关注
Amin Hass
Amin Hass
Accenture Labs
在 accenture.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Connected security system
S Mulchandani, A Hassanzadeh, E Hovor, S Modi, W Negm
US Patent 10,148,679, 2018
3092018
A review of cybersecurity incidents in the water sector
A Hassanzadeh, A Rasekh, S Galelli, M Aghashahi, R Taormina, ...
Journal of Environmental Engineering 146 (5), 03120003, 2020
1742020
Event correlation across heterogeneous operations
A Hassanzadeh, S Modi, S Mulchandani, W Negm
US Patent 9,712,554, 2017
1552017
Smart water networks and cyber security
A Rasekh, A Hassanzadeh, S Mulchandani, S Modi, MK Banks
Journal of Water Resources Planning and Management 142 (7), 01816004, 2016
962016
Towards effective security control assignment in the Industrial Internet of Things
A Hassanzadeh, S Modi, S Mulchandani
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 795-800, 2015
882015
Fl-wbc: Enhancing robustness against model poisoning attacks in federated learning from a client perspective
J Sun, A Li, L DiValentin, A Hassanzadeh, Y Chen, H Li
Advances in Neural Information Processing Systems 34, 12613-12624, 2021
582021
Detection of adversary lateral movement in multi-domain IIOT environments
A Hassanzadeh, A Benameur, RL Burkett, A Krishak, CA Chen, ...
US Patent 10,812,499, 2020
512020
Big data analytics on cyber attack graphs for prioritizing agile security requirements
E Hadar, A Hassanzadeh
2019 IEEE 27th International Requirements Engineering Conference (RE), 330-339, 2019
412019
Generating attack graphs in agile security platforms
A Hassanzadeh, A Nayak, MDS Ullah
US Patent 11,277,432, 2022
402022
Generating attack graphs in agile security platforms
E Hadar, A Hassanzadeh, D Grabois, G Fidel
US Patent 11,184,385, 2021
402021
Criticality analysis of attack graphs
A Hassanzadeh, K Hasan, A Nayak
US Patent 11,252,175, 2022
382022
Efficient flooding in wireless sensor networks secured with neighborhood keys
A Hassanzadeh, R Stoleru, J Chen
2011 IEEE 7th International Conference on Wireless and Mobile Computing …, 2011
322011
Generating attack graphs in agile security platforms
E Hadar, A Hassanzadeh, L O'connor
US Patent 11,159,555, 2021
312021
SAMIIT: Spiral Attack Model in IIoT Mapping Security Alerts to Attack Life Cycle Phases
A Hassanzadeh, R Burkett
5th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR …, 2018
312018
Towards optimal monitoring in cooperative ids for resource constrained wireless networks
A Hassanzadeh, R Stoleru
2011 Proceedings of 20th International Conference on Computer Communications …, 2011
292011
A wireless sensor, adhoc and delay tolerant network system for disaster response
H Chenji, A Hassanzadeh, M Won, Y Li, W Zhang, X Yang, R Stoleru, ...
Technical Report LENSS-09-02, 2011
282011
Traffic-and-Resource-Aware Intrusion Detection in Wireless Mesh Networks
A Hassanzadeh, A Altaweel, R Stoleru
272014
On the optimality of cooperative intrusion detection for resource constrained wireless networks
A Hassanzadeh, R Stoleru
Computers & Security 34, 16-35, 2013
272013
Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks
A Hassanzadeh, Z Xu, R Stoleru, G Gu
Technical Report, 2012
25*2012
Generating attack graphs in agile security platforms
E Hadar, A Hassanzadeh, D Grabois, G Fidel, A Dayan
US Patent 11,281,806, 2022
242022
系统目前无法执行此操作,请稍后再试。
文章 1–20