Personal information

No personal information available

Activities

Employment (3)

Boise State University: Boise, Idaho, US

2021-08-15 to present | Associate Professor (Computer Science)
Employment
Source: Self-asserted source
Hoda Mehrpouyan

Boise State University: Boise, Idaho, US

2016-08-01 to 2021-08-01 | Assistant Professor (Computer Science)
Employment
Source: Self-asserted source
Hoda Mehrpouyan

Columbus State University: Columbus, GA, US

2014-08-01 to 2016-08-01 | Assistant Professor (Computer Science)
Employment
Source: Self-asserted source
Hoda Mehrpouyan

Education and qualifications (4)

Oregon State University: Corvallis, OR, US

2011-09-01 to 2014-07-01 | Ph.D. (Mechanical Engineering)
Education
Source: Self-asserted source
Hoda Mehrpouyan

Linköpings Universitet: Linköping, SE

2009-09-01 to 2011-08-01 | M.Sc. (Computer Science)
Education
Source: Self-asserted source
Hoda Mehrpouyan

British Columbia Institute of Technology: Burnaby, British Columbia, CA

2004-09-01 to 2007-04-01 | B.Tech. (Computer Science)
Education
Source: Self-asserted source
Hoda Mehrpouyan

Douglas College: New Westminster, BC, CA

2000-01-01 to 2005-12-01 | Dip.Sc.
Education
Source: Self-asserted source
Hoda Mehrpouyan

Professional activities (1)

Association for Computing Machinery: New York, NY, US

2016-09-01 to present
Membership
Source: Self-asserted source
Hoda Mehrpouyan

Funding (4)

INSURE: Idaho electioN cyberSecURity cEnter

2020-08 to 2023-08 | Award
State of Idaho (Idaho, US)
Source: Self-asserted source
Hoda Mehrpouyan

GenCyber 2020 Summer Camp at Boise State University for Secondary Teachers

2020-03 to 2022-02 | Award
National Security Agency (Md., Md., US)
GRANT_NUMBER:

H98230-20-1-0024

Source: Self-asserted source
Hoda Mehrpouyan

CAREER: Formal TOols foR SafEty aNd Security of Industrial Control Systems (FORENSICS)

2019-05-01 to 2024-04-30 | Grant
Directorate for Computer & Information Science & Engineering (Arlington, US)
GRANT_NUMBER: 1846493
Source: Self-asserted source
Hoda Mehrpouyan via DimensionsWizard

CRII: SaTC: A System for Privacy Management in Ubiquitous Environments

2016-08-01 to 2020-06-30 | Grant
Directorate for Computer & Information Science & Engineering (Arlington, US)
GRANT_NUMBER: 1657774
Source: Self-asserted source
Hoda Mehrpouyan via DimensionsWizard

Works (28)

Connecting Incident Reporting Infrastructure to Election Day Proceedings

2023 | Book chapter
Contributors: Kamryn Parker; Hoda Mehrpouyan; Jaclyn Kettler; Chad Houck
Source: check_circle
Crossref

Ontology-based Framework for Boundary Verification of Safety and Security Properties in Industrial Control Systems

2023-06-14 | Conference paper
Contributors: Chibuzo Ukegbu; Ramesh Neupane; Hoda Mehrpouyan
Source: check_circle
Crossref

Cooperative Verification of PLC Programs Using CoVeriTeam: Towards a reliable and secure Industrial Control Systems

2023-05-09 | Conference paper
Contributors: Chibuzo Ukegbu; Hoda Mehrpouyan
Source: check_circle
Crossref

A user-centric and sentiment aware privacy-disclosure detection framework based on multi-input neural network

CEUR Workshop Proceedings
2020 | Conference paper
EID:

2-s2.0-85082449399

Part of ISBN:

16130073

Contributors: Nuhil Mehdy, A.K.M.; Mehrpouyan, H.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

A Framework for Evaluating the Resilience Contribution of Solar PV and Battery Storage on the Grid

2020 Resilience Week (RWS)
2020-10-19 | Conference paper
Source: Self-asserted source
Hoda Mehrpouyan

FALCON: Framework for Anomaly Detection in Industrial Control Systems

Electronics
2020-07-24 | Journal article
Contributors: Subin Sapkota; A K M Nuhil Mehdy; Stephen Reese; Hoda Mehrpouyan
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

"Anon what what?": Children's understanding of the language of privacy

Proceedings of the 18th ACM International Conference on Interaction Design and Children, IDC 2019
2019 | Conference paper
EID:

2-s2.0-85068760449

Contributors: Black, S.; Joshaghani, R.; Ratakonda, D.K.; Mehrpouyan, H.; Fails, J.A.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

A covert system identification attack on constant setpoint control systems

Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019
2019 | Conference paper
EID:

2-s2.0-85078833269

Contributors: Phillips, T.; Mehrpouyan, H.; Gardner, J.; Reese, S.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Formal specification and verification of user-centric privacy policies for ubiquitous systems

ACM International Conference Proceeding Series
2019 | Conference paper
EID:

2-s2.0-85070984338

Contributors: Joshaghani, R.; Sherman, E.; Black, S.; Mehrpouyan, H.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS)

Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019
2019 | Conference paper
EID:

2-s2.0-85078957937

Contributors: Rasapour, F.; Serra, E.; Mehrpouyan, H.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Privacy Disclosures Detection in Natural-Language Text Through Linguistically-Motivated Artificial Neural Networks

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2019 | Book
EID:

2-s2.0-85067612935

Part of ISBN:

18678211

Contributors: Mehdy, N.; Kennington, C.; Mehrpouyan, H.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Design Resilience of Demand Response Systems Utilizing Locally Communicating Thermostatically Controlled Loads

Volume 6: Energy
2019-11-11 | Conference paper
Source: Self-asserted source
Hoda Mehrpouyan
grade
Preferred source (of 2)‎

Exploring author gender in book rating and recommendation

RecSys 2018 - 12th ACM Conference on Recommender Systems
2018 | Conference paper
EID:

2-s2.0-85056759148

Contributors: Ekstrand, M.D.; Tian, M.; Imran Kazi, M.R.; Mehrpouyan, H.; Kluver, D.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Misusing sensory channel to attack industrial control systems

CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy
2018 | Conference paper
EID:

2-s2.0-85052017687

Contributors: Rasapour, F.; Mehrpouyan, H.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Model checking of security properties in industrial control systems (ICS)

CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy
2018 | Conference paper
EID:

2-s2.0-85050256141

Contributors: Shrestha, R.; Mehrpouyan, H.; Xu, D.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

A Model-Checking Approach for Enforcing Purpose-Based Privacy Policies

Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017
2017 | Conference paper
EID:

2-s2.0-85046549787

Contributors: Joshaghani, R.; Mehrpouyan, H.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Measuring Personality for Automatic Elicitation of Privacy Preferences

Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017
2017 | Conference paper
EID:

2-s2.0-85046533408

Contributors: Mehrpouyan, H.; Azpiazu, I.M.; Pera, M.S.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Complex Engineered Systems Design Verification Based on Assume-Guarantee Reasoning

Systems Engineering
2016 | Journal article
EID:

2-s2.0-85006340699

Part of ISBN:

15206858 10981241

Contributors: Mehrpouyan, H.; Giannakopoulou, D.; Brat, G.; Tumer, I.Y.; Hoyle, C.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Modeling human behavior to anticipate insider attacks via system dynamics

Proceedings of the 2016 Spring Simulation Multiconference - TMS/DEVS Symposium on Theory of Modeling and Simulation, TMS/DEVS 2016
2016 | Conference paper
EID:

2-s2.0-85051099919

Contributors: Ackerman, D.; Mehrpouyan, H.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Combination of compositional verification and model checking for safety assessment of complex engineered systems

Proceedings of the ASME Design Engineering Technical Conference
2014 | Conference paper
EID:

2-s2.0-84926058414

Contributors: Mehrpouyan, H.; Giannakopoulou, D.; Tumer, I.Y.; Hoyle, C.; Brat, G.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Formal verification of complex systems based on SysML functional requirements

PHM 2014 - Proceedings of the Annual Conference of the Prognostics and Health Management Society 2014
2014 | Conference paper
EID:

2-s2.0-84920517383

Contributors: Mehrpouyan, H.; Tumer, I.Y.; Hoyle, C.; Giannakopoulou, D.; Brat, G.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Resiliency analysis for complex engineered system design

Artificial Intelligence for Engineering Design, Analysis and Manufacturing: AIEDAM
2014 | Journal article
EID:

2-s2.0-84921319311

Part of ISBN:

14691760 08900604

Contributors: Mehrpouyan, H.; Haley, B.; Dong, A.; Tumer, I.Y.; Hoyle, C.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Complex system design verification using assumption generation

Proceedings of the ASME Design Engineering Technical Conference
2013 | Conference paper
EID:

2-s2.0-84896971223

Contributors: Mehrpouyan, H.; Giannakopoulou, D.; Brat, G.; Tumer, I.Y.; Hoyle, C.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Resilient design of complex engineered systems

Proceedings of the ASME Design Engineering Technical Conference
2013 | Conference paper
EID:

2-s2.0-84897008757

Contributors: Mehrpouyan, H.; Haley, B.; Dong, A.; Tumer, I.Y.; Hoyle, C.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Resilient design of complex engineered systems against cascading failure

ASME International Mechanical Engineering Congress and Exposition, Proceedings (IMECE)
2013 | Conference paper
EID:

2-s2.0-84903477199

Contributors: Mehrpouyan, H.; Haley, B.; Dong, A.; Tumer, I.Y.; Hoyle, C.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

A framework for model-based safety analysis of complex engineered systems

Proceedings of International Design Conference, DESIGN
2012 | Conference paper
EID:

2-s2.0-84879706234

Part of ISBN:

18479073

Contributors: Mehrpouyan, H.; Kurtoglu, T.; Bunus, P.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

A model-based failure identification and propagation framework for conceptual design of complex systems

Proceedings of the ASME Design Engineering Technical Conference
2012 | Conference paper
EID:

2-s2.0-84884661671

Contributors: Mehrpouyan, H.; Jensen, D.C.; Hoyle, C.; Tumer, I.Y.; Kurtoglu, T.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier

Model-based hazard analysis of undesirable environmental and components interaction

IEEE Aerospace Conference Proceedings
2012 | Conference paper
EID:

2-s2.0-84861147152

Part of ISBN:

1095323X

Contributors: Mehrpouyan, H.; Bunus, P.; Kurtoglu, T.
Source: Self-asserted source
Hoda Mehrpouyan via Scopus - Elsevier