Charles Kamhoua
Charles Kamhoua
US Army Research Laboratory, Network Security Branch
Verified email at mail.mil
Title
Cited by
Cited by
Year
Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability
X Liang, S Shetty, D Tosh, C Kamhoua, K Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
3092017
Security implications of blockchain cloud with analysis of block withholding attack
DK Tosh, S Shetty, X Liang, CA Kamhoua, KA Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
902017
Game theory for cyber security and privacy
CT Do, NH Tran, C Hong, CA Kamhoua, KA Kwiat, E Blasch, S Ren, ...
ACM Computing Surveys (CSUR) 50 (2), 1-37, 2017
792017
An evolutionary game-theoretic framework for cyber-threat information sharing
D Tosh, S Sengupta, C Kamhoua, K Kwiat, A Martin
2015 IEEE International Conference on Communications (ICC), 7341-7346, 2015
482015
Consensus protocols for blockchain-based data provenance: Challenges and opportunities
DK Tosh, S Shetty, X Liang, C Kamhoua, L Njilla
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
452017
Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy
CA Kamhoua, N Pissinou, K Makki
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
432011
Game theoretic modeling of security and interdependency in a public cloud
CA Kamhoua, L Kwiat, KA Kwiat, JS Park, M Zhao, M Rodriguez
2014 IEEE 7th international conference on cloud computing, 514-521, 2014
382014
Game theoretic modeling to enforce security information sharing among firms
DK Tosh, S Sengupta, S Mukhopadhyay, CA Kamhoua, KA Kwiat
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
332015
Security-aware virtual machine allocation in the cloud: A game theoretic approach
L Kwiat, CA Kamhoua, KA Kwiat, J Tang, A Martin
2015 IEEE 8th International Conference on Cloud Computing, 556-563, 2015
302015
Cyber-investment and cyber-information exchange decision modeling
DK Tosh, M Molloy, S Sengupta, CA Kamhoua, KA Kwiat
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
292015
Game theory with learning for cyber security monitoring
K Chung, CA Kamhoua, KA Kwiat, ZT Kalbarczyk, RK Iyer
2016 IEEE 17th International Symposium on High Assurance Systems Engineering …, 2016
282016
Cyber-threats information sharing in cloud computing: A game theoretic approach
C Kamhoua, A Martin, DK Tosh, KA Kwiat, C Heitzenrater, S Sengupta
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
282015
Mitigating routing misbehavior in multi-hop networks using evolutionary game theory
CA Kamhoua, N Pissinou, J Miller, SK Makki
2010 IEEE Globecom Workshops, 1957-1962, 2010
272010
Establishing evolutionary game models for cyber security information exchange (cybex)
D Tosh, S Sengupta, CA Kamhoua, KA Kwiat
Journal of Computer and System Sciences 98, 27-52, 2018
232018
Game theoretic attack analysis in online social network (OSN) services
J White, JS Park, CA Kamhoua, KA Kwiat
Proceedings of the 2013 ieee/acm international conference on advances in …, 2013
212013
Game theoretic analysis of cooperation in autonomous multi hop networks: The consequences of unequal traffic load
CA Kamhoua, N Pissinou, SK Makki
2010 IEEE Globecom Workshops, 1973-1978, 2010
192010
CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud
D Tosh, S Shetty, P Foytik, C Kamhoua, L Njilla
2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 302-309, 2018
182018
Testing for hardware trojans: A game-theoretic approach
CA Kamhoua, M Rodriguez, KA Kwiat
International Conference on Decision and Game Theory for Security, 360-369, 2014
182014
Trusted online social network (OSN) services with optimal data management
JS Park, KA Kwiat, CA Kamhoua, J White, S Kim
Computers & Security 42, 116-136, 2014
182014
Exploring the attack surface of blockchain: A systematic overview
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
arXiv preprint arXiv:1904.03487, 2019
172019
The system can't perform the operation now. Try again later.
Articles 1–20