default search action
Hoda Mehrpouyan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Sean O'Toole, Hoda Mehrpouyan:
Towards Cyber-Physical Representation and Cyber-Resilience Against Attack and Failure within a Hydraulic Network Simulation Toolkit. SP (Workshops) 2024: 246-252 - 2023
- [c24]Chibuzo Ukegbu, Hoda Mehrpouyan:
Cooperative Verification of PLC Programs Using CoVeriTeam: Towards a reliable and secure Industrial Control Systems. CPS-IoT Week Workshops 2023: 37-42 - [c23]Chidi Agbo, Hoda Mehrpouyan:
Resilience of Industrial Control Systems Using Signal Temporal Logic And Autotuning Mechanism. DASC/PiCom/CBDCom/CyberSciTech 2023: 284-293 - [c22]Chidi Agbo, Hoda Mehrpouyan:
Achieving Cyber-Informed Engineering Through Bayesian Belief Network and Sensitivity Analysis. DSA 2023: 260-271 - [c21]Chibuzo Ukegbu, Ramesh Neupane, Hoda Mehrpouyan:
Ontology-based Framework for Boundary Verification of Safety and Security Properties in Industrial Control Systems. EICC 2023: 47-52 - [c20]Chibuzo Ukegbu, Hoda Mehrpouyan:
Benchmarks for the Verification of Safety and Security Properties of PLC Programs in Cooperative Verification Environments. ICISE 2023: 19-28 - [i6]Chidi Agbo, Hoda Mehrpouyan:
Conflict Analysis and Resolution of Safety and Security Boundary Conditions for Industrial Control Systems. CoRR abs/2305.06185 (2023) - 2022
- [j3]Dhanush kumar Ratakonda, Hoda Mehrpouyan, Jerry Alan Fails:
"Pictures are easier to remember than spellings!": Designing and evaluating KidsPic - A graphical image-based authentication mechanism. Int. J. Child Comput. Interact. 33: 100515 (2022) - [c19]Ramesh Neupane, Hoda Mehrpouyan:
An Ontology-Based Framework for Formal Verification of Safety and Security Properties of Control Logics. ECAI 2022: 1-8 - [c18]Kamryn Parker, Hoda Mehrpouyan, Jaclyn J. Kettler, Chad Houck:
Connecting Incident Reporting Infrastructure to Election Day Proceedings. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 568-584 - [c17]Chidi Agbo, Hoda Mehrpouyan:
Conflict Analysis and Resolution of Safety and Security Boundary Conditions for Industrial Control Systems. ICSRS 2022: 145-156 - 2021
- [c16]A. K. M. Nuhil Mehdy, Hoda Mehrpouyan:
Modeling of Personalized Privacy Disclosure Behavior: A Formal Method Approach. ARES 2021: 116:1-116:13 - [c15]Sean O'Toole, Cameron Sewell, Hoda Mehrpouyan:
IoT Security and Safety Testing Toolkits for Water Distribution Systems. IOTSMS 2021: 1-8 - [c14]A. K. M. Nuhil Mehdy, Michael D. Ekstrand, Bart P. Knijnenburg, Hoda Mehrpouyan:
Privacy as a Planned Behavior: Effects of Situational Factors on Privacy Perceptions and Plans. UMAP 2021: 169-178 - [i5]A. K. M. Nuhil Mehdy, Michael D. Ekstrand, Bart P. Knijnenburg, Hoda Mehrpouyan:
Privacy as a Planned Behavior: Effects of Situational Factors on Privacy Perceptions and Plans. CoRR abs/2104.11847 (2021) - [i4]A. K. M. Nuhil Mehdy, Hoda Mehrpouyan:
Modeling of Personalized Privacy Disclosure Behavior: A Formal Method Approach. CoRR abs/2106.11762 (2021) - [i3]A. K. M. Nuhil Mehdy, Hoda Mehrpouyan:
A Multi-input Multi-output Transformer-based Hybrid Neural Network for Multi-class Privacy Disclosure Detection. CoRR abs/2108.08483 (2021) - [i2]Sean O'Toole, Cameron Sewell, Hoda Mehrpouyan:
IoT Security and Safety Testing Toolkits for Water Distribution Systems. CoRR abs/2112.08473 (2021) - 2020
- [c13]Tyler Phillips, Timothy McJunkin, Craig Rieger, John Gardner, Hoda Mehrpouyan:
An Operational Resilience Metric for Modern Power Distribution Systems. QRS Companion 2020: 334-342 - [c12]A. K. M. Nuhil Mehdy, Hoda Mehrpouyan:
A User-Centric and Sentiment Aware Privacy-Disclosure Detection Framework based on Multi-input Neural Network. PrivateNLP@WSDM 2020: 21-26
2010 – 2019
- 2019
- [c11]Stacy Black, Rezvan Joshaghani, Dhanush kumar Ratakonda, Hoda Mehrpouyan, Jerry Alan Fails:
Anon what what?: Children's Understanding of the Language of Privacy. IDC 2019: 439-445 - [c10]Farhad Rasapour, Edoardo Serra, Hoda Mehrpouyan:
Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS). CANDAR 2019: 211-217 - [c9]Tyler Phillips, Hoda Mehrpouyan, John Gardner, Stephen Reese:
A Covert System Identification Attack on Constant Setpoint Control Systems. CANDAR Workshops 2019: 367-373 - [c8]Rezvan Joshaghani, Stacy Black, Elena Sherman, Hoda Mehrpouyan:
Formal specification and verification of user-centric privacy policies for ubiquitous systems. IDEAS 2019: 31:1-31:10 - 2018
- [c7]Farhad Rasapour, Hoda Mehrpouyan:
Misusing Sensory Channel to Attack Industrial Control Systems. CODASPY 2018: 158-160 - [c6]Roshan Shrestha, Hoda Mehrpouyan, Dianxiang Xu:
Model Checking of Security Properties in Industrial Control Systems (ICS). CODASPY 2018: 164-166 - [c5]Michael D. Ekstrand, Rezvan Joshaghani, Hoda Mehrpouyan:
Privacy for All: Ensuring Fair and Equitable Privacy Protections. FAT 2018: 35-47 - [c4]Michael D. Ekstrand, Mucun Tian, Mohammed R. Imran Kazi, Hoda Mehrpouyan, Daniel Kluver:
Exploring author gender in book rating and recommendation. RecSys 2018: 242-250 - [i1]Michael D. Ekstrand, Mucun Tian, Mohammed R. Imran Kazi, Hoda Mehrpouyan, Daniel Kluver:
Exploring Author Gender in Book Rating and Recommendation. CoRR abs/1808.07586 (2018) - 2017
- [c3]Hoda Mehrpouyan, Ion Madrazo Azpiazu, Maria Soledad Pera:
Measuring Personality for Automatic Elicitation of Privacy Preferences. PAC 2017: 84-95 - [c2]Rezvan Joshaghani, Hoda Mehrpouyan:
A Model-Checking Approach for Enforcing Purpose-Based Privacy Policies. PAC 2017: 178-179 - 2016
- [j2]Hoda Mehrpouyan, Dimitra Giannakopoulou, Guillaume Brat, Irem Y. Tumer, Chris Hoyle:
Complex Engineered Systems Design Verification Based on Assume-Guarantee Reasoning. Syst. Eng. 19(6): 461-476 (2016) - [c1]David Ackerman, Hoda Mehrpouyan:
Modeling human behavior to anticipate insider attacks via system dynamics. SpringSim (TMS-DEVS) 2016: 3 - 2015
- [j1]Hoda Mehrpouyan, Brandon Haley, Andy Dong, Irem Y. Tumer, Christopher Hoyle:
Resiliency analysis for complex engineered system design. Artif. Intell. Eng. Des. Anal. Manuf. 29(1): 93-108 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint