Hamed Soroush
Hamed Soroush
Zoox, PARC, RTI, UMass Amherst, CMU
Verifierad e-postadress på zoox.com
Citeras av
Citeras av
HYMAC: Hybrid TDMA/FDMA medium access control protocol for wireless sensor networks
M Salajegheh, H Soroush, A Kalis
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio …, 2007
DOME: a diverse outdoor mobile testbed
H Soroush, N Banerjee, A Balasubramanian, MD Corner, BN Levine, ...
Proceedings of the 1st ACM International Workshop on Hot Topics of Planet …, 2009
Measurement and analysis of child pornography trafficking on P2P networks
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013
Concurrent Wi-Fi for mobile users: analysis and measurements
H Soroush, P Gilbert, N Banerjee, BN Levine, M Corner, L Cox
Proceedings of the Seventh COnference on emerging Networking EXperiments and …, 2011
Providing transparent security services to sensor networks
H Soroush, M Salajegheh, T Dimitriou
2007 IEEE International Conference on Communications, 3431-3436, 2007
Spider: improving mobile networking with concurrent wi-fi connections
H Soroush, P Gilbert, N Banerjee, MD Corner, BN Levine, L Cox
Proceedings of the ACM SIGCOMM 2011 conference, 402-403, 2011
Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks
G Bissias, B Levine, M Liberatore, B Lynn, J Moore, H Wallach, J Wolak
Child abuse & neglect 52, 185-199, 2016
Disabling GPS is Not Enough: Cellular location leaks over the Internet.
H Soroush, K Sung, E Learned-Miller, BN Levine, M Liberatore
Privacy Enhancing Technologies Symposium (PETS), 2013
A retrospective look at the UMass DOME mobile testbed
H Soroush, N Banerjee, M Corner, B Levine, B Lynn
ACM SIGMOBILE Mobile Computing and Communications Review 15 (4), 2-15, 2012
Discovering specification violations in networked software systems
RJ Walls, Y Brun, M Liberatore, BN Levine
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
WSN link-layer security frameworks
I Krontiris, T Dimitriou, H Soroush, M Salajegheh
Wireless Sensor Network Security 1, 142, 2008
MicroMobile: Leveraging mobile advertising for large-scale experimentation
MD Corner, BN Levine
Proceedings of the 16th Annual International Conference on Mobile Systems …, 2018
HyMAC: Hybrid TDMA/FDMA Medium Access Control Protocol for Wireless Sensor Networks
H Soroush, M Salajegheh, A Kalis
LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks
N Komninos, H Soroush, M Salajegheh
Improving mobile networking with concurrent Wi-Fi connections
H Soroush, P Gilbert, N Banerjee, BN Levine, M Corner, L Cox
Technical Report UM-CS-2010-041, Department of Computer Science, UMASS Amherst, 2010
. Sense, A Secure Framework for Sensor Network Data Acquisition, Monitoring and Command
M Salajegheh, H Soroush, A Thomos, T Dimitriou, I Krontiris
The Industrial Internet of Things Volume G8: Vocabulary
II Consortium
https://www.iiconsortium.org/pdf/IIC_Vocab_Technical_Report_2.0.pdf, 2017
Measurement and Analysis of Child Pornography Trafficking on P2P Networks, Final Technical Report
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Measurement-Driven Characterization of the Mobile Environment.
H Soroush
ProQuest LLC, 2013
Securing hierarchical sensor networks
H Soroush, M Salajegheh
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20