


default search action
Amin Hassanzadeh
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j5]Kamrul Hasan, Sachin Shetty, Sharif Ullah
, Amin Hassanzadeh, Tariqul Islam:
Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems. EAI Endorsed Trans. Security Safety 8(28): e5 (2021) - 2016
- [j4]Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis:
PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks. Comput. Secur. 62: 114-132 (2016) - 2014
- [j3]Amin Hassanzadeh, Ala Altaweel
, Radu Stoleru:
Traffic-and-resource-aware intrusion detection in wireless mesh networks. Ad Hoc Networks 21: 18-41 (2014) - [j2]Amin Hassanzadeh, Radu Stoleru, Michalis Polychronakis, Geoffrey G. Xie
:
RAPID: Traffic-agnostic intrusion detection for resource-constrained wireless mesh networks. Comput. Secur. 46: 1-17 (2014) - 2013
- [j1]Amin Hassanzadeh, Radu Stoleru:
On the optimality of cooperative intrusion detection for resource constrained wireless networks. Comput. Secur. 34: 16-35 (2013)
Conference and Workshop Papers
- 2021
- [c16]Jingwei Sun, Ang Li, Louis DiValentin, Amin Hassanzadeh, Yiran Chen, Hai Li:
FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective. NeurIPS 2021: 12613-12624 - 2020
- [c15]Sharif Ullah
, Sachin Shelly, Amin Hassanzadeh, Anup Nayak, Kamrul Hasan:
On the Effectiveness of Intrusion Response Systems against Persistent Threats. ICNC 2020: 415-421 - 2019
- [c14]Kamrul Hasan, Sachin Shetty
, Sharif Ullah
, Amin Hassanzadeh, Ethan Hadar:
Towards Optimal Cyber Defense Remediation in Energy Delivery Systems. GLOBECOM 2019: 1-7 - [c13]Kamrul Hasan, Sachin Shetty
, Amin Hassanzadeh, Sharif Ullah
:
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk. MILCOM 2019: 1-8 - [c12]Ethan Hadar, Amin Hassanzadeh:
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements. RE 2019: 330-339 - [c11]Sharif Ullah
, Sachin Shetty
, Anup Nayak, Amin Hassanzadeh, Kamrul Hasan:
Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System. SecureComm (2) 2019: 146-160 - 2018
- [c10]Kamrul Hasan, Sachin Shetty
, Amin Hassanzadeh, Malek Ben Salem, Jay Chen:
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System. CCTA 2018: 1692-1697 - [c9]Kamrul Hasan, Sachin Shetty
, Amin Hassanzadeh, Malek Ben Salem, Jay Chen:
Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems. CNS 2018: 1-9 - 2015
- [c8]Amin Hassanzadeh, Shimon Modi, Shaan Mulchandani:
Towards effective security control assignment in the Industrial Internet of Things. WF-IoT 2015: 795-800 - 2014
- [c7]Amin Hassanzadeh, Radu Stoleru:
On the Attack-and-Fault Tolerance of Intrusion Detection Systems in Wireless Mesh Networks. ADHOC-NOW 2014: 387-401 - 2013
- [c6]Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis:
PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks. ICICS 2013: 213-228 - 2011
- [c5]Amin Hassanzadeh, Radu Stoleru, Basem Shihada
:
Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks. ADHOC-NOW 2011: 44-57 - [c4]Amin Hassanzadeh, Radu Stoleru:
Towards Optimal Monitoring in Cooperative IDS for Resource Constrained Wireless Networks. ICCCN 2011: 1-8 - [c3]Amin Hassanzadeh, Radu Stoleru, Jianer Chen:
Efficient flooding in Wireless Sensor Networks secured with neighborhood keys. WiMob 2011: 119-126 - 2009
- [c2]Arshin Rezazadeh
, Mahmood Fathy, Amin Hassanzadeh:
A Performance-Enhancing Fault-Tolerant Routing Algorithm for Network-on-Chip in Uniform Traffic. Asia International Conference on Modelling and Simulation 2009: 614-619 - 2008
- [c1]Amin Hassanzadeh, Babak Sadeghian:
Intrusion Detection with Data Correlation Relation Graph. ARES 2008: 982-989
Informal and Other Publications
- 2022
- [i4]Minxue Tang, Jianyi Zhang, Mingyuan Ma, Louis DiValentin, Aolin Ding, Amin Hassanzadeh, Hai Helen Li, Yiran Chen:
FADE: Enabling Large-Scale Federated Adversarial Training on Resource-Constrained Edge Devices. CoRR abs/2209.03839 (2022) - 2021
- [i3]Jingwei Sun, Ang Li, Louis DiValentin, Amin Hassanzadeh, Yiran Chen, Hai Li:
FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective. CoRR abs/2110.13864 (2021) - 2020
- [i2]Amin Hassanzadeh, Amin Rasekh, Stefano Galelli, Mohsen Aghashahi, Riccardo Taormina, Avi Ostfeld, M. Katherine Banks:
A Review of Cybersecurity Incidents in the Water Sector. CoRR abs/2001.11144 (2020) - [i1]Nader Sehatbakhsh, Ellie Daw, Onur Savas, Amin Hassanzadeh, Ian McCulloh:
Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper). CoRR abs/2010.05809 (2020)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint