Seuraa
Hamed Soroush
Hamed Soroush
Zoox, PARC, RTI, UMass Amherst, CMU
Vahvistettu sähköpostiosoite verkkotunnuksessa zoox.com
Nimike
Viittaukset
Viittaukset
Vuosi
HYMAC: Hybrid TDMA/FDMA medium access control protocol for wireless sensor networks
M Salajegheh, H Soroush, A Kalis
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio …, 2007
1802007
Industrial internet reference architecture
SW Lin, B Miller, J Durand, R Joshi, P Didier, A Chigani, R Torenbeek, ...
Industrial Internet Consortium (IIC), Tech. Rep, 2015
1672015
DOME: a diverse outdoor mobile testbed
H Soroush, N Banerjee, A Balasubramanian, MD Corner, BN Levine, ...
Proceedings of the 1st ACM International Workshop on Hot Topics of Planet …, 2009
952009
Industrial internet of things volume G4: security framework
S Schrecker, H Soroush, J Molina, J LeBlanc, F Hirsch, M Buchheit, ...
Ind. Internet Consort, 1-173, 2016
912016
Measurement and analysis of child pornography trafficking on P2P networks
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013
602013
Concurrent Wi-Fi for mobile users: analysis and measurements
H Soroush, P Gilbert, N Banerjee, BN Levine, M Corner, L Cox
Proceedings of the Seventh COnference on emerging Networking EXperiments and …, 2011
392011
Providing transparent security services to sensor networks
H Soroush, M Salajegheh, T Dimitriou
2007 IEEE International Conference on Communications, 3431-3436, 2007
342007
Spider: improving mobile networking with concurrent wi-fi connections
H Soroush, P Gilbert, N Banerjee, MD Corner, BN Levine, L Cox
Proceedings of the ACM SIGCOMM 2011 conference, 402-403, 2011
282011
Toward a safe and secure medical Internet of Things
H Soroush, D Arney, J Goldman
IIC J. Innov 2 (1), 4-18, 2016
262016
Resource bounded secure goal obfuscation
A Kulkarni, M Klenk, S Rane, H Soroush
AAAI Fall Symposium on Integrating Planning, Diagnosis and Causal Reasoning, 2018
252018
Disabling GPS is Not Enough: Cellular location leaks over the Internet.
H Soroush, K Sung, E Learned-Miller, BN Levine, M Liberatore
Privacy Enhancing Technologies Symposium (PETS), 2013
16*2013
A retrospective look at the UMass DOME mobile testbed
H Soroush, N Banerjee, M Corner, B Levine, B Lynn
ACM SIGMOBILE Mobile Computing and Communications Review 15 (4), 2-15, 2012
142012
System and method for constructing a graph-based model for optimizing the security posture of a composed internet of things system
H Soroush, MA Mehrabadi, S Rane, M Albanese
US Patent 12,101,357, 2024
122024
WSN link-layer security frameworks
I Krontiris, T Dimitriou, H Soroush, M Salajegheh
Wireless Sensor Network Security 1, 142, 2008
122008
SCIBORG: Secure configurations for the IoT based on optimization and reasoning on graphs
H Soroush, M Albanese, MA Mehrabadi, I Iganibo, M Mosko, JH Gao, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-10, 2020
102020
The Industrial Internet of Things Volume G8: Vocabulary
A Karmarkar, M Buchheit
IIC: PUB G 8, 2017
92017
Industrial Internet of Things Volume G4: Security Framework
S Mellor, M Buchheit, J LeBlanc, S Schrecker, H Soroush, J Molina, ...
Industrial Internet Consortium, Tech. Rep, 2016
72016
HyMAC: Hybrid TDMA/FDMA Medium Access Control Protocol for Wireless Sensor Networks
H Soroush, M Salajegheh, A Kalis
IEEE PIMRC, 2007
52007
System and method for extracting configuration-related information for reasoning about the security and functionality of a composed internet of things system
H Soroush, MA Mehrabadi, S Rane, ME Mosko
US Patent 11,729,222, 2023
32023
LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks
N Komninos, H Soroush, M Salajegheh
32007
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20