Hamed Soroush
Hamed Soroush
University of Massachusetts, Amherst
Verified email at rti.com
TitleCited byYear
HYMAC: Hybrid TDMA/FDMA medium access control protocol for wireless sensor networks
M Salajegheh, H Soroush, A Kalis
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio …, 2007
DOME: a diverse outdoor mobile testbed
H Soroush, N Banerjee, A Balasubramanian, MD Corner, BN Levine, ...
Proceedings of the 1st ACM International Workshop on Hot Topics of Planet …, 2009
Measurement and analysis of child pornography trafficking on P2P networks
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013
Concurrent Wi-Fi for mobile users: analysis and measurements
H Soroush, P Gilbert, N Banerjee, BN Levine, M Corner, L Cox
Proceedings of the Seventh COnference on emerging Networking EXperiments and …, 2011
Providing transparent security services to sensor networks
H Soroush, M Salajegheh, T Dimitriou
2007 IEEE International Conference on Communications, 3431-3436, 2007
Spider: improving mobile networking with concurrent wi-fi connections
H Soroush, P Gilbert, N Banerjee, MD Corner, BN Levine, L Cox
ACM SIGCOMM Computer Communication Review 41 (4), 402-403, 2011
Disabling GPS is Not Enough: Cellular location leaks over the Internet.
H Soroush, K Sung, E Learned-Miller, BN Levine, M Liberatore
Privacy Enhancing Technologies Symposium (PETS), 2013
Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks
G Bissias, B Levine, M Liberatore, B Lynn, J Moore, H Wallach, J Wolak
Child abuse & neglect 52, 185-199, 2016
A retrospective look at the UMass DOME mobile testbed
H Soroush, N Banerjee, M Corner, B Levine, B Lynn
ACM SIGMOBILE Mobile Computing and Communications Review 15 (4), 2-15, 2012
Discovering specification violations in networked software systems
RJ Walls, Y Brun, M Liberatore, BN Levine
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
WSN link-layer security frameworks
I Krontiris, T Dimitriou, H Soroush, M Salajegheh
Wireless Sensor Network Security 1, 142, 2008
HyMAC: Hybrid TDMA/FDMA Medium Access Control Protocol for Wireless Sensor Networks
H Soroush, M Salajegheh, A Kalis
LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks
N Komninos, H Soroush, M Salajegheh
Improving mobile networking with concurrent Wi-Fi connections
H Soroush, P Gilbert, N Banerjee, BN Levine, M Corner, L Cox
Technical Report UM-CS-2010-041, Department of Computer Science, UMASS Amherst, 2010
. Sense, A Secure Framework for Sensor Network Data Acquisition, Monitoring and Command
M Salajegheh, H Soroush, A Thomos, T Dimitriou, I Krontiris
MicroMobile: Leveraging mobile advertising for large-scale experimentation
MD Corner, BN Levine
Proceedings of the 16th Annual International Conference on Mobile Systems …, 2018
The Industrial Internet of Things Volume G8: Vocabulary
II Consortium
https://www.iiconsortium.org/pdf/IIC_Vocab_Technical_Report_2.0.pdf, 2017
Measurement-Driven Characterization of the Mobile Environment.
H Soroush
ProQuest LLC, 2013
Securing hierarchical sensor networks
H Soroush, M Salajegheh
Increasing explicit, implicit, and temporal comprehension of central content of televised thematic presentations with the use of introductory organizers.
AA Sprouse
The system can't perform the operation now. Try again later.
Articles 1–20