Connected security system S Mulchandani, A Hassanzadeh, E Hovor, S Modi, W Negm US Patent 10,148,679, 2018 | 310 | 2018 |
A review of cybersecurity incidents in the water sector A Hassanzadeh, A Rasekh, S Galelli, M Aghashahi, R Taormina, ... Journal of Environmental Engineering 146 (5), 03120003, 2020 | 174 | 2020 |
Event correlation across heterogeneous operations A Hassanzadeh, S Modi, S Mulchandani, W Negm US Patent 9,712,554, 2017 | 156 | 2017 |
Smart water networks and cyber security A Rasekh, A Hassanzadeh, S Mulchandani, S Modi, MK Banks Journal of Water Resources Planning and Management 142 (7), 01816004, 2016 | 97 | 2016 |
Towards effective security control assignment in the Industrial Internet of Things A Hassanzadeh, S Modi, S Mulchandani 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 795-800, 2015 | 88 | 2015 |
Fl-wbc: Enhancing robustness against model poisoning attacks in federated learning from a client perspective J Sun, A Li, L DiValentin, A Hassanzadeh, Y Chen, H Li Advances in Neural Information Processing Systems 34, 12613-12624, 2021 | 60 | 2021 |
Detection of adversary lateral movement in multi-domain IIOT environments A Hassanzadeh, A Benameur, RL Burkett, A Krishak, CA Chen, ... US Patent 10,812,499, 2020 | 51 | 2020 |
Big data analytics on cyber attack graphs for prioritizing agile security requirements E Hadar, A Hassanzadeh 2019 IEEE 27th International Requirements Engineering Conference (RE), 330-339, 2019 | 41 | 2019 |
Generating attack graphs in agile security platforms A Hassanzadeh, A Nayak, MDS Ullah US Patent 11,277,432, 2022 | 40 | 2022 |
Generating attack graphs in agile security platforms E Hadar, A Hassanzadeh, D Grabois, G Fidel US Patent 11,184,385, 2021 | 40 | 2021 |
Criticality analysis of attack graphs A Hassanzadeh, K Hasan, A Nayak US Patent 11,252,175, 2022 | 38 | 2022 |
Efficient flooding in wireless sensor networks secured with neighborhood keys A Hassanzadeh, R Stoleru, J Chen 2011 IEEE 7th International Conference on Wireless and Mobile Computing …, 2011 | 32 | 2011 |
Generating attack graphs in agile security platforms E Hadar, A Hassanzadeh, L O'connor US Patent 11,159,555, 2021 | 31 | 2021 |
SAMIIT: Spiral Attack Model in IIoT Mapping Security Alerts to Attack Life Cycle Phases A Hassanzadeh, R Burkett 5th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR …, 2018 | 31 | 2018 |
Towards optimal monitoring in cooperative ids for resource constrained wireless networks A Hassanzadeh, R Stoleru 2011 Proceedings of 20th International Conference on Computer Communications …, 2011 | 29 | 2011 |
A wireless sensor, adhoc and delay tolerant network system for disaster response H Chenji, A Hassanzadeh, M Won, Y Li, W Zhang, X Yang, R Stoleru, ... Technical Report LENSS-09-02, 2011 | 28 | 2011 |
Traffic-and-Resource-Aware Intrusion Detection in Wireless Mesh Networks A Hassanzadeh, A Altaweel, R Stoleru | 27 | 2014 |
On the optimality of cooperative intrusion detection for resource constrained wireless networks A Hassanzadeh, R Stoleru Computers & Security 34, 16-35, 2013 | 27 | 2013 |
Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks A Hassanzadeh, Z Xu, R Stoleru, G Gu Technical Report, 2012 | 25* | 2012 |
Generating attack graphs in agile security platforms E Hadar, A Hassanzadeh, D Grabois, G Fidel, A Dayan US Patent 11,281,806, 2022 | 24 | 2022 |