Follow
Amin Hass
Amin Hass
Accenture Labs
Verified email at accenture.com
Title
Cited by
Cited by
Year
Connected security system
S Mulchandani, A Hassanzadeh, E Hovor, S Modi, W Negm
US Patent 10,148,679, 2018
3192018
A review of cybersecurity incidents in the water sector
A Hassanzadeh, A Rasekh, S Galelli, M Aghashahi, R Taormina, ...
Journal of Environmental Engineering 146 (5), 03120003, 2020
1902020
Event correlation across heterogeneous operations
A Hassanzadeh, S Modi, S Mulchandani, W Negm
US Patent 9,712,554, 2017
1692017
Smart water networks and cyber security
A Rasekh, A Hassanzadeh, S Mulchandani, S Modi, MK Banks
Journal of Water Resources Planning and Management 142 (7), 01816004, 2016
1012016
Towards effective security control assignment in the Industrial Internet of Things
A Hassanzadeh, S Modi, S Mulchandani
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 795-800, 2015
962015
Fl-wbc: Enhancing robustness against model poisoning attacks in federated learning from a client perspective
J Sun, A Li, L DiValentin, A Hassanzadeh, Y Chen, H Li
Advances in neural information processing systems 34, 12613-12624, 2021
912021
Detection of adversary lateral movement in multi-domain IIOT environments
A Hassanzadeh, A Benameur, RL Burkett, A Krishak, CA Chen, ...
US Patent 10,812,499, 2020
552020
Generating attack graphs in agile security platforms
A Hassanzadeh, A Nayak, MDS Ullah
US Patent 11,277,432, 2022
482022
Generating attack graphs in agile security platforms
E Hadar, A Hassanzadeh, D Grabois, G Fidel
US Patent 11,184,385, 2021
452021
Big data analytics on cyber attack graphs for prioritizing agile security requirements
E Hadar, A Hassanzadeh
2019 IEEE 27th International Requirements Engineering Conference (RE), 330-339, 2019
442019
Criticality analysis of attack graphs
A Hassanzadeh, K Hasan, A Nayak
US Patent 11,252,175, 2022
422022
Generating attack graphs in agile security platforms
E Hadar, A Hassanzadeh, L O'connor
US Patent 11,159,555, 2021
332021
Efficient flooding in wireless sensor networks secured with neighborhood keys
A Hassanzadeh, R Stoleru, J Chen
2011 IEEE 7th International Conference on Wireless and Mobile Computing …, 2011
332011
SAMIIT: Spiral Attack Model in IIoT Mapping Security Alerts to Attack Life Cycle Phases
A Hassanzadeh, R Burkett
5th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR …, 2018
312018
Towards optimal monitoring in cooperative ids for resource constrained wireless networks
A Hassanzadeh, R Stoleru
2011 Proceedings of 20th International Conference on Computer Communications …, 2011
312011
On the optimality of cooperative intrusion detection for resource constrained wireless networks
A Hassanzadeh, R Stoleru
Computers & Security 34, 16-35, 2013
282013
Traffic-and-Resource-Aware Intrusion Detection in Wireless Mesh Networks
A Hassanzadeh, A Altaweel, R Stoleru
272014
A wireless sensor, adhoc and delay tolerant network system for disaster response
H Chenji, A Hassanzadeh, M Won, Y Li, W Zhang, X Yang, R Stoleru, ...
Technical Report LENSS-09-02, 2011
272011
Generating attack graphs in agile security platforms
E Hadar, A Hassanzadeh, D Grabois, G Fidel, A Dayan
US Patent 11,281,806, 2022
262022
Generating attack graphs in agile security platforms
E Hadar, A Hassanzadeh, A Nayak
US Patent 11,232,235, 2022
242022
The system can't perform the operation now. Try again later.
Articles 1–20