Follow
Saman Zonouz
Saman Zonouz
Associate Professor, Georgia Tech
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
CloudID: Trustworthy cloud-based and cross-enterprise biometric identification
M Haghighat, S Zonouz, M Abdel-Mottaleb
Expert Systems with Applications 42 (21), 7905-7916, 2015
4182015
A multi-sensor energy theft detection framework for advanced metering infrastructures
S McLaughlin, B Holbert, A Fawaz, R Berthier, S Zonouz
IEEE journal on selected areas in communications 31 (7), 1319-1330, 2013
3342013
RRE: A game-theoretic intrusion response and recovery engine
SA Zonouz, H Khurana, WH Sanders, TM Yardley
IEEE Transactions on Parallel and Distributed Systems 25 (2), 395-406, 2013
3182013
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
L Garcia, F Brasser, MH Cintuglu, AR Sadeghi, OA Mohammed, ...
NDSS, 1-15, 2017
2412017
SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures
S Zonouz, KM Rogers, R Berthier, RB Bobba, WH Sanders, TJ Overbye
IEEE Transactions on Smart Grid 3 (4), 1790-1799, 2012
2132012
Identification using encrypted biometrics
M Haghighat, S Zonouz, M Abdel-Mottaleb
Computer Analysis of Images and Patterns: 15th International Conference …, 2013
2022013
CPIndex: Cyber-physical vulnerability assessment for power-grid infrastructures
C Vellaithurai, A Srivastava, S Zonouz, R Berthier
IEEE Transactions on Smart Grid 6 (2), 566-575, 2014
1872014
A cyber-physical modeling and assessment framework for power grid infrastructures
KR Davis, CM Davis, SA Zonouz, RB Bobba, R Berthier, L Garcia, ...
IEEE Transactions on smart grid 6 (5), 2464-2475, 2015
1652015
A Trusted Safety Verifier for Process Controller Code.
SE McLaughlin, SA Zonouz, DJ Pohly, PD McDaniel
NDSS 14, 2014
1542014
A cloud-based intrusion detection and response system for mobile phones
A Houmansadr, SA Zonouz, R Berthier
2011 IEEE/IFIP 41st International Conference on Dependable Systems and …, 2011
1422011
Chip: Channel independence-based pruning for compact neural networks
Y Sui, M Yin, Y Xie, H Phan, S Aliari Zonouz, B Yuan
Advances in Neural Information Processing Systems 34, 24604-24616, 2021
1382021
Watch me, but don't touch me! contactless control flow monitoring via electromagnetic emanations
Y Han, S Etigowni, H Liu, S Zonouz, A Petropulu
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1342017
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones
S Zonouz, A Houmansadr, R Berthier, N Borisov, W Sanders
Computers & Security 37, 215-227, 2013
1322013
SOCCA: A security-oriented cyber-physical contingency analysis in power infrastructures
S Zonouz, CM Davis, KR Davis, R Berthier, RB Bobba, WH Sanders
IEEE Transactions on Smart Grid 5 (1), 3-13, 2013
1302013
Cyber-physical resilience: Definition and assessment metric
A Clark, S Zonouz
IEEE Transactions on Smart Grid 10 (2), 1671-1684, 2017
1072017
Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed
P Wlazlo, A Sahu, Z Mao, H Huang, A Goulart, K Davis, S Zonouz
IET Cyber‐Physical Systems: Theory & Applications 6 (3), 164-177, 2021
1042021
Detecting industrial control malware using automated PLC code analytics
S Zonouz, J Rrushi, S McLaughlin
IEEE Security & Privacy 12 (6), 40-47, 2014
922014
Multi-source multi-domain data fusion for cyberattack detection in power systems
A Sahu, Z Mao, P Wlazlo, H Huang, K Davis, A Goulart, S Zonouz
IEEE Access 9, 119118-119138, 2021
802021
See no evil, hear no evil, feel no evil, print no evil? malicious fill patterns detection in additive manufacturing
C Bayens, T Le, L Garcia, R Beyah, M Javanmard, S Zonouz
26th USENIX Security Symposium (USENIX Security 17), 1181-1198, 2017
672017
AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures
S McLaughlin, B Holbert, S Zonouz, R Berthier
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
662012
The system can't perform the operation now. Try again later.
Articles 1–20