Charles Kamhoua
Charles Kamhoua
US Army Research Laboratory, Network Security Branch
Verified email at mail.mil
TitleCited byYear
Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability
X Liang, S Shetty, D Tosh, C Kamhoua, K Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
2682017
Security implications of blockchain cloud with analysis of block withholding attack
DK Tosh, S Shetty, X Liang, CA Kamhoua, KA Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
762017
Game theory for cyber security and privacy
CT Do, NH Tran, C Hong, CA Kamhoua, KA Kwiat, E Blasch, S Ren, ...
ACM Computing Surveys (CSUR) 50 (2), 1-37, 2017
592017
An evolutionary game-theoretic framework for cyber-threat information sharing
D Tosh, S Sengupta, C Kamhoua, K Kwiat, A Martin
2015 IEEE International Conference on Communications (ICC), 7341-7346, 2015
482015
Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy
CA Kamhoua, N Pissinou, K Makki
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
422011
Game theoretic modeling of security and interdependency in a public cloud
CA Kamhoua, L Kwiat, KA Kwiat, JS Park, M Zhao, M Rodriguez
2014 IEEE 7th international conference on cloud computing, 514-521, 2014
372014
Consensus protocols for blockchain-based data provenance: Challenges and opportunities
DK Tosh, S Shetty, X Liang, C Kamhoua, L Njilla
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
362017
Game theoretic modeling to enforce security information sharing among firms
DK Tosh, S Sengupta, S Mukhopadhyay, CA Kamhoua, KA Kwiat
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
332015
Security-aware virtual machine allocation in the cloud: A game theoretic approach
L Kwiat, CA Kamhoua, KA Kwiat, J Tang, A Martin
2015 IEEE 8th International Conference on Cloud Computing, 556-563, 2015
302015
Cyber-investment and cyber-information exchange decision modeling
DK Tosh, M Molloy, S Sengupta, CA Kamhoua, KA Kwiat
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
292015
Cyber-threats information sharing in cloud computing: A game theoretic approach
C Kamhoua, A Martin, DK Tosh, KA Kwiat, C Heitzenrater, S Sengupta
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
282015
Mitigating routing misbehavior in multi-hop networks using evolutionary game theory
CA Kamhoua, N Pissinou, J Miller, SK Makki
2010 IEEE Globecom Workshops, 1957-1962, 2010
272010
Game theory with learning for cyber security monitoring
K Chung, CA Kamhoua, KA Kwiat, ZT Kalbarczyk, RK Iyer
2016 IEEE 17th International Symposium on High Assurance Systems Engineering …, 2016
262016
Establishing evolutionary game models for cyber security information exchange (cybex)
D Tosh, S Sengupta, CA Kamhoua, KA Kwiat
Journal of Computer and System Sciences 98, 27-52, 2018
222018
Game theoretic analysis of cooperation in autonomous multi hop networks: The consequences of unequal traffic load
CA Kamhoua, N Pissinou, SK Makki
2010 IEEE Globecom Workshops, 1973-1978, 2010
192010
Testing for hardware trojans: A game-theoretic approach
CA Kamhoua, M Rodriguez, KA Kwiat
International Conference on Decision and Game Theory for Security, 360-369, 2014
182014
Trusted online social network (OSN) services with optimal data management
JS Park, KA Kwiat, CA Kamhoua, J White, S Kim
Computers & Security 42, 116-136, 2014
182014
Game theoretic attack analysis in online social network (OSN) services
J White, JS Park, CA Kamhoua, KA Kwiat
Proceedings of the 2013 ieee/acm international conference on advances in …, 2013
182013
CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud
D Tosh, S Shetty, P Foytik, C Kamhoua, L Njilla
2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 302-309, 2018
152018
A game-theoretic approach for testing for hardware trojans
CA Kamhoua, H Zhao, M Rodriguez, KA Kwiat
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 199-210, 2016
152016
The system can't perform the operation now. Try again later.
Articles 1–20