Amin Hassanzadeh

According to our database1, Amin Hassanzadeh authored at least 24 papers between 2008 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
FADE: Enabling Large-Scale Federated Adversarial Training on Resource-Constrained Edge Devices.
CoRR, 2022

2021
Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems.
EAI Endorsed Trans. Security Safety, 2021

FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

2020
Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper).
CoRR, 2020

A Review of Cybersecurity Incidents in the Water Sector.
CoRR, 2020

On the Effectiveness of Intrusion Response Systems against Persistent Threats.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

2019
Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System.
Proceedings of the Security and Privacy in Communication Networks, 2019

Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Towards Optimal Cyber Defense Remediation in Energy Delivery Systems.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System.
Proceedings of the IEEE Conference on Control Technology and Applications, 2018

2016
PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks.
Comput. Secur., 2016

2015
Towards effective security control assignment in the Industrial Internet of Things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

2014
RAPID: Traffic-agnostic intrusion detection for resource-constrained wireless mesh networks.
Comput. Secur., 2014

Traffic-and-resource-aware intrusion detection in wireless mesh networks.
Ad Hoc Networks, 2014

On the Attack-and-Fault Tolerance of Intrusion Detection Systems in Wireless Mesh Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014

2013
On the optimality of cooperative intrusion detection for resource constrained wireless networks.
Comput. Secur., 2013

PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2011
Efficient flooding in Wireless Sensor Networks secured with neighborhood keys.
Proceedings of the IEEE 7th International Conference on Wireless and Mobile Computing, 2011

Towards Optimal Monitoring in Cooperative IDS for Resource Constrained Wireless Networks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011

2009
A Performance-Enhancing Fault-Tolerant Routing Algorithm for Network-on-Chip in Uniform Traffic.
Proceedings of the Third Asia International Conference on Modelling & Simulation, 2009

2008
Intrusion Detection with Data Correlation Relation Graph.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...