Hamed Soroush
Hamed Soroush
Zoox, PARC, RTI, UMass Amherst, CMU
Verified email at zoox.com
Cited by
Cited by
HYMAC: Hybrid TDMA/FDMA medium access control protocol for wireless sensor networks
M Salajegheh, H Soroush, A Kalis
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio …, 2007
Industrial internet reference architecture
SW Lin, B Miller, J Durand, R Joshi, P Didier, A Chigani, R Torenbeek, ...
Industrial Internet Consortium (IIC), Tech. Rep, 2015
DOME: a diverse outdoor mobile testbed
H Soroush, N Banerjee, A Balasubramanian, MD Corner, BN Levine, ...
Proceedings of the 1st ACM International Workshop on Hot Topics of Planet …, 2009
Industrial internet of things volume G4: security framework
S Schrecker, H Soroush, J Molina, J LeBlanc, F Hirsch, M Buchheit, ...
Ind. Internet Consort, 1-173, 2016
Measurement and analysis of child pornography trafficking on P2P networks
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013
Concurrent Wi-Fi for mobile users: analysis and measurements
H Soroush, P Gilbert, N Banerjee, BN Levine, M Corner, L Cox
Proceedings of the Seventh COnference on emerging Networking EXperiments and …, 2011
Providing transparent security services to sensor networks
H Soroush, M Salajegheh, T Dimitriou
2007 IEEE International Conference on Communications, 3431-3436, 2007
Spider: improving mobile networking with concurrent wi-fi connections
H Soroush, P Gilbert, N Banerjee, MD Corner, BN Levine, L Cox
Proceedings of the ACM SIGCOMM 2011 conference, 402-403, 2011
Toward a safe and secure medical Internet of Things
H Soroush, D Arney, J Goldman
IIC Journal of Innovation 2 (1), 4-18, 2016
Disabling GPS is Not Enough: Cellular location leaks over the Internet.
H Soroush, K Sung, E Learned-Miller, BN Levine, M Liberatore
Privacy Enhancing Technologies Symposium (PETS), 2013
Resource bounded secure goal obfuscation
A Kulkarni, M Klenk, S Rane, H Soroush
AAAI Fall Symposium on Integrating Planning, Diagnosis and Causal Reasoning, 2018
Discovering specification violations in networked software systems
RJ Walls, Y Brun, M Liberatore, BN Levine
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
A retrospective look at the UMass DOME mobile testbed
H Soroush, N Banerjee, M Corner, B Levine, B Lynn
ACM SIGMOBILE Mobile Computing and Communications Review 15 (4), 2-15, 2012
WSN link-layer security frameworks
I Krontiris, T Dimitriou, H Soroush, M Salajegheh
Wireless Sensor Network Security 1, 142, 2008
Industrial Internet of Things Volume G4: Security Framework
S Mellor, M Buchheit, J LeBlanc, S Schrecker, H Soroush, J Molina, ...
Tech. Rep., 2016
HyMAC: Hybrid TDMA/FDMA Medium Access Control Protocol for Wireless Sensor Networks
H Soroush, M Salajegheh, A Kalis
LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks
N Komninos, H Soroush, M Salajegheh
The Industrial Internet of Things volume G8: Vocabulary
Industrial Internet Consortium
IIC: PUB G 8, 2017
Improving mobile networking with concurrent Wi-Fi connections
H Soroush, P Gilbert, N Banerjee, BN Levine, M Corner, L Cox
ACM SIGCOMM, Poster Session, 2011
. Sense, A Secure Framework for Sensor Network Data Acquisition, Monitoring and Command
M Salajegheh, H Soroush, A Thomos, T Dimitriou, I Krontiris
The system can't perform the operation now. Try again later.
Articles 1–20