default search action
Charles A. Kamhoua
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Fabrice Setephin Atedjio, Jean-Pierre Lienou, Frederica Free-Nelson, Sachin S. Shetty, Charles A. Kamhoua:
CycleGAN-Gradient Penalty for Enhancing Android Adversarial Malware Detection in Gray Box Setting. IEEE Access 12: 162685-162696 (2024) - [j43]Aymar Le Père Tchimwa Bouom, Jean-Pierre Lienou, Wilson Ejuh Geh, Frederica Nelson, Sachin Shetty, Charles A. Kamhoua:
Enhancing Cyber Resilience Through Traffic Generation Patterns in Complex Networks: A Study on Cascading Failures. IEEE Access 12: 164151-164163 (2024) - [j42]Fabrice Setephin Atedjio, Jean-Pierre Lienou, Frederica F. Nelson, Sachin S. Shetty, Charles A. Kamhoua:
A Defensive Strategy Against Android Adversarial Malware Attacks. IEEE Access 12: 169432-169441 (2024) - [j41]Priva Chassem Kamdem, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
Two-Layer Deception Model Based on Signaling Games Against Cyber Attacks on Cyber-Physical Systems. IEEE Access 12: 171559-171570 (2024) - [j40]Joelle Kabdjou, Elie Tagne Fute, Danda B. Rawat, Jaime C. Acosta, Charles A. Kamhoua:
A pipeline approach for privacy preservation against poisoning attacks in a Mobile Edge Computing environment. Ad Hoc Networks 154: 103385 (2024) - [j39]Volviane Saphir Mfogo, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
Adaptive learning-based hybrid recommender system for deception in Internet of Thing. Comput. Networks 255: 110853 (2024) - [j38]Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach. Comput. Secur. 139: 103696 (2024) - [j37]Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks. Int. J. Inf. Sec. 23(1): 373-387 (2024) - [j36]Aymar Le Père Tchimwa Bouom, Jean-Pierre Lienou, Wilson Ejuh Geh, Frederica Free-Nelson, Sachin Shetty, Charles A. Kamhoua:
TriAssetRank: Ranking Vulnerabilities, Exploits, and Privileges for Countermeasures Prioritization. IEEE Trans. Inf. Forensics Secur. 19: 10189-10205 (2024) - [c161]Abhinav Kumar, Swastik Brahma, Baocheng Geng, Charles A. Kamhoua, Pramod K. Varshney:
A Hypothesis Testing-based Framework for Cyber Deception with Sludging. Allerton 2024: 1-8 - [c160]Uttam Ghosh, Laurent Njilla, Sachin Shetty, Charles A. Kamhoua:
A Decentralized Smart Grid Communication Framework Using SDN-Enabled Blockchain. CCNC 2024: 982-985 - [c159]Ahmed Hemida, Ahmed Bilal Asghar, Charles A. Kamhoua, Jon M. Kleinberg:
A Game Theoretic Framework for Multi Domain Cyber Deception. EuroS&P Workshops 2024: 443-447 - [c158]Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
Deception-Based IDS Against ARP Spoofing Attacks in Software-Defined Networks. ICNC 2024: 188-192 - [c157]Priva Chassem Kamdem, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
Bayesian Game for Cyber Deception Against Remote Attack on Automotive Systems. ICNC 2024: 387-393 - [c156]Elisabeth Tchaptchet, Elie Fute Tagne, Jaime C. Acosta, Danda B. Rawat, Charles A. Kamhoua:
Detecting Deepfakes Using GAN Manipulation Defects in Human Eyes. ICNC 2024: 456-462 - [c155]Ines Carole Kombou Sihomnou, Abderrahim Benslimane, Ahmed Hemida, Gabriel Deugoue, Charles A. Kamhoua:
Game-Theoretic Defense Strategies for Mitigating Gray Hole Attacks on Energy-Limited Sensors in Wireless Sensor Networks. ICNC 2024: 1114-1120 - [c154]Adrien Njanko, Danda B. Rawat, Charles A. Kamhoua, Ahmed Hemida:
An Unsupervised Graph Neural Network Approach to Deceive UAV Network Reconnaissance Attack. INFOCOM (Workshops) 2024: 1-6 - [i31]Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh:
Decision Theory-Guided Deep Reinforcement Learning for Fast Learning. CoRR abs/2402.06023 (2024) - [i30]Abhishek Ninad Kulkarni, Matthew S. Cohen, Charles A. Kamhoua, Jie Fu:
Integrated Resource Allocation and Strategy Synthesis in Safety Games on Graphs with Deception. CoRR abs/2407.14436 (2024) - 2023
- [j35]Sumukha Udupa, Abhishek Ninad Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu:
Synthesizing Attack-Aware Control and Active Sensing Strategies Under Reactive Sensor Attacks. IEEE Control. Syst. Lett. 7: 265-270 (2023) - [j34]Haoxiang Ma, Shuo Han, Charles A. Kamhoua, Jie Fu:
Optimizing Sensor Allocation Against Attackers With Uncertain Intentions: A Worst-Case Regret Minimization Approach. IEEE Control. Syst. Lett. 7: 2863-2868 (2023) - [j33]Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh:
Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive Deception. IEEE Trans. Netw. Serv. Manag. 20(3): 3816-3830 (2023) - [c153]Haoxiang Ma, Shuo Han, Nandi Leslie, Charles A. Kamhoua, Jie Fu:
Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs. AAMAS 2023: 2616-2618 - [c152]Satyaki Nan, Laurent Njilla, Swastik Brahma, Charles A. Kamhoua:
Game and Prospect Theoretic Hardware Trojan Testing. CISS 2023: 1-6 - [c151]Joelle Kabdjou, Elie Tagne Fute, Danda B. Rawat, Jaime C. Acosta, Charles A. Kamhoua:
Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC). CITS 2023: 1-7 - [c150]Hussein Zangoti, Niki Pissinou, Charles A. Kamhoua:
An Efficient Approach for Merging Multidimensional Blockchains in Mobile IoT. DCOSS-IoT 2023: 142-149 - [c149]Joseph Bao, Murat Kantarcioglu, Yevgeniy Vorobeychik, Charles A. Kamhoua:
IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception. FLAIRS 2023 - [c148]Willie Kouam, Yezekael Hayel, Gabriel Deugoue, Olivier Tsemogne, Charles A. Kamhoua:
Asymmetric Centrality Game Against Network Epidemic Propagation. GameSec 2023: 86-109 - [c147]Md. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Charles A. Kamhoua:
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach. GameSec 2023: 195-214 - [c146]Haoxiang Ma, Shuo Han, Charles A. Kamhoua, Jie Fu:
Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs. GameSec 2023: 215-233 - [c145]Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks. GameSec 2023: 294-308 - [c144]Mohamed Osman, Tamer Nadeem, Ahmed Hemida, Charles A. Kamhoua:
Optimizing Honeypot Placement Strategies with Graph Neural Networks for Enhanced Resilience via Cyber Deception. GNNet@CoNEXT 2023: 37-43 - [c143]Ines Carole Kombou Sihomnou, Abderrahim Benslimane, Ahmed H. Anwar, Gabriel Deugoue, Frederica Free-Nelson, Charles A. Kamhoua:
Mitigating Energy Depletion Attack In Wireless Sensor Network Using Signaling Game. ICC 2023: 6016-6021 - [c142]Aymar Le Père Tchimwa Bouom, Jean-Pierre Lienou, Frederica Free-Nelson, Sachin Shetty, Wilson Ejuh Geh, Charles A. Kamhoua:
Cyber Resilience Measurement Through Logical Attack Graph Analysis. ICC 2023: 6034-6039 - [c141]Md Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold:
Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix. ICNC 2023: 181-187 - [c140]Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh:
Deception in Drone Surveillance Missions: Strategic vs. Learning Approaches. MobiHoc 2023: 382-387 - [c139]Volviane Saphir Mfogo, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices. PIMRC 2023: 1-6 - [c138]Achile Leonel Nguemkam, Ahmed H. Anwar, Vianney Kengne Tchendji, Deepak K. Tosh, Charles A. Kamhoua:
Optimal Honeypot Allocation using Core Attack Graph in Cyber Deception Games. PIMRC 2023: 1-6 - [i29]Haoxiang Ma, Shuo Han, Nandi Leslie, Charles A. Kamhoua, Jie Fu:
Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs. CoRR abs/2301.01336 (2023) - [i28]Volviane Saphir Mfogo, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices. CoRR abs/2303.12367 (2023) - [i27]Haoxiang Ma, Shuo Han, Charles A. Kamhoua, Jie Fu:
Optimizing Sensor Allocation against Attackers with Uncertain Intentions: A Worst-Case Regret Minimization Approach. CoRR abs/2304.05962 (2023) - [i26]Joseph Bao, Murat Kantarcioglu, Yevgeniy Vorobeychik, Charles A. Kamhoua:
IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception. CoRR abs/2305.00925 (2023) - [i25]Md. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Branislav Bosanský, Charles A. Kamhoua:
Cyber Deception against Zero-day Attacks: A Game Theoretic Approach. CoRR abs/2307.13107 (2023) - [i24]Md. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Charles A. Kamhoua:
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach. CoRR abs/2308.11817 (2023) - 2022
- [j32]Olivier Tsemogne, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue:
A Partially Observable Stochastic Zero-sum Game for a Network Epidemic Control Problem. Dyn. Games Appl. 12(1): 82-109 (2022) - [j31]Olivier Tsemogne, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue:
Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things. IEEE Internet Things J. 9(4): 2678-2687 (2022) - [j30]Soo-Yeon Ji, Bong-Keun Jeong, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong:
Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables. J. Netw. Comput. Appl. 203: 103392 (2022) - [j29]Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh:
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory. IEEE Trans. Netw. Serv. Manag. 19(1): 112-129 (2022) - [j28]Ahmed H. Anwar, Charles A. Kamhoua, Nandi O. Leslie, Christopher Kiekintveld:
Honeypot Allocation for Cyber Deception Under Uncertainty. IEEE Trans. Netw. Serv. Manag. 19(3): 3438-3452 (2022) - [c137]Ahmed H. Anwar, Charles A. Kamhoua:
Cyber Deception using Honeypot Allocation and Diversity: A Game Theoretic Approach. CCNC 2022: 543-549 - [c136]Md. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Branislav Bosanský, Charles A. Kamhoua:
Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach. GameSec 2022: 44-63 - [c135]Olivier Tsemogne, Willie Kouam, Ahmed H. Anwar, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue:
A Network Centrality Game for Epidemic Control. GameSec 2022: 255-273 - [c134]Olivier Tsemogne, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue:
Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path Game. GameSec 2022: 274-296 - [c133]Ahmed H. Anwar, Mu Zhu, Zelin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh:
Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory. GLOBECOM 2022: 3393-3398 - [c132]Felix O. Olowononi, Danda B. Rawat, Charles A. Kamhoua:
Deep Learning for Secure Transmission in Wireless Communication Networks. ICC Workshops 2022: 379-384 - [c131]Juan Shu, Bowei Xi, Charles A. Kamhoua:
Understanding Adversarial Examples Through Deep Neural Network's Classification Boundary and Uncertainty Regions. AISafety@IJCAI 2022 - [c130]Md Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold:
Attack Graph Embedded Machine Learning Platform For Cyber Situational Awareness. MILCOM 2022: 464-469 - [c129]Felix O. Olowononi, Danda B. Rawat, Charles A. Kamhoua, Brian M. Sadler:
Deep Reinforcement Learning for Deception in IRS-assisted UAV Communications. MILCOM 2022: 763-768 - [c128]Stephanie Milani, Zhicheng Zhang, Nicholay Topin, Zheyuan Ryan Shi, Charles A. Kamhoua, Evangelos E. Papalexakis, Fei Fang:
MAVIPER: Learning Decision Tree Policies for Interpretable Multi-agent Reinforcement Learning. ECML/PKDD (4) 2022: 251-266 - [c127]Md Ali Reza Al Amin, Sachin Shetty, Charles A. Kamhoua:
Cyber Deception Metrics For Interconnected Complex Systems. WSC 2022: 473-483 - [c126]Juan Shu, Bowei Xi, Yu Li, Fan Wu, Charles A. Kamhoua, Jianzhu Ma:
Understanding Dropout for Graph Neural Networks. WWW (Companion Volume) 2022: 1128-1138 - [i23]Sumukha Udupa, Abhishek Ninad Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu:
Synthesizing Attack-Aware Control and Active Sensing Strategies under Reactive Sensor Attacks. CoRR abs/2204.01584 (2022) - [i22]Stephanie Milani, Zhicheng Zhang, Nicholay Topin, Zheyuan Ryan Shi, Charles A. Kamhoua, Evangelos E. Papalexakis, Fei Fang:
MAVIPER: Learning Decision Tree Policies for Interpretable Multi-Agent Reinforcement Learning. CoRR abs/2205.12449 (2022) - 2021
- [j27]Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua:
Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement. IEEE Access 9: 49662-49682 (2021) - [j26]Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh:
A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning. IEEE Commun. Surv. Tutorials 23(4): 2460-2493 (2021) - [j25]Abhishek Ninad Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu:
Deceptive Labeling: Hypergames on Graphs for Stealthy Deception. IEEE Control. Syst. Lett. 5(3): 977-982 (2021) - [c125]Abhishek Ninad Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu:
Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness. CDC 2021: 586-592 - [c124]Junlin Wu, Charles A. Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik:
Learning Generative Deception Strategies in Combinatorial Masking Games. GameSec 2021: 98-117 - [c123]Kun Jin, Tongxin Yin, Charles A. Kamhoua, Mingyan Liu:
Network Games with Strategic Machine Learning. GameSec 2021: 118-137 - [c122]Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Charles A. Kamhoua:
Lightweight On-Demand Honeypot Deployment for Cyber Deception. ICDF2C 2021: 294-312 - [c121]Todd Huster, Jeremy E. J. Cohen, Zinan Lin, Kevin Chan, Charles A. Kamhoua, Nandi O. Leslie, Cho-Yu Jason Chiang, Vyas Sekar:
Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions. ICML 2021: 4523-4532 - [c120]Anthony Castañares, Deepak K. Tosh, Charles A. Kamhoua:
Slice Aware Framework for Intelligent and Reconfigurable Battlefield Networks. MILCOM 2021: 489-494 - [c119]Ahmed H. Anwar, Nandi O. Leslie, Charles A. Kamhoua:
Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems. MILCOM 2021: 1005-1010 - [c118]Felix O. Olowononi, Ahmed H. Anwar, Danda B. Rawat, Jaime C. Acosta, Charles A. Kamhoua:
Deep Learning for Cyber Deception in Wireless Networks. MSN 2021: 551-558 - [i21]Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh:
Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats. CoRR abs/2101.02863 (2021) - [i20]Todd Huster, Jeremy E. J. Cohen, Zinan Lin, Kevin Chan, Charles A. Kamhoua, Nandi Leslie, Cho-Yu Jason Chiang, Vyas Sekar:
Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions. CoRR abs/2101.09113 (2021) - [i19]Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh:
Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey. CoRR abs/2101.10121 (2021) - [i18]Abhishek Ninad Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu:
Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness. CoRR abs/2104.00176 (2021) - [i17]Juan Shu, Bowei Xi, Charles A. Kamhoua:
Understanding Adversarial Examples Through Deep Neural Network's Response Surface and Uncertainty Regions. CoRR abs/2107.00003 (2021) - [i16]Junlin Wu, Charles A. Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik:
Learning Generative Deception Strategies in Combinatorial Masking Games. CoRR abs/2109.11637 (2021) - 2020
- [j24]Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, David Mohaisen:
Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 22(3): 1977-2008 (2020) - [j23]Danda B. Rawat, Ronald Doku, Abdulhamid Adebayo, Chandra Bajracharya, Charles A. Kamhoua:
Blockchain Enabled Named Data Networking for Secure Vehicle-to-Everything Communications. IEEE Netw. 34(5): 185-189 (2020) - [j22]Hong Zhao, Luke Kwiat, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection. IEEE Trans. Dependable Secur. Comput. 17(4): 716-729 (2020) - [j21]Aziz Mohaisen, Zhongshu Gu, Kui Ren, Zhenhua Li, Charles A. Kamhoua, Laurent L. Njilla, DaeHun Nyang:
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation. IEEE Trans. Dependable Secur. Comput. 17(4): 745-759 (2020) - [j20]Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising. IEEE Trans. Dependable Secur. Comput. 17(6): 1257-1268 (2020) - [c117]Luan Huy Pham, Massimiliano Albanese, Ritu Chadha, Cho-Yu Jason Chiang, Sridhar Venkatesan, Charles A. Kamhoua, Nandi Leslie:
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses. CNS 2020: 1-9 - [c116]Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang:
Learning and Planning in the Feature Deception Problem. GameSec 2020: 23-44 - [c115]Stephanie Milani, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang:
Harnessing the Power of Deception in Attack Graph-Based Security Games. GameSec 2020: 147-167 - [c114]Abhishek Ninad Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, Nandi O. Leslie:
Decoy Allocation Games on Graphs with Temporal Logic Objectives. GameSec 2020: 168-187 - [c113]Feiran Jia, Kai Zhou, Charles A. Kamhoua, Yevgeniy Vorobeychik:
Blocking Adversarial Influence in Social Networks. GameSec 2020: 257-276 - [c112]Ahmed H. Anwar, Nandi O. Leslie, Charles A. Kamhoua, Christopher Kiekintveld:
A Game Theoretic Framework for Software Diversity for Network Security. GameSec 2020: 297-311 - [c111]Olivier Tsemogne, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue:
Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic. GameSec 2020: 312-325 - [c110]Ahmed H. Anwar, Charles A. Kamhoua:
Game Theory on Attack Graph for Cyber Deception. GameSec 2020: 445-456 - [c109]Md Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold:
Integrating Mission-Centric Impact Assessment to Operational Resiliency in Cyber-Physical Systems. GLOBECOM 2020: 1-7 - [c108]Aliou Badra Sarr, Ahmed H. Anwar, Charles A. Kamhoua, Nandi Leslie, Jaime C. Acosta:
Software Diversity for Cyber Deception. GLOBECOM 2020: 1-6 - [c107]Ahmed H. Anwar, Charles A. Kamhoua, Nandi Leslie:
Honeypot Allocation over Attack Graphs in Cyber Deception Games. ICNC 2020: 502-506 - [c106]Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, Nandi O. Leslie:
Mitigation of Jamming Attacks via Deception. PIMRC 2020: 1-6 - [c105]Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Nandi Leslie, Charles A. Kamhoua:
Cybersecurity Deception Experimentation System. SecDev 2020: 34-40 - [c104]Md Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold:
Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems. SecureComm (2) 2020: 41-61 - [c103]Soo-Yeon Ji, Bong-Keun Jeong, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong:
Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach. UEMCON 2020: 826-832 - [c102]Dule Shu, Nandi O. Leslie, Charles A. Kamhoua, Conrad S. Tucker:
Generative adversarial attacks against intrusion detection systems using active learning. WiseML@WiSec 2020: 1-6 - [i15]Jie Fu, Abhishek Ninad Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua:
Secure-by-synthesis network with active deception and temporal logic specifications. CoRR abs/2002.07025 (2020) - [i14]Abhishek Ninad Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu:
Deceptive Labeling: Hypergames on Graphs for Stealthy Deception. CoRR abs/2004.05213 (2020) - [i13]Abhishek Ninad Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, Nandi O. Leslie:
Decoy Allocation Games on Graphs with Temporal Logic Objectives. CoRR abs/2010.01208 (2020) - [i12]Feiran Jia, Kai Zhou, Charles A. Kamhoua, Yevgeniy Vorobeychik:
Blocking Adversarial Influence in Social Networks. CoRR abs/2011.01346 (2020)
2010 – 2019
- 2019
- [j19]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Laurent L. Njilla:
Data Provenance in the Cloud: A Blockchain-Based Approach. IEEE Consumer Electron. Mag. 8(4): 38-44 (2019) - [j18]Vuk Marojevic, Charles A. Kamhoua, Jeffrey H. Reed, Friedrich K. Jondral:
Secure Wireless Communications for Vehicle-to-Everything. IEEE Commun. Mag. 57(10): 76 (2019) - [j17]Karel Horák, Branislav Bosanský, Petr Tomásek, Christopher Kiekintveld, Charles A. Kamhoua:
Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games. Comput. Secur. 87 (2019) - [j16]Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles A. Kamhoua, Kevin A. Kwiat:
Transfer learning for detecting unknown network attacks. EURASIP J. Inf. Secur. 2019: 1 (2019) - [j15]Anas Katib, Praveen Rao, Kobus Barnard, Charles A. Kamhoua:
Fast Approximate Score Computation on Large-Scale Distributed Data for Learning Multinomial Bayesian Networks. ACM Trans. Knowl. Discov. Data 13(2): 14:1-14:40 (2019) - [j14]Zhiming Zhang, Laurent Njilla, Charles A. Kamhoua, Qiaoyan Yu:
Thwarting Security Threats From Malicious FPGA Tools With Novel FPGA-Oriented Moving Target Defense. IEEE Trans. Very Large Scale Integr. Syst. 27(3): 665-678 (2019) - [c101]Abhishek Roy, Anshuman Chhabra, Charles A. Kamhoua, Prasant Mohapatra:
A moving target defense against adversarial machine learning. SEC 2019: 383-388 - [c100]Anjon Basak, Charles A. Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld:
Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception. GameSec 2019: 21-32 - [c99]Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, Nandi O. Leslie:
Behavioral Cyber Deception: A Game and Prospect Theoretic Approach. GLOBECOM 2019: 1-6 - [c98]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen:
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems. IEEE ICBC 2019: 285-292 - [c97]Ashar Ahmad, Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Mostafa A. Bassiouni, Aziz Mohaisen:
BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails. ICC 2019: 1-6 - [c96]Marco A. Gamarra, Sachin Shetty, Oscar R. González, Laurent Njilla, Marcus Pendleton, Charles A. Kamhoua:
Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems. ICC 2019: 1-7 - [c95]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen:
Countering Selfish Mining in Blockchains. ICNC 2019: 360-364 - [c94]Chin-Tser Huang, Muhammad N. Sakib, Laurent Njilla, Charles A. Kamhoua:
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak. ICNC 2019: 457-462 - [c93]Karel Horák, Branislav Bosanský, Christopher Kiekintveld, Charles A. Kamhoua:
Compact Representation of Value Function in Partially Observable Stochastic Games. IJCAI 2019: 350-356 - [c92]Jielong Xu, Jian Tang, Zhiyuan Xu, Chengxiang Yin, Kevin A. Kwiat, Charles A. Kamhoua:
A Deep Recurrent Neural Network Based Predictive Control Framework for Reliable Distributed Stream Data Processing. IPDPS 2019: 262-272 - [c91]Ahmed H. Anwar, Charles A. Kamhoua, Nandi Leslie:
A game-theoretic framework for dynamic cyber deception in internet of battlefield things. MobiQuitous 2019: 522-526 - [c90]Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua:
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework. SecureComm (2) 2019: 205-223 - [c89]Soo-Yeon Ji, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong:
An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform. UEMCON 2019: 666-672 - [c88]Jeman Park, Aziz Mohaisen, Charles A. Kamhoua, Michael J. Weisman, Nandi O. Leslie, Laurent Njilla:
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments. WISA 2019: 299-312 - [i11]Karel Horák, Branislav Bosanský, Christopher Kiekintveld, Charles A. Kamhoua:
Compact Representation of Value Function in Partially Observable Stochastic Games. CoRR abs/1903.05511 (2019) - [i10]Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen:
Exploring the Attack Surface of Blockchain: A Systematic Overview. CoRR abs/1904.03487 (2019) - [i9]Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang:
Learning and Planning in Feature Deception Games. CoRR abs/1905.04833 (2019) - [i8]Mengmeng Ge, Jin-Hee Cho, Charles A. Kamhoua, Dong Seong Kim:
Optimal Deployments of Defense Mechanisms for the Internet of Things. CoRR abs/1908.00324 (2019) - 2018
- [j13]Marcello Cinque, Stefano Russo, Christian Esposito, Kim-Kwang Raymond Choo, Frederica Free-Nelson, Charles A. Kamhoua:
Cloud Reliability: Possible Sources of Security and Legal Issues? IEEE Cloud Comput. 5(3): 31-38 (2018) - [j12]Deepak K. Tosh, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat:
Establishing evolutionary game models for CYBer security information EXchange (CYBEX). J. Comput. Syst. Sci. 98: 27-52 (2018) - [j11]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Daniel Bowden, Laurent Njilla, Charles A. Kamhoua:
Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications. EAI Endorsed Trans. Pervasive Health Technol. 4(15): e3 (2018) - [j10]Zhenhua Chen, Jielong Xu, Jian Tang, Kevin A. Kwiat, Charles A. Kamhoua, Chonggang Wang:
GPU-Accelerated High-Throughput Online Stream Data Processing. IEEE Trans. Big Data 4(2): 191-202 (2018) - [j9]Hui Geng, Kevin A. Kwiat, Charles A. Kamhoua, Yiyu Shi:
On Random Dynamic Voltage Scaling for Internet-of-Things: A Game-Theoretic Approach. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1): 123-132 (2018) - [j8]Travis E. Schulze, Daryl G. Beetner, Yiyu Shi, Kevin A. Kwiat, Charles A. Kamhoua:
Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding. IEEE Trans. Very Large Scale Integr. Syst. 26(10): 2007-2015 (2018) - [c87]Deepak K. Tosh, Sachin Shetty, Peter Foytik, Charles A. Kamhoua, Laurent Njilla:
CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud. IEEE CLOUD 2018: 302-309 - [c86]Yuzhe Richard Tang, Qiwu Zou, Ju Chen, Kai Li, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
ChainFS: Blockchain-Secured Cloud Storage. IEEE CLOUD 2018: 987-990 - [c85]Charles A. Kamhoua:
Game theoretic modeling of cyber deception in the Internet of Battlefield Things. Allerton 2018: 862 - [c84]Anjon Basak, Jakub Cerný, Marcus Gutierrez, Shelby R. Curtis, Charles A. Kamhoua, Daniel Jones, Branislav Bosanský, Christopher Kiekintveld:
An Initial Study of Targeted Personality Models in the FlipIt Game. GameSec 2018: 623-636 - [c83]Zhiming Zhang, Qiaoyan Yu, Laurent Njilla, Charles A. Kamhoua:
FPGA-oriented moving target defense against security threats from malicious FPGA tools. HOST 2018: 163-166 - [c82]Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla, Aziz Mohaisen:
QOI: Assessing Participation in Threat Information Sharing. ICASSP 2018: 6951-6955 - [c81]Marco A. Gamarra, Sachin Shetty, David M. Nicol, Oscar Gonazlez, Charles A. Kamhoua, Laurent Njilla:
Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs. ICC 2018: 1-7 - [c80]Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat:
Enabling Cooperative IoT Security via Software Defined Networks (SDN). ICC 2018: 1-6 - [c79]Hellen Maziku, Sachin Shetty, Dong Jin, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Diversity Modeling to Evaluate Security of Multiple SDN Controllers. ICNC 2018: 344-348 - [c78]Danda B. Rawat, Laurent Njilla, Kevin A. Kwiat, Charles A. Kamhoua:
iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity. ICNC 2018: 425-431 - [c77]Yuanxiong Guo, Yanmin Gong, Laurent L. Njilla, Charles A. Kamhoua:
A stochastic game approach to cyber-physical security with applications to smart grid. INFOCOM Workshops 2018: 33-38 - [c76]Fatemeh Afghah, Alireza Shamsoshoara, Laurent Njilla, Charles A. Kamhoua:
A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish IoT devices. INFOCOM Workshops 2018: 312-317 - [c75]Abhishek Roy, Charles A. Kamhoua, Prasant Mohapatra:
Game Theoretic Characterization of Collusive Behavior Among Attackers. INFOCOM 2018: 2078-2086 - [c74]Zhiming Zhang, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Qiaoyan Yu:
Securing FPGA-based obsolete component replacement for legacy systems. ISQED 2018: 401-406 - [c73]Deepak K. Tosh, Sachin Shetty, Peter Foytik, Laurent Njilla, Charles A. Kamhoua:
Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture. MILCOM 2018: 593-598 - [c72]Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory. MWSCAS 2018: 853-856 - [c71]Mengmeng Ge, Jin-Hee Cho, Charles A. Kamhoua, Dong Seong Kim:
Optimal Deployments of Defense Mechanisms for the Internet of Things. SIoT 2018: 8-17 - [i7]Fatemeh Afghah, Alireza Shamsoshoara, Laurent Njilla, Charles A. Kamhoua:
A Reputation-based Stackelberg Game Model to Enhance Secrecy Rate in Spectrum Leasing to Selfish IoT Devices. CoRR abs/1802.05832 (2018) - [i6]Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat:
Enabling Cooperative IoT Security via Software Defined Networks (SDN). CoRR abs/1806.01885 (2018) - [i5]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen:
Countering Selfish Mining in Blockchains. CoRR abs/1811.09943 (2018) - 2017
- [j7]Cuong T. Do, Nguyen Hoang Tran, Choong Seon Hong, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren, Niki Pissinou, Sundaraja Sitharama Iyengar:
Game Theory for Cyber Security and Privacy. ACM Comput. Surv. 50(2): 30:1-30:37 (2017) - [j6]Osama Abbas Hussein Al Tameemi, Ayad Al-Rumaithi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs. IEEE Trans. Cogn. Commun. Netw. 3(1): 67-81 (2017) - [j5]Walid Saad, Anibal Sanjab, Yunpeng Wang, Charles A. Kamhoua, Kevin A. Kwiat:
Hardware Trojan Detection Game: A Prospect-Theoretic Approach. IEEE Trans. Veh. Technol. 66(9): 7697-7710 (2017) - [c70]Carlo Di Giulio, Read Sprabery, Charles A. Kamhoua, Kevin A. Kwiat, Roy H. Campbell, Masooda N. Bashir:
Cloud Standards in Comparison: Are New Security Frameworks Improving Cloud Security? CLOUD 2017: 50-57 - [c69]Xueping Liang, Sachin Shetty, Lingchen Zhang, Charles A. Kamhoua, Kevin A. Kwiat:
Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform. CLOUD 2017: 302-309 - [c68]Uttam Ghosh, Pushpita Chatterjee, Deepak K. Tosh, Sachin Shetty, Kaiqi Xiong, Charles A. Kamhoua:
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks. CLOUD 2017: 749-752 - [c67]Praveen Rao, Anas Katib, Kobus Barnard, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Scalable Score Computation for Learning Multinomial Bayesian Networks over Distributed Data. AAAI Workshops 2017 - [c66]Christophe Bobda, Joshua Mead, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat:
Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip. ARC 2017: 47-59 - [c65]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack. CCGrid 2017: 458-467 - [c64]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability. CCGrid 2017: 468-477 - [c63]Carlo Di Giulio, Charles A. Kamhoua, Roy H. Campbell, Read Sprabery, Kevin A. Kwiat, Masooda N. Bashir:
IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers. CCGrid 2017: 1090-1099 - [c62]Raj Gautam Dutta, Xiaolong Guo, Teng Zhang, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Estimation of Safe Sensor Measurements of Autonomous System Under Attack. DAC 2017: 46:1-46:6 - [c61]Shameek Bhattacharjee, Mehrdad Salimitari, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Preserving Data Integrity in IoT Networks Under Opportunistic Data Manipulation. DASC/PiCom/DataCom/CyberSciTech 2017: 446-453 - [c60]Kelvin Ly, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Approximate Power Grid Protection Against False Data Injection Attacks. DASC/PiCom/DataCom/CyberSciTech 2017: 527-533 - [c59]Travis E. Schulze, Daryl G. Beetner, Yiyu Shi, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Combating Data Leakage Trojans in Sequential Circuits Through Randomized Encoding. DASC/PiCom/DataCom/CyberSciTech 2017: 639-644 - [c58]Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Automatic Generation of Hardware Sandboxes for Trojan Mitigation in Systems on Chip (Abstract Only). FPGA 2017: 289 - [c57]Deepak K. Tosh, Sachin Shetty, Shamik Sengupta, Jay P. Kesan, Charles A. Kamhoua:
Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance. GAMENETS 2017: 154-164 - [c56]Deepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance. GameSec 2017: 519-532 - [c55]Danielle C. Tarraf, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Majority is Not Always Supreme: Less Can Be More When Voting with Compromised Nodes. HASE 2017: 9-12 - [c54]Laurent L. Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Patrick Hurley, Niki Pissinou:
Cyber Security Resource Allocation: A Markov Decision Process Approach. HASE 2017: 49-52 - [c53]Qi Cheng, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation. HASE 2017: 84-87 - [c52]Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Synthesis of hardware sandboxes for Trojan mitigation in systems on chip. HOST 2017: 172 - [c51]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Rethinking information sharing for threat intelligence. HotWeb 2017: 6:1-6:7 - [c50]Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A game theoretic approach for inspecting web-based malvertising. ICC 2017: 1-6 - [c49]Gael Kamdem, Charles A. Kamhoua, Yue Lu, Sachin Shetty, Laurent Njilla:
A Markov Game Theoritic Approach for Power Grid Security. ICDCS Workshops 2017: 139-144 - [c48]Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar, Jonathan Beltran, Charles A. Kamhoua, Brandon L. Hernandez, Laurent Njilla, Alex Pissinou Makki:
Preventing Colluding Identity Clone Attacks in Online Social Networks. ICDCS Workshops 2017: 187-192 - [c47]Ian D. Markwood, Yao Liu, Kevin A. Kwiat, Charles A. Kamhoua:
Electric grid power flow model camouflage against topology leaking attacks. INFOCOM 2017: 1-9 - [c46]Carlo Di Giulio, Read Sprabery, Charles A. Kamhoua, Kevin A. Kwiat, Roy H. Campbell, Masooda N. Bashir:
Cloud security certifications: a comparison to improve cloud service provider security. ICC 2017: 120:1-120:12 - [c45]Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar, Jonathan Beltran, Jerry Miller, Charles A. Kamhoua, Laurent L. Njilla:
Approach to detect non-adversarial overlapping collusion in crowdsourcing. IPCCC 2017: 1-8 - [c44]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Assessing Quality of Contribution in Information Sharing for Threat Intelligence. PAC 2017: 182-183 - [c43]Aziz Mohaisen, Zhongshu Gu, Kui Ren, Laurent Njilla, Charles A. Kamhoua, DaeHun Nyang:
Understanding the Privacy Implications of DNSSEC Look-Aside Validation. PAC 2017: 208-209 - [c42]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Laurent Njilla:
Consensus protocols for blockchain-based data provenance: Challenges and opportunities. UEMCON 2017: 469-474 - [c41]Prateek K. Singh, Koushik Kar, Charles A. Kamhoua:
Reputation Routing in MANETs. VTC Fall 2017: 1-7 - [i4]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Rethinking Information Sharing for Actionable Threat Intelligence. CoRR abs/1702.00548 (2017) - [i3]Omar Al-Ibrahim, Aziz Mohaisen, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence. CoRR abs/1702.00552 (2017) - [i2]AbdelRahman Eldosouky, Walid Saad, Charles A. Kamhoua, Kevin A. Kwiat:
Contract-Theoretic Resource Allocation for Critical Infrastructure Protection. CoRR abs/1702.06436 (2017) - [i1]Walid Saad, Anibal Sanjab, Yunpeng Wang, Charles A. Kamhoua, Kevin A. Kwiat:
Hardware Trojan Detection Game: A Prospect-Theoretic Approach. CoRR abs/1703.07499 (2017) - 2016
- [j4]Charles A. Kamhoua, Hong Zhao, Manuel Rodríguez, Kevin A. Kwiat:
A Game-Theoretic Approach for Testing for Hardware Trojans. IEEE Trans. Multi Scale Comput. Syst. 2(3): 199-210 (2016) - [c40]Praveen Rao, Anas Katib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content. CIT 2016: 407-414 - [c39]Dinuni K. Fernando, Hardik Bagdi, Yaohui Hu, Ping Yang, Kartik Gopalan, Charles A. Kamhoua, Kevin A. Kwiat:
Quick Eviction of Virtual Machines through Proactive Snapshots. CLUSTER 2016: 156-157 - [c38]Key-whan Chung, Charles A. Kamhoua, Kevin A. Kwiat, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Game Theory with Learning for Cyber Security Monitoring. HASE 2016: 1-8 - [c37]Qi Cheng, Kevin A. Kwiat, Charles A. Kamhoua:
Design Diversity for Mitigating Monoculture Induced Threats. HASE 2016: 17-18 - [c36]Swastik Brahma, Kevin A. Kwiat, Pramod K. Varshney, Charles A. Kamhoua:
CSRS: Cyber Survive and Recover Simulator. HASE 2016: 110-113 - [c35]Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors. AsianHOST 2016: 1-6 - [c34]Travis E. Schulze, Kevin A. Kwiat, Charles A. Kamhoua, Shih-Chieh Chang, Yiyu Shi:
RECORD: Temporarily Randomized Encoding of COmbinational Logic for Resistance to Data Leakage from hardware Trojan. AsianHOST 2016: 1-6 - [c33]Osama Abbas Al Tameemi, Ayad Al-Rumaithi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Connectivity and rendezvous in distributed DSA networks. ICNC 2016: 1-7 - [c32]Dinuni K. Fernando, Hardik Bagdi, Yaohui Hu, Ping Yang, Kartik Gopalan, Charles A. Kamhoua, Kevin A. Kwiat:
Quick eviction of virtual machines through proactive live snapshots. UCC 2016: 99-107 - 2015
- [c31]Luke Kwiat, Charles A. Kamhoua, Kevin A. Kwiat, Jian Tang, Andrew P. Martin:
Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach. CLOUD 2015: 556-563 - [c30]Zhenhua Chen, Jielong Xu, Jian Tang, Kevin A. Kwiat, Charles A. Kamhoua:
G-Storm: GPU-enabled high-throughput online data processing in Storm. IEEE BigData 2015: 307-312 - [c29]Manuel Rodríguez, Kevin A. Kwiat, Charles A. Kamhoua:
On the use of design diversity in fault tolerant and secure systems: A qualitative analysis. CISDA 2015: 1-8 - [c28]Hong Zhao, Kevin A. Kwiat, Charles A. Kamhoua, Manuel Rodríguez:
Applying chaos theory for runtime Hardware Trojan detection. CISDA 2015: 1-6 - [c27]Deepak K. Tosh, Shamik Sengupta, Sankar Mukhopadhyay, Charles A. Kamhoua, Kevin A. Kwiat:
Game Theoretic Modeling to Enforce Security Information Sharing among Firms. CSCloud 2015: 7-12 - [c26]Charles A. Kamhoua, Andrew P. Martin, Deepak K. Tosh, Kevin A. Kwiat, Chad Heitzenrater, Shamik Sengupta:
Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach. CSCloud 2015: 382-389 - [c25]AbdelRahman Eldosouky, Walid Saad, Charles A. Kamhoua, Kevin A. Kwiat:
Contract-Theoretic Resource Allocation for Critical Infrastructure Protection. GLOBECOM 2015: 1-6 - [c24]Deepak K. Tosh, Matthew Molloy, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat:
Cyber-Investment and Cyber-Information Exchange Decision Modeling. HPCC/CSS/ICESS 2015: 1219-1224 - [c23]Jielong Xu, Jian Tang, Brendan Mumey, Weiyi Zhang, Kevin A. Kwiat, Charles A. Kamhoua:
Cost-Efficient Virtual Server Provisioning and Selection in distributed Data Centers. ICC 2015: 5466-5472 - [c22]Deepak K. Tosh, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat, Andrew P. Martin:
An evolutionary game-theoretic framework for cyber-threat information sharing. ICC 2015: 7341-7346 - [c21]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
NAPF: Percolation driven probabilistic flooding for interference limited cognitive radio networks. ICC 2015: 7534-7539 - [c20]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Capacity bounds of finite secondary cognitive radio networks. ICNC 2015: 476-481 - [c19]Shameek Bhattacharjee, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Bayesian inference based decision reliability under imperfect monitoring. IM 2015: 1333-1338 - [c18]Ming Zhao, Francois D'Ugard, Kevin A. Kwiat, Charles A. Kamhoua:
Multi-level VM replication based survivability for mission-critical cloud computing. IM 2015: 1351-1356 - [c17]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Distributed MAC for connectivity maximization of interference limited un-coordinated DSA networks. MILCOM 2015: 103-108 - [c16]Shameek Bhattacharjee, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Multinomial trust in presence of uncertainty and adversaries in DSA networks. MILCOM 2015: 611-616 - [c15]Manuel Rodríguez, Kevin A. Kwiat, Charles A. Kamhoua:
Modeling fault tolerant architectures with design diversity for secure systems. MILCOM 2015: 1254-1263 - [c14]Festus Hategekimana, Adil Tbatou, Christophe Bobda, Charles A. Kamhoua, Kevin A. Kwiat:
Hardware isolation technique for IRC-based botnets detection. ReConFig 2015: 1-6 - [c13]Charles A. Kamhoua, Anbang Ruan, Andrew P. Martin, Kevin A. Kwiat:
On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis. UCC 2015: 217-226 - 2014
- [j3]Joon S. Park, Kevin A. Kwiat, Charles A. Kamhoua, Jonathan White, Sookyung Kim:
Trusted Online Social Network (OSN) services with optimal data management. Comput. Secur. 42: 116-136 (2014) - [j2]Jonathan White, Joon S. Park, Charles A. Kamhoua, Kevin A. Kwiat:
Social network attack simulation with honeytokens. Soc. Netw. Anal. Min. 4(1): 221 (2014) - [c12]Charles A. Kamhoua, Luke Kwiat, Kevin A. Kwiat, Joon S. Park, Ming Zhao, Manuel Rodríguez:
Game Theoretic Modeling of Security and Interdependency in a Public Cloud. IEEE CLOUD 2014: 514-521 - [c11]Charles A. Kamhoua, Manuel Rodríguez, Kevin A. Kwiat:
Testing for Hardware Trojans: A Game-Theoretic Approach. GameSec 2014: 360-369 - [c10]Swastik Brahma, Kevin A. Kwiat, Pramod K. Varshney, Charles A. Kamhoua:
Diversity and System Security: A Game Theoretic Perspective. MILCOM 2014: 146-151 - 2013
- [c9]Jonathan White, Joon S. Park, Charles A. Kamhoua, Kevin A. Kwiat:
Game theoretic attack analysis in online social network (OSN) services. ASONAM 2013: 1012-1019 - [c8]Xinyu Jin, Niki Pissinou, Sitthapon Pumpichet, Charles A. Kamhoua, Kevin A. Kwiat:
Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory. LCN 2013: 835-842 - 2012
- [j1]Charles A. Kamhoua, Kevin A. Kwiat, Joon S. Park:
Surviving in Cyberspace: A Game Theoretic Approach. J. Commun. 7(6): 436-450 (2012) - [c7]Charles A. Kamhoua, Kevin A. Kwiat, Joon S. Park:
A game theoretic approach for modeling optimal data sharing on Online Social Networks. CCE 2012: 1-6 - [c6]Charles A. Kamhoua, Niki Pissinou, Kia Makki, Kevin A. Kwiat, S. Sitharama Iyengar:
Game theoretic analysis of users and providers behavior in network under scarce resources. ICNC 2012: 1149-1155 - [c5]Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:
Optimal State Management of Data Sharing in Online Social Network (OSN) Services. TrustCom 2012: 648-655 - [c4]Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:
Towards trusted data management in online social network (OSN) services. WorldCIS 2012: 202-203 - 2011
- [c3]Charles A. Kamhoua, Niki Pissinou, Kia Makki:
Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy. ICC 2011: 1-6 - 2010
- [c2]Charles A. Kamhoua, Niki Pissinou, Alan Busovaca, Kia Makki:
Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring. IPCCC 2010: 315-324 - [c1]Charles A. Kamhoua, Niki Pissinou:
Mitigating selfish misbehavior in multi-hop networks using stochastic game theory. LCN 2010: 232-235
Coauthor Index
aka: Ahmed Hemida
aka: Nandi O. Leslie
aka: Aziz Mohaisen
aka: Laurent L. Njilla
aka: Sachin S. Shetty
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint