Follow
Amin Hass
Amin Hass
Accenture Labs
Verified email at accenture.com
Title
Cited by
Cited by
Year
Connected security system
S Mulchandani, A Hassanzadeh, E Hovor, S Modi, W Negm
US Patent 10,148,679, 2018
3082018
A review of cybersecurity incidents in the water sector
A Hassanzadeh, A Rasekh, S Galelli, M Aghashahi, R Taormina, ...
Journal of Environmental Engineering 146 (5), 03120003, 2020
1742020
Event correlation across heterogeneous operations
A Hassanzadeh, S Modi, S Mulchandani, W Negm
US Patent 9,712,554, 2017
1542017
Smart water networks and cyber security
A Rasekh, A Hassanzadeh, S Mulchandani, S Modi, MK Banks
Journal of Water Resources Planning and Management 142 (7), 01816004, 2016
962016
Towards effective security control assignment in the Industrial Internet of Things
A Hassanzadeh, S Modi, S Mulchandani
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 795-800, 2015
882015
Fl-wbc: Enhancing robustness against model poisoning attacks in federated learning from a client perspective
J Sun, A Li, L DiValentin, A Hassanzadeh, Y Chen, H Li
Advances in Neural Information Processing Systems 34, 12613-12624, 2021
582021
Detection of adversary lateral movement in multi-domain IIOT environments
A Hassanzadeh, A Benameur, RL Burkett, A Krishak, CA Chen, ...
US Patent 10,812,499, 2020
502020
Big data analytics on cyber attack graphs for prioritizing agile security requirements
E Hadar, A Hassanzadeh
2019 IEEE 27th International Requirements Engineering Conference (RE), 330-339, 2019
402019
Generating attack graphs in agile security platforms
A Hassanzadeh, A Nayak, MDS Ullah
US Patent 11,277,432, 2022
392022
Generating attack graphs in agile security platforms
E Hadar, A Hassanzadeh, D Grabois, G Fidel
US Patent 11,184,385, 2021
392021
Criticality analysis of attack graphs
A Hassanzadeh, K Hasan, A Nayak
US Patent 11,252,175, 2022
372022
Efficient flooding in wireless sensor networks secured with neighborhood keys
A Hassanzadeh, R Stoleru, J Chen
2011 IEEE 7th International Conference on Wireless and Mobile Computing …, 2011
322011
SAMIIT: Spiral Attack Model in IIoT Mapping Security Alerts to Attack Life Cycle Phases
A Hassanzadeh, R Burkett
5th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR …, 2018
312018
Generating attack graphs in agile security platforms
E Hadar, A Hassanzadeh, L O'connor
US Patent 11,159,555, 2021
302021
Towards optimal monitoring in cooperative ids for resource constrained wireless networks
A Hassanzadeh, R Stoleru
2011 Proceedings of 20th International Conference on Computer Communications …, 2011
292011
A wireless sensor, adhoc and delay tolerant network system for disaster response
H Chenji, A Hassanzadeh, M Won, Y Li, W Zhang, X Yang, R Stoleru, ...
Technical Report LENSS-09-02, 2011
282011
Traffic-and-Resource-Aware Intrusion Detection in Wireless Mesh Networks
A Hassanzadeh, A Altaweel, R Stoleru
272014
On the optimality of cooperative intrusion detection for resource constrained wireless networks
A Hassanzadeh, R Stoleru
Computers & Security 34, 16-35, 2013
272013
Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks
A Hassanzadeh, Z Xu, R Stoleru, G Gu
Technical Report, 2012
25*2012
Energy efficient monitoring for intrusion detection in battery-powered wireless mesh networks
A Hassanzadeh, R Stoleru, B Shihada
Ad-hoc, Mobile, and Wireless Networks: 10th International Conference, ADHOC …, 2011
242011
The system can't perform the operation now. Try again later.
Articles 1–20