Hossein Siadati
Hossein Siadati
Verified email at - Homepage
Cited by
Cited by
Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication
H Siadati, T Nguyen, P Gupta, M Jakobsson, N Memon
Computer&Security, 2016
Detecting Structurally Anomalous Logins Within Enterprise Networks
H Siadati, N Memon
ACM Conference on Computer and Communications Security (CCS'17), 1273-1284, 2017
A phishing sites blacklist generator
M Sharifi, SH Siadati
2008 IEEE/ACS international conference on computer systems and applications …, 2008
Detecting Malicious Logins in Enterprise Networks Using Visualization
H Siadati, B Saket, N Memon
13th IEEE Symposium on Visualization for Cyber Security (VizSec), 2016
Measuring the Effectiveness of Embedded Phishing Exercises
H Siadati, S Palka, A Siegel, D McCoy
CSET, USENIX Security, 2017
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention
M Jakobsson, H Siadati
The New Codebreakers 1, 177-194, 2016
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
System and method for hierarchical cryptographic key generation using biometric data
B Jakobsson, S Siadati
US Patent 9,621,342, 2017
Traditional Countermeasures to Unwanted Emails
H Siadati, ST Jafarikhah, M Jakobsson
Understanding Social Engineering Based Scams, 53-63, 2016
Fortifying android patterns using persuasive security framework
H Siadati, P Gupta, S Smith, N Memon, M Ahamad
UBICOMM 2015, 81, 2015
Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities
J Koven, C Felix, H Siadati, E Bertini, M Jakobsson
IEEE VIS 2018, 2018
Verification code forwarding attack (short paper)
H Siadati, T Nguyen, N Memon
Technology and Practice of Passwords: 9th International Conference …, 2016
Finding valuable yelp comments by personality, content, geo, and anomaly analysis
J Koven, H Siadati, CY Lin
2014 IEEE International Conference on Data Mining Workshop, 1215-1218, 2014
Improved visual preference authentication
M Jakobsson, H Siadati
2012 Workshop on Socio-Technical Aspects in Security and Trust, 27-34, 2012
Method and System of Detecting Malicious Video Advertising Impressions
BM Jakobsson, R Gupta, A Gantman, S Siadati
US Patent App. 14/642,414, 2016
X-platform phishing: Abusing trust for targeted attacks short paper
H Siadati, T Nguyen, N Memon
Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017
A framework for analysis attackers’ accounts
H Siadati, J Koven, CF Silva, M Jakobsson, E Bertini, D Maimon, ...
Security, Privacy and User Interaction, 63-89, 2020
Exploring the Threat of Software Supply Chain Attacks on Containerized Applications
M Mounesan, H Siadati, S Jafarikhah
6th International Conference on Security of Information and Networks, 2023
Liar buyer fraud, and how to curb it
M Jakobsson, H Siadati, M Dhiman
USEC Workshop-NDSS 2015, 2015
How to Kill Spoofing
M Jakobsson, M Jakobsson, H Siadati
Mobile Authentication: Problems and Solutions, 73-90, 2013
The system can't perform the operation now. Try again later.
Articles 1–20