Hamed Soroush
Hamed Soroush
Zoox, PARC, RTI, UMass Amherst, CMU
Verified email at
Cited by
Cited by
HYMAC: Hybrid TDMA/FDMA medium access control protocol for wireless sensor networks
M Salajegheh, H Soroush, A Kalis
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio …, 2007
Industrial internet reference architecture
SW Lin, B Miller, J Durand, R Joshi, P Didier, A Chigani, R Torenbeek, ...
Industrial Internet Consortium (IIC), Tech. Rep, 2015
DOME: a diverse outdoor mobile testbed
H Soroush, N Banerjee, A Balasubramanian, MD Corner, BN Levine, ...
Proceedings of the 1st ACM International Workshop on Hot Topics of Planet …, 2009
Industrial internet of things volume G4: security framework
S Schrecker, H Soroush, J Molina, J LeBlanc, F Hirsch, M Buchheit, ...
Ind. Internet Consort, 1-173, 2016
Measurement and analysis of child pornography trafficking on P2P networks
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013
Concurrent Wi-Fi for mobile users: analysis and measurements
H Soroush, P Gilbert, N Banerjee, BN Levine, M Corner, L Cox
Proceedings of the Seventh COnference on emerging Networking EXperiments and …, 2011
Providing transparent security services to sensor networks
H Soroush, M Salajegheh, T Dimitriou
2007 IEEE International Conference on Communications, 3431-3436, 2007
Spider: improving mobile networking with concurrent wi-fi connections
H Soroush, P Gilbert, N Banerjee, MD Corner, BN Levine, L Cox
Proceedings of the ACM SIGCOMM 2011 conference, 402-403, 2011
Resource bounded secure goal obfuscation
A Kulkarni, M Klenk, S Rane, H Soroush
AAAI Fall Symposium on Integrating Planning, Diagnosis and Causal Reasoning, 2018
Toward a safe and secure medical Internet of Things
H Soroush, D Arney, J Goldman
IIC J. Innov 2 (1), 4-18, 2016
Disabling GPS is Not Enough: Cellular location leaks over the Internet.
H Soroush, K Sung, E Learned-Miller, BN Levine, M Liberatore
Privacy Enhancing Technologies Symposium (PETS), 2013
A retrospective look at the UMass DOME mobile testbed
H Soroush, N Banerjee, M Corner, B Levine, B Lynn
ACM SIGMOBILE Mobile Computing and Communications Review 15 (4), 2-15, 2012
WSN link-layer security frameworks
I Krontiris, T Dimitriou, H Soroush, M Salajegheh
Wireless Sensor Network Security 1, 142, 2008
SCIBORG: Secure configurations for the IoT based on optimization and reasoning on graphs
H Soroush, M Albanese, MA Mehrabadi, I Iganibo, M Mosko, JH Gao, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-10, 2020
The Industrial Internet of Things Volume G8: Vocabulary
A Karmarkar, F Hirsch, E Simmon, E Bournival, M Buchheit, R Joshi, ...
IIC: PUB G 8, 2017
System and method for constructing a graph-based model for optimizing the security posture of a composed internet of things system
H Soroush, MA Mehrabadi, S Rane
US Patent App. 16/918,971, 2021
Industrial Internet of Things Volume G4: Security Framework
S Mellor, M Buchheit, J LeBlanc, S Schrecker, H Soroush, J Molina, ...
Industrial Internet Consortium, Tech. Rep, 2016
HyMAC: Hybrid TDMA/FDMA Medium Access Control Protocol for Wireless Sensor Networks
H Soroush, M Salajegheh, A Kalis
System and method for extracting configuration-related information for reasoning about the security and functionality of a composed internet of things system
H Soroush, MA Mehrabadi, S Rane, ME Mosko
US Patent 11,729,222, 2023
The Industrial Internet of Things volume G8: Vocabulary
Industrial Internet Consortium
IIC: PUB G 8, 2017
The system can't perform the operation now. Try again later.
Articles 1–20