The benefits of understanding passwords M Jakobsson, M Dhiman 7th USENIX Workshop on Hot Topics in Security (HotSec '12), Bellevue, WA, 2013 | 100 | 2013 |
Hopper: Modeling and detecting lateral movement G Ho, M Dhiman, D Akhawe, V Paxson, S Savage, GM Voelker, D Wagner 30th USENIX Security Symposium (USENIX Security 21), 3093-3110, 2021 | 34 | 2021 |
Detection of automated requests using session identifiers S Mehta, M Dhiman US Patent 10,931,686, 2021 | 14 | 2021 |
Automation Attacks at Scale-Credential Exploitation W Glazier, M Dhiman GreHack, 2017 | 2 | 2017 |
Breaking and fixing content-based filtering M Dhiman, M Jakobsson, TF Yen 2017 APWG Symposium on Electronic Crime Research (eCrime), 52-56, 2017 | 1 | 2017 |
Patch for Nothing and Slow for Free A Nappa, JLH Ardieta, M Dhiman Actas de las Cuartas Jornadas Nacionales de Investigación en Ciberseguridad …, 2018 | | 2018 |
Breaking Fraud & Bot Detection Solutions M Dhiman OWASP Appsec USA, 2018 | | 2018 |
Obfuscation in Spam and Scam M Dhiman, TF Yen, M Jakobsson Understanding Social Engineering Based Scams, 63-68, 2016 | | 2016 |
Liar Buyer Fraud, and How to Curb It M Jakobsson, H Siadati, M Dhiman Symposium on Usable Security (USEC), 2015 | | 2015 |
Social Networking Leaks M Dhiman, M Jakobsson The Death of the Internet, 197-241, 2012 | | 2012 |