Follow
Hossein Siadati
Hossein Siadati
NYU->Google->Datadog
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication
H Siadati, T Nguyen, P Gupta, M Jakobsson, N Memon
Computer&Security, 2016
1162016
A phishing sites blacklist generator
M Sharifi, SH Siadati
2008 IEEE/ACS international conference on computer systems and applications …, 2008
752008
Detecting Structurally Anomalous Logins Within Enterprise Networks
H Siadati, N Memon
ACM Conference on Computer and Communications Security (CCS'17), 1273-1284, 2017
742017
Measuring the Effectiveness of Embedded Phishing Exercises
H Siadati, S Palka, A Siegel, D McCoy
CSET, USENIX Security, 2017
482017
Detecting Malicious Logins in Enterprise Networks Using Visualization
H Siadati, B Saket, N Memon
13th IEEE Symposium on Visualization for Cyber Security (VizSec), 2016
452016
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention
M Jakobsson, H Siadati
The New Codebreakers 1, 177-194, 2016
32*2016
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
282013
System and method for hierarchical cryptographic key generation using biometric data
B Jakobsson, S Siadati
US Patent 9,621,342, 2017
222017
Traditional Countermeasures to Unwanted Emails
H Siadati, ST Jafarikhah, M Jakobsson
Understanding Social Engineering Based Scams, 53-63, 2016
202016
Fortifying android patterns using persuasive security framework
H Siadati, P Gupta, S Smith, N Memon, M Ahamad
UBICOMM 2015, 81, 2015
182015
Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities
J Koven, C Felix, H Siadati, E Bertini, M Jakobsson
IEEE VIS 2018, 2018
162018
Verification code forwarding attack (short paper)
H Siadati, T Nguyen, N Memon
Technology and Practice of Passwords: 9th International Conference …, 2016
102016
Finding valuable yelp comments by personality, content, geo, and anomaly analysis
J Koven, H Siadati, CY Lin
2014 IEEE International Conference on Data Mining Workshop, 1215-1218, 2014
102014
Improved visual preference authentication
M Jakobsson, H Siadati
2012 Workshop on Socio-Technical Aspects in Security and Trust, 27-34, 2012
72012
X-platform phishing: Abusing trust for targeted attacks short paper
H Siadati, T Nguyen, N Memon
Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017
62017
Method and System of Detecting Malicious Video Advertising Impressions
BM Jakobsson, R Gupta, A Gantman, S Siadati
US Patent App. 14/642,414, 2016
62016
A framework for analysis attackers’ accounts
H Siadati, J Koven, CF Silva, M Jakobsson, E Bertini, D Maimon, ...
Security, Privacy and User Interaction, 63-89, 2020
32020
Exploring the Threat of Software Supply Chain Attacks on Containerized Applications
M Mounesan, H Siadati, S Jafarikhah
6th International Conference on Security of Information and Networks, 2023
12023
Assessing Perceptual Hash Algorithms for Publicly Evaluatable Framework
Y Saei, J Tahmoresnejad, S Jafarikhah, H Siadati
17th International Conference on Security of Information and Networks, 2024
2024
DevPhish: Exploring Social Engineering in Software Supply Chain Attacks on Developers
H Siadati, S Jafarikhah, E Sahin, TB Hernandez, EL Tripp, D Khryashchev, ...
IEEE UEMCON 2024, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20