Hamed Soroush
Hamed Soroush
Zoox, PARC, RTI, UMass Amherst, CMU
Verified email at zoox.com
Title
Cited by
Cited by
Year
HYMAC: Hybrid TDMA/FDMA medium access control protocol for wireless sensor networks
M Salajegheh, H Soroush, A Kalis
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio …, 2007
1582007
DOME: a diverse outdoor mobile testbed
H Soroush, N Banerjee, A Balasubramanian, MD Corner, BN Levine, ...
Proceedings of the 1st ACM International Workshop on Hot Topics of Planet …, 2009
842009
Industrial internet reference architecture
SW Lin, B Miller, J Durand, R Joshi, P Didier, A Chigani, R Torenbeek, ...
Industrial Internet Consortium (IIC), Tech. Rep, 2015
792015
Industrial internet of things volume G4: security framework
S Schrecker, H Soroush, J Molina, J LeBlanc, F Hirsch, M Buchheit, ...
Ind. Internet Consort, 1-173, 2016
512016
Measurement and analysis of child pornography trafficking on P2P networks
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013
422013
Concurrent Wi-Fi for mobile users: analysis and measurements
H Soroush, P Gilbert, N Banerjee, BN Levine, M Corner, L Cox
Proceedings of the Seventh COnference on emerging Networking EXperiments and …, 2011
332011
Providing transparent security services to sensor networks
H Soroush, M Salajegheh, T Dimitriou
2007 IEEE International Conference on Communications, 3431-3436, 2007
292007
Spider: improving mobile networking with concurrent wi-fi connections
H Soroush, P Gilbert, N Banerjee, MD Corner, BN Levine, L Cox
Proceedings of the ACM SIGCOMM 2011 conference, 402-403, 2011
282011
Disabling GPS is Not Enough: Cellular location leaks over the Internet.
H Soroush, K Sung, E Learned-Miller, BN Levine, M Liberatore
Privacy Enhancing Technologies Symposium (PETS), 2013
14*2013
Toward a safe and secure medical Internet of Things
H Soroush, D Arney, J Goldman
IIC Journal of Innovation 2 (1), 4-18, 2016
122016
Discovering specification violations in networked software systems
RJ Walls, Y Brun, M Liberatore, BN Levine
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
112015
A retrospective look at the UMass DOME mobile testbed
H Soroush, N Banerjee, M Corner, B Levine, B Lynn
ACM SIGMOBILE Mobile Computing and Communications Review 15 (4), 2-15, 2012
112012
Resource bounded secure goal obfuscation
A Kulkarni, M Klenk, S Rane, H Soroush
Proceedings of the AAAI Fall Symposium on Integrating Planning, Diagnosis …, 2018
102018
WSN link-layer security frameworks
I Krontiris, T Dimitriou, H Soroush, M Salajegheh
Wireless Sensor Network Security 1, 142, 2008
62008
HyMAC: Hybrid TDMA/FDMA Medium Access Control Protocol for Wireless Sensor Networks
H Soroush, M Salajegheh, A Kalis
IEEE PIMRC, 2007
52007
LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks
N Komninos, H Soroush, M Salajegheh
32007
The Industrial Internet of Things volume G8: Vocabulary
Industrial Internet Consortium
IIC: PUB G 8, 2017
22017
Improving mobile networking with concurrent Wi-Fi connections
H Soroush, P Gilbert, N Banerjee, BN Levine, M Corner, L Cox
Technical Report UM-CS-2010-041, Department of Computer Science, UMASS Amherst, 2010
22010
. Sense, A Secure Framework for Sensor Network Data Acquisition, Monitoring and Command
M Salajegheh, H Soroush, A Thomos, T Dimitriou, I Krontiris
22006
SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs
H Soroush, M Albanese, MA Mehrabadi, I Iganibo, M Mosko, JH Gao, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-10, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20