Hossein Siadati

Orcid: 0000-0002-5293-8450

Affiliations:
  • New York University


According to our database1, Hossein Siadati authored at least 14 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DevPhish: Exploring Social Engineering in Software Supply Chain Attacks on Developers.
CoRR, 2024

2023
Exploring the Threat of Software Supply Chain Attacks on Containerized Applications.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

2019
Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities.
IEEE Trans. Vis. Comput. Graph., 2019

2017
Mind your SMSes: Mitigating social engineering in second factor authentication.
Comput. Secur., 2017

Measuring the Effectiveness of Embedded Phishing Exercises.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper.
Proceedings of the Financial Cryptography and Data Security, 2017

Detecting Structurally Anomalous Logins Within Enterprise Networks.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Detecting malicious logins in enterprise networks using visualization.
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016

Traditional Countermeasures to Unwanted Email.
Proceedings of the Understanding Social Engineering Based Scams, 2016

2015
Verification Code Forwarding Attack (Short Paper).
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

2014
Finding Valuable Yelp Comments by Personality, Content, Geo, and Anomaly Analysis.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

2013
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Improved Visual Preference Authentication.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012


  Loading...