Nguyen, N Memon
International Conference on Financial Cryptography and Data Security, 587-596, 2017
42017
Improved visual preference authentication
M Jakobsson, H Siadati
2012 Workshop on Socio-Technical Aspects in Security and Trust, 27-34, 2012
42012
System and method for hierarchical cryptographic key generation using biometric data
B Jakobsson, S Siadati
US Patent 9,621,342, 2017
32017
Method and System of Detecting Malicious Video Advertising Impressions
BM Jakobsson, R Gupta, A Gantman, S Siadati
US Patent App. 14/642,414, 2016
12016
Liar buyer fraud, and how to curb it
M Jakobsson, H Siadati, M Dhiman
USEC Workshop-NDSS 2015, 2015
2015
How to Kill Spoofing
M Jakobsson, H Siadati
Mobile Authentication, 73-90, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–18